Check Point Quantum Security Gateway Next Generation Firewall vs. Cisco Meraki vMX

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Check Point Quantum Security Gateway
Score 9.2 out of 10
N/A
The Check Point Quantum Security Gateway Next Generation Firewall is a tiered firewall product. The base model includes the core firewall services, and can be upgraded to include anti-bot/virus/spam and sandboxing capabilities.N/A
Cisco Meraki vMX
Score 9.1 out of 10
N/A
Cisco's Meraki Virtual MX (vMX) is a virtual instance of a Meraki security & SD-WAN appliance, dedicated specifically to providing the simple configuration benefits of site-to-site Auto VPN for customers running or migrating IT services to an Amazon Web Services or Microsoft Azure Virtual Private Cloud (VPC).N/A
Pricing
Check Point Quantum Security Gateway Next Generation FirewallCisco Meraki vMX
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Check Point Quantum Security GatewayCisco Meraki vMX
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Check Point Quantum Security Gateway Next Generation FirewallCisco Meraki vMX
Top Pros
Top Cons
Features
Check Point Quantum Security Gateway Next Generation FirewallCisco Meraki vMX
Firewall
Comparison of Firewall features of Product A and Product B
Check Point Quantum Security Gateway Next Generation Firewall
8.1
3 Ratings
5% below category average
Cisco Meraki vMX
-
Ratings
Identification Technologies7.02 Ratings00 Ratings
Visualization Tools10.01 Ratings00 Ratings
Content Inspection7.03 Ratings00 Ratings
Policy-based Controls9.03 Ratings00 Ratings
Active Directory and LDAP6.02 Ratings00 Ratings
Firewall Management Console7.53 Ratings00 Ratings
Reporting and Logging8.53 Ratings00 Ratings
VPN9.03 Ratings00 Ratings
High Availability8.53 Ratings00 Ratings
Stateful Inspection9.03 Ratings00 Ratings
Proxy Server7.02 Ratings00 Ratings
Virtual Private Network
Comparison of Virtual Private Network features of Product A and Product B
Check Point Quantum Security Gateway Next Generation Firewall
-
Ratings
Cisco Meraki vMX
7.7
5 Ratings
10% below category average
AES 256-bit Encryption00 Ratings9.15 Ratings
Kill Switch00 Ratings9.11 Ratings
Multi-Platform Support00 Ratings5.03 Ratings
Split Tunneling00 Ratings7.63 Ratings
IP Address Masking00 Ratings6.52 Ratings
No-Logs Policy00 Ratings6.52 Ratings
Multiple Server Locations00 Ratings7.94 Ratings
Simultaneous Connections00 Ratings9.15 Ratings
Customer Support Services00 Ratings8.75 Ratings
Best Alternatives
Check Point Quantum Security Gateway Next Generation FirewallCisco Meraki vMX
Small Businesses
pfSense
pfSense
Score 9.2 out of 10
Avast Small Business Solutions
Avast Small Business Solutions
Score 8.4 out of 10
Medium-sized Companies
Next-Generation Firewalls - PA Series
Next-Generation Firewalls - PA Series
Score 9.3 out of 10
Check Point Quantum Security Gateway
Check Point Quantum Security Gateway
Score 9.2 out of 10
Enterprises
Next-Generation Firewalls - PA Series
Next-Generation Firewalls - PA Series
Score 9.3 out of 10
Check Point Quantum Security Gateway
Check Point Quantum Security Gateway
Score 9.2 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Check Point Quantum Security Gateway Next Generation FirewallCisco Meraki vMX
Likelihood to Recommend
7.5
(5 ratings)
8.6
(7 ratings)
Support Rating
10.0
(1 ratings)
-
(0 ratings)
Product Scalability
-
(0 ratings)
8.1
(7 ratings)
User Testimonials
Check Point Quantum Security Gateway Next Generation FirewallCisco Meraki vMX
Likelihood to Recommend
Check Point Software Technologies
1) For huge DC environments and complex networks 2) Where clients were consistent up-time like FSI and healthcare 3) Application-aware client req. and preventing day 0 cyber attacks. 4) Securing East-West traffic, hyper-scaling capabilities 5)Some advantages - Best Security meets Ultimate Hardware and SandBlast Zero Day Protection out of the box, Modular hardware 6) High Performance CPUs
Read full review
Cisco
We are a heavily invested Meraki environment, from our corporate locations to APs. Using a vMX as apposed another solution is a no brainer. It integrates well, has the same benefits as the rest of the Meraki stack, and you can leverage your favorite cloud platform
Read full review
Pros
Check Point Software Technologies
  • SSL inspection provides more effective mitigation of threat and data leakage with the ability to inspect and analyze encrypted traffic.
  • Threat emulation and extraction provides protection against zero-day threats without compromising the data of infected files.
  • 'Office mode' VPN provides a seamless connected experience for remotely connected individuals.
  • Application control features provide granular restrictions to the type of application traffic than can pass through the network.
Read full review
Cisco
  • Works well with physical Meraki MX devices
  • Site-to-Site VPNs are easy to set up with other Meraki devices
  • Cisco Meraki vMX provides a great solution for a virtual environment, like Azure
Read full review
Cons
Check Point Software Technologies
  • HTTPS Inspection -- The firewall has troubles re-packaging the packet in a way that some websites are able to interpret correctly
  • Support -- Even getting support directly from Check Point isn't the easiest of experiences. They are more concerned about how fast they can close a ticket out, rather than fixing the problem.
  • Custom reports -- Custom reporting is extremely limited
Read full review
Cisco
  • Client VPN: Cisco Meraki vMX in general needs to implement multiple VPN profiles/ group policies for client VPN
  • Alerts: Cisco Meraki vMX in general should be more consistent in sending alerts. We should receive alarms instantly.
  • Event logs: More in-depth event logs for all Meraki products, such as system crashes, etc.
Read full review
Support Rating
Check Point Software Technologies
Check Point has a variety of support options that can be used to optimize your investment in the product. Companies with a larger information security and certified checkpoint engineer employee base can benefit from a standard SLA, while companies with a smaller security engineering footprint or more critical implementations can opt for premium, elite or diamond packages that even include the ability to provide on-site engineers for major security incidents. Check Point PRO support also provides the ability to outsource maintenance concerns by automating case creation and follow up when application components fail.
Read full review
Cisco
No answers on this topic
Alternatives Considered
Check Point Software Technologies
In a heterogeneous environment, we wanted to keep multiple vendors for multiple purposes. CP was found very good in handling basic Next generation firewalls features along with handling of VPNs.
Read full review
Cisco
I've used the FortiGate VM appliance many times and this was much better to use, it was a full feature set and had no setbacks ever. But people use Meraki for different reasons likely so it's not 100% apples to apples. As an SR engineer, I demand deep feature sets, etc, while some users strive for simplistic networks that are very visually appealing.
Read full review
Scalability
Check Point Software Technologies
No answers on this topic
Cisco
We have over 350 locations and growing. We chose Cisco Meraki vMX because of ease of use and how it scales.
Read full review
Return on Investment
Check Point Software Technologies
  • Although there are better alternatives out there, Check Point delivers results for the price we paid for the system.
  • Since implementation, we have not have any major issues with the product, minor issues were resolved in a timely fashion.
  • Check Point currently fulfills our need for an outside facing firewall, when our organization grows larger, we will be looking at higher level enterprise solutions.
Read full review
Cisco
  • vMX is cheaper than Azure VPN gateway
  • there is no native support for HA, so you need to deploy second instance
Read full review
ScreenShots