Likelihood to Recommend Check Point Software Technologies
1) For huge DC environments and complex networks 2) Where clients were consistent up-time like FSI and healthcare 3) Application-aware client req. and preventing day 0 cyber attacks. 4) Securing East-West traffic, hyper-scaling capabilities 5)Some advantages - Best Security meets Ultimate Hardware and SandBlast Zero Day Protection out of the box, Modular hardware 6) High Performance CPUs
Read full review Over the years, [in our experience], the maintenance of the Forcepoint Web Security solution proved to be more cumbersome and troublesome with each version upgrade. In addition, it did not transition well to support the large increase of remote workers. We also experienced weird incompatibilities with the client. We have since replaced this solution with Zscaler Internet Access, a cloud-based secure web gateway solution with a client that behaves as expected, is more flexible, and requires significantly less administration.
Read full review Pros Check Point Software Technologies
SSL inspection provides more effective mitigation of threat and data leakage with the ability to inspect and analyze encrypted traffic. Threat emulation and extraction provides protection against zero-day threats without compromising the data of infected files. 'Office mode' VPN provides a seamless connected experience for remotely connected individuals. Application control features provide granular restrictions to the type of application traffic than can pass through the network. Read full review It prevents users from accessing websites that may have recently been created for the purpose of distributing malware. It prevents users from accidentally or intentionally accessing websites that are considered inappropriate for a work environment. It allows us to create different policies for different teams in our organization. Read full review Cons Check Point Software Technologies
HTTPS Inspection -- The firewall has troubles re-packaging the packet in a way that some websites are able to interpret correctly Support -- Even getting support directly from Check Point isn't the easiest of experiences. They are more concerned about how fast they can close a ticket out, rather than fixing the problem. Custom reports -- Custom reporting is extremely limited Read full review The user access logs contain a lot of useless information. I understand this is very hard to tackle as I've seen this across any product that logs web activity. I would like to see more customization options of website block pages. Read full review Likelihood to Renew Check Point Software Technologies
It is very stable, the organisation has "locked in" the product and has no plans to change or try another product. We have already renewed our 2019-2020 licenses. It is user friendly and people catch on easily when they first use it. The only downtime is when we install Microsoft updates! It has excellent reporting which help in determining how the organisation's Internet is used and also during both internal and external IT audits.
Read full review Usability Check Point Software Technologies
Despite the intimidating Linux CLI when you use the appliance for troubleshooting, the web security usability compensates as most of the Administration of the system is done there. It is GUI based and has an easy to use UI where one can navigate around rather easily like getting reports, checking alerts, looking the whole setup under deployment to check if all services are running in one place though there are other parts to the system.
Read full review Support Rating Check Point Software Technologies
Check Point has a variety of support options that can be used to optimize your investment in the product. Companies with a larger information security and certified checkpoint engineer employee base can benefit from a standard SLA, while companies with a smaller security engineering footprint or more critical implementations can opt for premium, elite or diamond packages that even include the ability to provide on-site engineers for major security incidents. Check Point PRO support also provides the ability to outsource maintenance concerns by automating case creation and follow up when application components fail.
Read full review The is a quick first response to acknowledge your issue and the Engineers never take more than two hours to fix an issue and we hardly get issues looking at the fact that the system is pretty stable. There is also a robust Knowledge Base in the site for known problems.
Read full review Implementation Rating Check Point Software Technologies
Research known issues with upgrading from the Support Knowledge base, this will enable you avoid road blocks along the way and reduce your dependence on Forcepoint Support
Read full review Alternatives Considered Check Point Software Technologies
In a heterogeneous environment, we wanted to keep multiple vendors for multiple purposes. CP was found very good in handling basic Next generation firewalls features along with handling of VPNs.
Read full review To be honest, once using Forcepoint for our Web Security, I have not wanted to look anywhere else. The dashboard gives me quick insight of threats, productivity, and bandwidth usage. Again, this is a layer in my security and it fills many holes. I feel safe and I do like I can just let it do its thing
Read full review Return on Investment Check Point Software Technologies
Although there are better alternatives out there, Check Point delivers results for the price we paid for the system. Since implementation, we have not have any major issues with the product, minor issues were resolved in a timely fashion. Check Point currently fulfills our need for an outside facing firewall, when our organization grows larger, we will be looking at higher level enterprise solutions. Read full review Being a non-profit the cost is a bit higher than some competitors so our ROI takes a bit longer to recoup. I would really like to see better non-profit pricing. The ease of doing a report on someone cuts down on the IT man-hours to do website tracking for managers as we can do it from a central point whereas in the past (prior to Forcepoint/Websense) we would have to ghost their machine to look for activity as well as their local servers. Read full review ScreenShots