Likelihood to Recommend Check Point Software Technologies
1) For huge DC environments and complex networks 2) Where clients were consistent up-time like FSI and healthcare 3) Application-aware client req. and preventing day 0 cyber attacks. 4) Securing East-West traffic, hyper-scaling capabilities 5)Some advantages - Best Security meets Ultimate Hardware and SandBlast Zero Day Protection out of the box, Modular hardware 6) High Performance CPUs
Read full review it is well-suited for the following scenarios:Organizations that need to comply with regulatory requirements related to internet usage, such as data privacy and security laws, and that need to monitor and control employee internet activity.Organizations that are concerned about online threats and need to protect their networks and endpoints from malware, phishing, and other types of malicious content.Organizations that need to improve productivity by reducing distractions for employees, and/or need to restrict access to specific websites during work hours.Organizations that need to protect sensitive data such as customer information, financial transactions and other sensitive data, by monitoring and controlling the internet activity on the back-end systems.However, SafeDNS may not be as appropriate for the following scenarios:Organizations that have very limited IT resources and lack the skills and knowledge required to set up and manage SafeDNS Organizations that have specific needs and requirements that are not met by the features and capabilities of SafeDNS, for example organizations that require advanced threat detection and response capabilities.Organizations that may have limited budget, SafeDNS does require a subscription cost, that might not be feasible for smaller businesses with limited resources.Organizations that are using legacy systems that are not compatible with SafeDNS, that may not be able to integrate it to their infrastructure.
Read full review Pros Check Point Software Technologies
SSL inspection provides more effective mitigation of threat and data leakage with the ability to inspect and analyze encrypted traffic. Threat emulation and extraction provides protection against zero-day threats without compromising the data of infected files. 'Office mode' VPN provides a seamless connected experience for remotely connected individuals. Application control features provide granular restrictions to the type of application traffic than can pass through the network. Read full review block group of website report blocked website tentative creation of group of profile, like vendor, client, etc. Read full review Cons Check Point Software Technologies
HTTPS Inspection -- The firewall has troubles re-packaging the packet in a way that some websites are able to interpret correctly Support -- Even getting support directly from Check Point isn't the easiest of experiences. They are more concerned about how fast they can close a ticket out, rather than fixing the problem. Custom reports -- Custom reporting is extremely limited Read full review Filtering accuracy: While SafeDNS provides filtering of websites, it's possible that it could be improved to more accurately identify and block unwanted content. This could be achieved by implementing more advanced algorithms or incorporating more data sources. Reporting and analytics: Some users may find that the reporting and analytics capabilities of SafeDNS are lacking and could be improved, for example by providing more detailed information about internet usage, or more sophisticated filtering and reporting tools. Compatibility: Some organizations may have legacy systems that are not fully compatible with SafeDNS. Improving compatibility could make it easier for these organizations to integrate SafeDNS into their existing infrastructure. Read full review Support Rating Check Point Software Technologies
Check Point has a variety of support options that can be used to optimize your investment in the product. Companies with a larger information security and certified checkpoint engineer employee base can benefit from a standard SLA, while companies with a smaller security engineering footprint or more critical implementations can opt for premium, elite or diamond packages that even include the ability to provide on-site engineers for major security incidents. Check Point PRO support also provides the ability to outsource maintenance concerns by automating case creation and follow up when application components fail.
Read full review Alternatives Considered Check Point Software Technologies
In a heterogeneous environment, we wanted to keep multiple vendors for multiple purposes. CP was found very good in handling basic Next generation firewalls features along with handling of VPNs.
Read full review No comparison. I never could get the Cisco product to function as it should in the trial and their support was poor.
Read full review Return on Investment Check Point Software Technologies
Although there are better alternatives out there, Check Point delivers results for the price we paid for the system. Since implementation, we have not have any major issues with the product, minor issues were resolved in a timely fashion. Check Point currently fulfills our need for an outside facing firewall, when our organization grows larger, we will be looking at higher level enterprise solutions. Read full review prevent offensive content on our materials prevent innapropriate use of our materials by the staff Read full review ScreenShots