TrustRadius: an HG Insights company

CheckPoint

Score8.5 out of 10

58 Reviews and Ratings

What is CheckPoint?

CheckPoint is a digital access management and engagement system for venues. It automates and digitizes the registration, ticketing, and check-in process while enabling venues, vendors, and exhibitors to engage with guests directly to their phone's lock screen.

CheckPoint is an event management tool for events, conferences, festivals, clubs, and more. The venue management solution boasts users among both the Oscars and Nasdaq.

Media

Screenshot of CheckPoint ecosystem includes the digital ticket using the wallet pass technology, a near-field communication tap device used for registration and check-in, and an admin portal used to provide real-time updates and analytics to make data-driven decisions.
Screenshot of CheckPoint gives exhibitors, vendors and sponsors access to your guests' lock screen to send personalized notifications. Send urgent messages in real-time to increase security around your venue.
Screenshot of Modernize your venue with CheckPoint's digital ticketing system that lives in your guests' mobile wallets. By using CheckPoint, improve your user experience by enabling a 100% contactless and automated system that gets your guests into your venues faster and smarter.
Screenshot of Increase security around check-in with CheckPoint's automated and contactless system. CheckPoint is a sleek digital solution that condensed a multi-step process into one simple tap to speed up check-ins.

1 / 4

Screenshot of CheckPoint ecosystem includes the digital ticket using the wallet pass technology, a near-field communication tap device used for registration and check-in, and an admin portal used to provide real-time updates and analytics to make data-driven decisions.

CheckPoint is good bang for buck

Use Cases and Deployment Scope

Our organisation uses CheckPoint as the secondary layer in our network security architecture, serving as the internal firewall. It operates as the intermediary between our external edge firewall and the internal network, providing an additional layer of protection for applications, systems, and websites. This setup ensures that all inbound and outbound traffic passing through the perimeter is subject to further inspection and policy enforcement before reaching internal resources. By doing so, CheckPoint helps to strengthen our overall cybersecurity posture, prevent unauthorised access, and maintain greater control over internal communications and data flow within the organisation.

Pros

  • Rules
  • Gui
  • Updates and patches
  • Communication from Sales Team

Cons

  • Management console can be complex
  • Reporting Logs hard to manage
  • Integration with Cloud apps

Return on Investment

  • Support is fantastic
  • Limitations on integration with 3rd party apps
  • Units and support are well priced
  • The option for Virtual appliances is a big cost saving

Usability

Alternatives Considered

Cisco 1000 Series Integrated Services Routers (ISR 1000)

Other Software Used

Cisco ASA 5500-X with FirePOWER Services, FortiAnalyzer, Cisco Catalyst SD-WAN

Check with CheckPoint before its too late

Use Cases and Deployment Scope

CheckPoint enables our organization and clients to address a broad range of complex cybersecurity challenges through advanced, integrated security capabilities.

Advanced Threat Protection:
Network Segmentation

Cloud Security:
Compliance:

Access Control Scope:
Pre-Sales:
Integration & Deployment
Monitoring Services. Even tough the cost is bit higher than palo alto but still provides a lot of good functionalities which can be taken into consideration for buying this firewall and even if this is working in a lot of finance institutions around the globe than but still it depends on you to go for it or not. Traffic is very impressive

Pros

  • Threat Prevention better than Fortinet
  • Granularity of security policy can be customized to the maximum
  • hardware performance is really good
  • Bugs are less as compared to other vendors
  • support is excellent
  • modules work as expected
  • Features can achieve out of box requirements

Cons

  • I think Guard cloud should have an improvement as Palo Alto prism has a more depth integration with container security
  • API management should be having more automation to make interaction with SOC
  • User interface should be more user friendly
  • Harmony should be as good as Palo Alto XDR which offers incident and analytical response
  • Cost should be evaluated for licensing modules
  • false positives may occur

Return on Investment

  • Smart console with lower operational overhead
  • Compliance with Hipaa, PCISSS and saving on compliance plenties
  • Less compatibility issues
  • licensing model is costlier at the beginning
  • Some modules require special training
  • False positives may occur

Usability

Alternatives Considered

Palo Alto Networks Next-Generation Firewalls - PA Series, Fortinet FortiGate and Barracuda CloudGen Firewall

Other Software Used

F5 BIG-IP, Forcepoint Data Loss Prevention, Barracuda Application Protection

CheckPoint for the World

Use Cases and Deployment Scope

CheckPoint is the main NGFW of the infrastructure and it provides the scalability for the growth of the services. The management perfectly adapt the correct solutions for most of the network business problems. The log collector helps support to investigate and troubleshoot the problem finding a lot of useful information. Also used as reverse proxy, can forward packet between more than one webserver with correct policy associated.

Pros

  • NAT table
  • Log collector
  • Shared layers

Cons

  • VPN ipsec
  • VPN ssl
  • IPS functioning

Return on Investment

  • Support
  • Reliability
  • Easy to use

Usability

Alternatives Considered

Fortinet FortiGate, Cisco Firepower 4100 Series and Palo Alto Networks Next-Generation Firewalls - PA Series

Other Software Used

Fortinet FortiGate, Cisco Firepower 4100 Series, Palo Alto Networks Next-Generation Firewalls - PA Series, pfSense, Endian, Ivanti Secure Unified Client, Cisco ASA 5500-X with FirePOWER Services, Juniper SRX

CheckPoint Endpoint Security

Use Cases and Deployment Scope

We use CheckPoint as an endpoint anti-malware suite. We like its reliability for protecting workstations and servers from all the bad stuff, the only complaint I have with CheckPoint is that the cloud portal user interface is very confusing and not user friendly, even to a veteran system administrator. The cloud portal does display an immense amount of useful information but the navigation and organization of that info is disjointed and doesn't follow normal modern UX design.

Pros

  • Scans local endpoints for malware fairly quickly
  • Can be installed by InTune
  • Technical Support Managers will close support cases for invalid reasons
  • Sales representatives think its OK for support to ghost paying customers

Cons

  • In my experience, notifications are completely broken and non-functional
  • In my opinion, confusing UX for the cloud portal
  • Don't try and import 100's of endpoints when onboarding because it will create a mess
  • When installing the CP client you have to remove Microsoft Defender and if that fails, CheckPoint technical support goes, "Not my problem, sucks to be you!"

Most Important Features

  • Reliability

Return on Investment

  • ROI is satisfactory because it is doing the basics of preventing malware infections

Usability

Alternatives Considered

Sophos Intercept X, Sophos UTM and Symantec Endpoint Security