Check Point's robust and unique feature set proves why it's the industry leader
April 03, 2020

Check Point's robust and unique feature set proves why it's the industry leader

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Check Point Next Generation Firewall

The Check Point Next Generation Firewall provides us with holistic perimeter and endpoint security protection throughout the enterprise. The robust and secure VPN functionality also provides enough confidence to enable a 'work from home' / 'road warrior' culture within the organization. In-depth application control, URL filtering and SSL inspection features also mitigate a significant amount of risk for internal users browsing the internet and hosted services that face the internet. Data loss prevention, compliance, threat emulation, and other blades overall make this a robustly unified platform for the implementation and management of security controls.
  • SSL inspection provides more effective mitigation of threat and data leakage with the ability to inspect and analyze encrypted traffic.
  • Threat emulation and extraction provides protection against zero-day threats without compromising the data of infected files.
  • 'Office mode' VPN provides a seamless connected experience for remotely connected individuals.
  • Application control features provide granular restrictions to the type of application traffic than can pass through the network.
  • Pricing is not as competitive as the alternatives.
  • Perimeter antivirus is not as effective as its competitors
  • Steep learning curve and expensive certification paths may impair training paths
  • Lower maintenance and information security management efforts thanks to the centralized console and dashboards
  • Improved mitigation of data loss/data leakage thanks to dedicated DLP blades
  • Improved productivity thanks to VPN/remote work capabilities
  • Improved internet access speeds and prioritization of services through the implementation of the application control blade
  • Improved employee productivity thanks to stringent URL filtering controls
While Palo Alto Networks Next Generation Firewalls are priced more competitively against Check Point Products, the overall product has not as stable, effective or intuitive for us during our evaluation period:
  • A side by side comparison of traffic logs were done between Palo Alto and Check Point and Check Point was seen to have more concise data;
  • The user interface and dashboard is not as intuitive as Check Point
  • The product itself may not be as stable as Check Point, as our demo unit crashed during the evaluation period.
Check Point has a variety of support options that can be used to optimize your investment in the product. Companies with a larger information security and certified checkpoint engineer employee base can benefit from a standard SLA, while companies with a smaller security engineering footprint or more critical implementations can opt for premium, elite or diamond packages that even include the ability to provide on-site engineers for major security incidents. Check Point PRO support also provides the ability to outsource maintenance concerns by automating case creation and follow up when application components fail.

Do you think Check Point Quantum Security Gateway Next Generation Firewall delivers good value for the price?

Yes

Are you happy with Check Point Quantum Security Gateway Next Generation Firewall's feature set?

Yes

Did Check Point Quantum Security Gateway Next Generation Firewall live up to sales and marketing promises?

Yes

Did implementation of Check Point Quantum Security Gateway Next Generation Firewall go as expected?

Yes

Would you buy Check Point Quantum Security Gateway Next Generation Firewall again?

Yes

Check Point Next Generation Firewall is a great solution for larger companies that have the ability to dedicate a large budget towards information security controls. In order to get the best return on investment, however, the company should have a highly functioning information security maturity level and the ability to invest in dedicated training so that all features are utilized effectively. The SmartEvent dashboards are able to provide ongoing data that can track this effectively.

Check Point Quantum Security Gateway Feature Ratings

Identification Technologies
8
Visualization Tools
10
Content Inspection
10
Policy-based Controls
9
Active Directory and LDAP
9
Firewall Management Console
9
Reporting and Logging
10
VPN
10
High Availability
9
Stateful Inspection
9
Proxy Server
8