This is the Wi-Fi documentation. I work with the service, and we are partners with Check Point. One of our clients, Parliament, required an upgrade from physical to virtual implementation. This was my first implementation. We have another client, and the plan is to do something with them this year, although I'm not sure when. I've been involved in some other things, however, this was my first implementation.
Check Point Security Management
Check Point Software Technologies | R81.20-634.1849Linux/Unix, Other Gaia 3.10 - 64-bit Amazon Machine Image (AMI)
External reviews
External reviews are not included in the AWS star rating for the product.
The solution provides real visibility and secures the infrastructure effectively
What is our primary use case?
What is most valuable?
It's a reliable solution for security without mentioning its importance. We can't work without Check Point since it provides the real visibility needed to manage the environment. You can depend on it, as it assures the environment is well-secured. It's doing great work, and we can't work without SQL. We don't work with any other solution.
What needs improvement?
One case I saw was with the logs, which gave me the transfer and the vibration. There's a lot of logs, and I'm unsure about their validity, however, they take up a lot of space. We had to provision the virtual machine twice. Another reason is that the database was already large thanks to the numerous logs. I'm not sure how they can be managed comprehensively.
For how long have I used the solution?
I have done my first implementation of the solution.
What do I think about the stability of the solution?
Ever since I implemented it, we have not had any complaints from the client side. That is a good sign regarding stability.
How are customer service and support?
Check support was involved during the implementation. We had support during the migration process. The issue was the size of the partition for logs. After the support, we realized we needed to resize. The challenge was with drivers due to the size, and we had not provisioned the partition to the right size. This was resolved with support.
How would you rate customer service and support?
Neutral
How was the initial setup?
We had to determine the specifications required for the security of the virtual machine, such as memory, storage, and network setup. The provisioning of the VM depended on the available resources since the box itself had a lot of memory. Specifications are crucial for the setup, and we needed enough storage. The migration was time-consuming but manageable.
Which other solutions did I evaluate?
With Check Point, I can compare it with Fortinet. Fortinet is a bit lower, while Check Point is on a higher level in terms of visibility and reliability. I've seen recommendations for Check Point over other products.
What other advice do I have?
I would definitely recommend Check Point, especially since our client was already using it. We had considered other options, but Check Point was preferable. The implementation supports an environment with more than one hundred users.
Overall, I would rate this product a ten out of ten.
Provides multifactor authentication, IPS protection, and threat emulation
What is our primary use case?
We use the solution for VPN with multifactor authentication, IPS protection, and threat emulation. We have deployed the product in the cloud data center.
What is most valuable?
It's very easy for management to understand workflow and everything.
What needs improvement?
Check Point Tech Support will not assist with new configurations if we encounter any issues during the configuration process. They only provide support if there are issues with existing configurations.
For how long have I used the solution?
I have been using Check Point Security Management for four years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
It is 100% scalable. Behind the firewalls, around 25 web applications are accessed daily. Each application can be accessed by up to one lakh people every day.
How are customer service and support?
Support is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, I worked with FortiGate, and integrating that product with cloud platforms was very difficult. The workflows were overly complex, and the documentation was inadequate.
Check Point is superior to other security vendors. Their signature database, which includes antivirus, IPS, and anti-malware, is highly advanced. The system is easy to understand, and deployment via the web interface is also straightforward.
For example, during the COVID-19 pandemic, a new vulnerability known as Log4j emerged. While many vendors were unaware of this vulnerability, Check Point promptly emailed all its customers to inform them. They reassured customers that their gateways already had predefined prevention signatures to protect against this threat, requiring no additional action.
How was the initial setup?
The initial setup is straightforward. Fresh deployment and creating the gateways will take approximately three to four hours.
With Fortinet, managing the product through cloud formation can be difficult to implement in a cloud environment because it's not straightforward. First, we need to spin up some VMs and configure everything manually. In contrast, Check Point provides a more seamless cloud formation process. With Check Point, you click on the cloud formation option, and the VMs and necessary configurations are automatically set up. You will get GUI access quickly.
Only two resources are required. One knows Check Point, and another guy knows the cloud platform where they want to deploy the gateway.
What other advice do I have?
The integration process is straightforward. If you have some knowledge of your cloud service provider, you can easily integrate with it.
It has improved over the past four years. Previously, pushing any policy from the management server to the security gateway could take around ten to fifteen minutes. However, this task is now completed in about one minute with the new firmware version. This improvement demonstrates the substantial advancements made in the Management of Check Point products. It continuously updates its products to align with security standards and market awareness. They implement these updates in their own unique way. It is a strong player in the security market and has a long-standing presence. Their solutions are reliable and trusted for real security needs.
Maintenance is very easy.
First, we will thoroughly understand their requirements. Once we understand clearly, we will design tailored solutions for them. Next, we will present these solutions to the customer for review and discussion. Following their approval, we will run POC, collect evidence as required, and submit the comprehensive report.
Overall, I rate the solution a ten out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Access to detailed network logs in real time helps us decide and take prompt action to block and fix threats
What is our primary use case?
We use the product as a perimeter and core firewall for multiple clients at different locations.
We have physical Smart-1 appliances and virtual appliances in our environment. We merged all of the old managers into these managers and managed to centralize the management of firewalls and see the logs altogether.
We are using management API for large configs, and clear rules, blocking malicious IP addresses with SAM rules, and migrating the VLANs with it.
We have deployed Check Point high-end firewall UTMs to medium business-grade devices with different models. We also have a cloud-based Check Point firewall for one of our clients. It's easy to manage either centrally or as separate devices. We use them for network security including firewall rules, NATTing, Web application access, IPSec VPN tunneling between offices and cloud services, user VPN clients for access from home, data encryption, anti-malware/anti-virus solutions, and as network gateway devices for routing and DNS.
How has it helped my organization?
Check Point's management portal and firmware are very stable and don't require frequent maintenance. Their IPSec tunneling is very stable, especially with Azure and AWS networks.
Access to detailed network logs in real time helps us decide and take prompt action to block and fix threats.
Centralized management is great. With this, we manage all of Check Point products from one central management, we can apply rules, and NATS and manage app and URL Policies, threat prevention, and IPS protection rules.
Secondly, centralized log and report management is important. We can distribute logs to our log appliances with centralized management and view logs without logging additional devices.
HA Structure provides good coverage and works fine. With the HA structure, we can manage two data centers as one, and this is helping much.
We can keep old revisions, and with that, we can check or revert to one when needed.
What is most valuable?
The most valuable aspects of the solution include:
- IPSec VPN Tunneling,
- DDoS Protection,
- HÀ and Clustering,
- Firewall Rules,
- Proxy support,
- Revision history
- Detailed audit log,
- Smart Event
- Filter syntax.
These features are easy to configure and offer multiple options to set them up with cloud services and other vendor firewall products.
We can always feel secure if some things go wrong, I'm sure that we can restore to the old one.
We can apply centralized proxy settings to get additional databases when we need them.
We can get a graphical view of the traffic and provide history when we need it.
What needs improvement?
We didn't find any major feature missing or lacking in Check Point products that we used. We'd just like them to continue to improve their products with new features and updates.
However, license update and upgrade processes can be made a little easier.
Also, I'd like to see more integration possibilities between Check Point and other vendor security solutions.
The Check Point SandBlast platform could also be merged with the Check Point GAIA platform for a central management console and easier controls.
For how long have I used the solution?
I have been using Check Point for more than 10 years for different clients.
What do I think about the scalability of the solution?
The solution is highly scalable.
How are customer service and support?
Check Point's knowledge base is very vast and provides lots of information if we need some help. The community is very helpful as well.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have multiple clients and use different technologies, so we work on other vendor products also.
How was the initial setup?
We have a professional service team that we work together for setup-related work to Check Point appliances.
What about the implementation team?
We handle the initial setup in-house.
Which other solutions did I evaluate?
We have multiple clients and use different technologies, so we work on other vendor products also like Cisco ASA, FTD, Palo Alto, FortiGate etc.
What other advice do I have?
Overall I am fully satisfied with Check Point
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Provides security and reliability, integrates well with other products, and the exceptions work well
What is our primary use case?
We use the solution mostly for policy pushing to other gateways.
How has it helped my organization?
We deployed the tool for a customer. They faced an attack, but Check Point did not allow it. Check Point does not allow unauthorized access to the network. It just sends a message to the person saying they are not authorized to access the network. The exceptions work very well. Most of the attacks go through the web path. The tool does a good job of securing the web path.
What is most valuable?
We can easily push the policies to any of our gateways. The solution manages the gateways. It works well with other products. It integrates well with Cisco products, too.
What needs improvement?
The tool is expensive.
For how long have I used the solution?
I have been using the solution for the last two years.
What do I think about the stability of the solution?
The tool is very stable. The equipment is never down.
What do I think about the scalability of the solution?
We have more than ten customers.
How are customer service and support?
The support is very good. We get a response immediately whenever we enter a support request on the website. We do not have to wait for one or two hours. The team also offers remote support. The support provided by Check Point is one of the best in the market.
How was the initial setup?
We have most of the products on-premise. We have only one client on a VM. Check Point offers training for their products. They usually send us a link every time they launch a new feature. Unless we go through the tutorials, it will be difficult for us to deploy the solution. However, it is easy to deploy when you know how to do it. It is easy to navigate if we have read about the gadget.
What's my experience with pricing, setup cost, and licensing?
The tool is expensive. However, if we buy Check Point Security Management, we do not have to buy anything else. We get all the features we need in a single solution. We get value for our money.
What other advice do I have?
If we want to troubleshoot, we just have to log in to the SMS. Everything is listed there. We just have to log in to the gateway we have an issue with. We need not go to the server rooms. I see no improvements needed in the product. The other gateways and SD-WAN could be improved. If someone wishes to use the product, they have chosen the best option. It provides security, reliability, and support. Though it is expensive, it is the best. It has all the features we need. The product is absolutely excellent. Overall, I rate the tool a ten out of ten.
Which deployment model are you using for this solution?
Great DDoS protection, high availability, and useful firewall rule implementation
What is our primary use case?
We use the product as a primary gateway firewall for all offices at different locations.
We have deployed their high-end firewall UTMs to medium business grade devices 1400 series. They are easy to manage either centrally or as separate devices. We are using them for Network security including firewall rules, NATTing, Web application access, IPSec VPN tunneling between offices and cloud services, user VPN clients for access from home, data encryption, anti-malware/anti-virus solutions, and as network gateway devices for routing and DNS.
How has it helped my organization?
We have seen tremendous improvement in the overall security of the organization's IT assets. We performed Pen Tests and External vulnerability audits on our network and we always scored top-rated thanks to Check Point.
Their management portal and firmware are very stable and don't require frequent maintenance. Their IPSec tunneling is very stable, especially with Azure and AWS networks.
Access to detailed network logs in real time helps us decide and take prompt action to block/fix threats.
What is most valuable?
The most valuable aspects of the solution include:
- IPSec VPN Tunneling: they are easy to configure and offer multiple options to set them up with Cloud services and other vendor firewall products over certificates, shared keys etc.
- DDoS Protection: Firewall cleverly handles such attacks without compromising on performance.
- HA and Clustering: Seamless load management and High Availability between nodes of firewall clusters.
- Firewall Rules: You have access to set up rules at a very granular level and all are accessible through the GUI platform as well as over CMDLET.
What needs improvement?
We didn't find any major feature missing or lacking in Check Point products that we used. We'd just like them to continue to improve their products with new features and updates.
We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners.
The Check Point SandBlast platform could also be merged with the Check Point GAIA platform for a central management console and easier controls.
For how long have I used the solution?
I've used the solution for more than ten years.
What do I think about the stability of the solution?
The solution is very stable compared to peers.
What do I think about the scalability of the solution?
The solution is highly scalable.
How are customer service and support?
Technical support is satisfactory, however, it takes some time to escalate your ticket.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did use Sophos and Cisco ASA, however, they were either complicated products to manage or lacked features.
How was the initial setup?
The initial setup wasn't difficult after you attended free platform support sessions by Check Point.
What about the implementation team?
We handled the initial setup in-house.
Which other solutions did I evaluate?
Which deployment model are you using for this solution?
A highly accessible and fast tool that provides a very good technical support
What is our primary use case?
I use it for managing ten clusters in our on-premise environment. With this kind of management, it's possible to question its policy and change many configurations in the files. With its management, we got all the logs from the environment. With Check Point Security Management, we get the benefits of deploying the configuration.
How has it helped my organization?
Owing to the availability of many kinds of incidents, I can say that the solution has served to improve my organization.
What is most valuable?
Regarding the tool's valuable features, I would say that Check Point is a very accessible and fast tool, especially when dealing with logs for the first time. It is a perfect solution for me.
What needs improvement?
From the Check Point Security Management solution, it's possible to get the situation of my clusters. I guess it lacks in providing visibility of the many incidents. Hence, the visibility of incidents is an area where I want the solution to improve.
For how long have I used the solution?
I have been using Check Point Security Management since 2005, so I have used it for maybe twenty years. Also, I am using Check Point Security Management E84.20.
What do I think about the stability of the solution?
Stability-wise, I rate the solution a ten out of ten.
What do I think about the scalability of the solution?
Scalability-wise, I rate the solution a ten out of ten.
How are customer service and support?
The solution's technical support is very good. Hence, I rate the technical support a ten out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The solution's initial setup was easy.
What was our ROI?
It took a year to see a return on investment. I did experience a return on investment using the solution.
What's my experience with pricing, setup cost, and licensing?
Price-wise, it is an expensive solution.
What other advice do I have?
I recommend the solution to those planning to use it.
I rate the overall product between nine to ten out of ten.