Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Check Point Security Management

Check Point Software Technologies | R81.20-634.1849

Linux/Unix, Other Gaia 3.10 - 64-bit Amazon Machine Image (AMI)

Reviews from AWS customer

2 AWS reviews

External reviews

27 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Charity Kimotho

Provides security and reliability, integrates well with other products, and the exceptions work well

  • February 21, 2024
  • Review provided by PeerSpot

What is our primary use case?

We use the solution mostly for policy pushing to other gateways.

How has it helped my organization?

We deployed the tool for a customer. They faced an attack, but Check Point did not allow it. Check Point does not allow unauthorized access to the network. It just sends a message to the person saying they are not authorized to access the network. The exceptions work very well. Most of the attacks go through the web path. The tool does a good job of securing the web path.

What is most valuable?

We can easily push the policies to any of our gateways. The solution manages the gateways. It works well with other products. It integrates well with Cisco products, too.

What needs improvement?

The tool is expensive.

For how long have I used the solution?

I have been using the solution for the last two years.

What do I think about the stability of the solution?

The tool is very stable. The equipment is never down.

What do I think about the scalability of the solution?

We have more than ten customers.

How are customer service and support?

The support is very good. We get a response immediately whenever we enter a support request on the website. We do not have to wait for one or two hours. The team also offers remote support. The support provided by Check Point is one of the best in the market.

How was the initial setup?

We have most of the products on-premise. We have only one client on a VM. Check Point offers training for their products. They usually send us a link every time they launch a new feature. Unless we go through the tutorials, it will be difficult for us to deploy the solution. However, it is easy to deploy when you know how to do it. It is easy to navigate if we have read about the gadget.

What's my experience with pricing, setup cost, and licensing?

The tool is expensive. However, if we buy Check Point Security Management, we do not have to buy anything else. We get all the features we need in a single solution. We get value for our money.

What other advice do I have?

If we want to troubleshoot, we just have to log in to the SMS. Everything is listed there. We just have to log in to the gateway we have an issue with. We need not go to the server rooms. I see no improvements needed in the product. The other gateways and SD-WAN could be improved. If someone wishes to use the product, they have chosen the best option. It provides security, reliability, and support. Though it is expensive, it is the best. It has all the features we need. The product is absolutely excellent. Overall, I rate the tool a ten out of ten.

Which deployment model are you using for this solution?

On-premises


    CBMMishra

Alert classifications help prioritize critical issues

  • February 20, 2024
  • Review provided by PeerSpot

What is our primary use case?

We utilize Check Point Security Management for our daily security operations, including managing firewall rules, reviewing alerts, and generating reports on a weekly basis.

How has it helped my organization?

We've integrated Check Point Security Management with some of our business associates' portals for HR, finance, and payroll activities, which are outsourced. Check Point alarms us about any version changes on these sites, allowing us to block unauthorized changes. So far, we haven't encountered any serious incidents that require immediate action. We receive incident reports, but they usually involve blocked or quarantined threats rather than major security breaches. Additionally, our internal management console provides us with alerts, adding another layer of security monitoring.

What is most valuable?

Over the past 1.5  years, we've started monitoring it more regularly, analyzing alerts closely. The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as TLS violations or content violations. 

While we use a cloud-based Security Control console, we primarily conduct in-depth analysis of reports on a weekly basis to enhance our security posture.

What needs improvement?

Check Point EDR has room for improvement, especially in the area of Data Loss Prevention where it currently lacks functionality. 

I'd also like to see enhancements in content filtering and categorization features.

I would appreciate the ability to restrict forwarding of confidential documents to specific groups, ensuring tighter security measures.

For how long have I used the solution?

I have been using Check Point Security Management for the past 1.5 years.

What do I think about the stability of the solution?

I would rate the stability 9 out of 10. 

What do I think about the scalability of the solution?

I would rate the scalability 8 out of 10. 

How was the initial setup?

We faced issues, but with the help of tech support, it was solved. It took almost one week approximately to set the solution through firewall.

What about the implementation team?

We rely on tech support to enhance our capabilities.

We have a small, focused team of four engineers.

What was our ROI?

Currently, we only use Check Point and are satisfied with its benefits in terms of time-saving and security performance, estimating a 30% time savings.

What's my experience with pricing, setup cost, and licensing?

The pricing can be estimated around 3 or 4 out of 10 in terms of expense.

Which other solutions did I evaluate?

I have evaluated another product before Check Point but found the local account manager to be more aggressive.

What other advice do I have?

I would rate the product overall at 8 out of 10, mentioning that while functionalities are there, improvements could be made to make it more user-friendly for laymen, such as incorporating drag-and-drop functionality.


    reviewer06814135

Great DDoS protection, high availability, and useful firewall rule implementation

  • October 12, 2023
  • Review provided by PeerSpot

What is our primary use case?

We use the product as a primary gateway firewall for all offices at different locations. 

We have deployed their high-end firewall UTMs to medium business grade devices 1400 series. They are easy to manage either centrally or as separate devices. We are using them for Network security including firewall rules, NATTing, Web application access, IPSec VPN tunneling between offices and cloud services, user VPN clients for access from home, data encryption, anti-malware/anti-virus solutions, and as network gateway devices for routing and DNS.

How has it helped my organization?

We have seen tremendous improvement in the overall security of the organization's IT assets. We performed Pen Tests and External vulnerability audits on our network and we always scored top-rated thanks to Check Point. 

Their management portal and firmware are very stable and don't require frequent maintenance. Their IPSec tunneling is very stable, especially with Azure and AWS networks. 

Access to detailed network logs in real time helps us decide and take prompt action to block/fix threats. 

What is most valuable?

The most valuable aspects of the solution include:

  • IPSec VPN Tunneling: they are easy to configure and offer multiple options to set them up with Cloud services and other vendor firewall products over certificates, shared keys etc.
  • DDoS Protection: Firewall cleverly handles such attacks without compromising on performance.
  • HA and Clustering: Seamless load management and High Availability between nodes of firewall clusters.
  • Firewall Rules: You have access to set up rules at a very granular level and all are accessible through the GUI platform as well as over CMDLET.

What needs improvement?

We didn't find any major feature missing or lacking in Check Point products that we used. We'd just like them to continue to improve their products with new features and updates. 

We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners.

The Check Point SandBlast platform could also be merged with the Check Point GAIA platform for a central management console and easier controls.

For how long have I used the solution?

I've used the solution for more than ten years.

What do I think about the stability of the solution?

The solution is very stable compared to peers.

What do I think about the scalability of the solution?

The solution is highly scalable.

How are customer service and support?

Technical support is satisfactory, however, it takes some time to escalate your ticket.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did use Sophos and Cisco ASA, however, they were either complicated products to manage or lacked features.

How was the initial setup?

The initial setup wasn't difficult after you attended free platform support sessions by Check Point.

What about the implementation team?

We handled the initial setup in-house.

Which other solutions did I evaluate?

We evaluated Sophos, Cisco ASA, SonicWall, and FortiGate.

Which deployment model are you using for this solution?

On-premises


    reviewer1298643

Good support, minimizes threats, and offers complete endpoint security

  • October 11, 2023
  • Review provided by PeerSpot

What is our primary use case?

One of the recent use cases for this solution has been related to a power company, which was facing issues but was able to get its infrastructure secured and get back its business continuity and growth. In addition, its management was able to get back its confidence with solutions or services provided by Check Point.

The client was able to quantify its security elements. As a result, a strong defensive framework was developed. Deployment of Check Point's solution resulted in the evasion of any existing and potential threats.

How has it helped my organization?

Check Point is not just a firewall. They deliver everything including IPS, application control, threat emulation and extraction, identity awareness, and more. In line with the quantum security gateways, other elements and services as provided by Check Point have also proven to be very helpful and reliable in keeping the company environment secured. The organization has also gone a great mile to tag itself as a proactive threat elimination expert in the industry viz a viz its competitors.

What is most valuable?

Harmony Endpoint is one of the great solutions by Check Point; it ensures compliance with policies and minimizes the risk of threats entering through endpoints. 

It's a great complete endpoint security solution that prevents the most imminent threats to the endpoint such as ransomware, phishing, or malware. 

It has proved to be very successful in identifying ransomware behaviors such as file encryption or attempts to compromise operating system backups and safely restore ransomware-encrypted files automatically. 

What needs improvement?

While the console and administration work well, they have to work on performance since it consumes a lot of CPU and memory. There is also latency in the administrative panel when entering. There has been a problem with updating licenses as well. There is ground-level feedback based on interaction with the relevant stakeholders that states implementing it would make a major difference in the overall experience.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

The solution has not caused major deviations and the historical experience has been quite good. The stability and reliability of the solution is pretty much appreciated

What do I think about the scalability of the solution?

The overall impression of the scalability is good and impressive.

How are customer service and support?

Technical support has been pretty good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have been involved with a lot of other partners in parallel, depending on the requirements of the customers.

How was the initial setup?

I am not directly involved in the setup and deployment of the product.

What about the implementation team?

The implementation was handled by an in-house team.

What was our ROI?

I've witnessed an ROI of 25% to 30%.

What's my experience with pricing, setup cost, and licensing?

Users should actively evaluate the existing options available in the market and finalize the one that matches their requirements, budget, and priorities. Check Point can definitely be considered based on my personal experience.

Which other solutions did I evaluate?

The choice to evaluate would not be my personal decision but the requirement raised by the customers.

Which deployment model are you using for this solution?

On-premises


    Mark Logue

Enterprise level scalability and meeting all the PCI guidelines regulating financial market players

  • October 05, 2023
  • Review provided by PeerSpot

What is our primary use case?

Our use cases are protection infrastructure in a financial corporate environment.

How has it helped my organization?

Check Point firewalls meet all the PCI guidelines that regulate players in the financial market.

What is most valuable?

The support is pretty incredible.

What needs improvement?

There is room for improvement in reliability. 

For how long have I used the solution?

I have been using this solution for ten years. I worked from version 840 to 8120.

What do I think about the stability of the solution?

I would rate the stability a six out of ten.

What do I think about the scalability of the solution?

It is very scalable. I would rate the scalability for this solution a ten out of ten.

Which solution did I use previously and why did I switch?

I initially took Cisco training for routers, switches, and firewalls. I did actually work up the Cisco firewalls long enough to convert them to Check Point.

How was the initial setup?

The initial setup was complex. But that was really the fault of Check Point just because we deployed it into the Google Cloud environment, and their environment is a little different.

We have security management deployed on-premises and on the cloud.

What's my experience with pricing, setup cost, and licensing?

The pricing is about par for the enterprise-class firewalls.

Which other solutions did I evaluate?

Palo Alto and Cisco. And the reason for going with this solution was the price.  So, with Cisco, it was priced. We actually checked the overall price of the cost of ownership. When you talk about support costs and everything else, was cheaper than Cisco. And with Palo Alto, also had reliability issues that could not be overcome by their support.

What other advice do I have?

I definitely recommend it, but unless you're fully trained and experienced on Check Point, you should get the better support program. 

Check Point has support rep programs that go all the way up to putting one of their own people in your business to help you. Then, they have support programs. If you're an expert, you just need to be able to download updated files and stuff. They have support programs like that, too. The worst possible situation is if somebody isn't really skilled with the thing and they cheap out on the support program, and they'll just flounder.

Overall, I would rate the solution an eight out of ten.


    Richard Lachira

Enhanced security with centralized control for threat prevention

  • October 05, 2023
  • Review provided by PeerSpot

What is our primary use case?

Check Point plays a crucial role in enhancing our security firewall solution in our company. It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering.

What is most valuable?

The most valuable feature for me is the firewall. Whether it's five stars or even higher, the analytics reports it provides are truly impressive. They offer valuable Key Performance Indicators (KPIs) that shed light on various situations and different logs.

What needs improvement?

They could offer educational courses to help individuals improve their knowledge and skills.

For how long have I used the solution?

I have been working with it for two years now.

What do I think about the stability of the solution?

It provides good stability features. I would rate it eight out of ten.

What do I think about the scalability of the solution?

I would rate its scalability capabilities nine out of ten.

Which solution did I use previously and why did I switch?

In my previous company, I had experience using Fortinet and Palo Alto.

How was the initial setup?

I find that the setup process is somewhat distinct from other solutions. I believe that having some guidance from the website or tutorials would make it easier.

What other advice do I have?

I strongly recommend this solution because it's a highly effective and reliable choice. I would rate it nine out of ten.

Which deployment model are you using for this solution?

On-premises


    Bharath Kumar Gajula

An expensive solution with easy life cycle management

  • October 03, 2023
  • Review provided by PeerSpot

What is our primary use case?

We use Check Point Security Management for firewall management.

What is most valuable?

The solution is easy to use and comes with few vulnerabilities. You don't have to worry about release upgrades. Life cycle management is very easy. 

What needs improvement?

Check Point Security Management lacks some of the competitor features. 

For how long have I used the solution?

I have been using the solution for six years. 

What do I think about the stability of the solution?

Check Point Security Management is stable. 

What do I think about the scalability of the solution?

We have around 4,500 users for the product.  

How are customer service and support?

Check Point Security Management doesn't have good support since it is difficult to get the right person. 

How would you rate customer service and support?

Neutral

What's my experience with pricing, setup cost, and licensing?

The solution is expensive. 

Which deployment model are you using for this solution?

On-premises


    LucianoMiguel

A highly accessible and fast tool that provides a very good technical support

  • June 26, 2023
  • Review provided by PeerSpot

What is our primary use case?

I use it for managing ten clusters in our on-premise environment. With this kind of management, it's possible to question its policy and change many configurations in the files. With its management, we got all the logs from the environment. With Check Point Security Management, we get the benefits of deploying the configuration.

How has it helped my organization?

Owing to the availability of many kinds of incidents, I can say that the solution has served to improve my organization.

What is most valuable?

Regarding the tool's valuable features, I would say that Check Point is a very accessible and fast tool, especially when dealing with logs for the first time. It is a perfect solution for me.

What needs improvement?

From the Check Point Security Management solution, it's possible to get the situation of my clusters. I guess it lacks in providing visibility of the many incidents. Hence, the visibility of incidents is an area where I want the solution to improve.

For how long have I used the solution?

I have been using Check Point Security Management since 2005, so I have used it for maybe twenty years. Also, I am using Check Point Security Management E84.20.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a ten out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a ten out of ten.

How are customer service and support?

The solution's technical support is very good. Hence, I rate the technical support a ten out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The solution's initial setup was easy.

What was our ROI?

It took a year to see a return on investment. I did experience a return on investment using the solution.

What's my experience with pricing, setup cost, and licensing?

Price-wise, it is an expensive solution.

What other advice do I have?

I recommend the solution to those planning to use it.

I rate the overall product between nine to ten out of ten.

Which deployment model are you using for this solution?

On-premises


    Computer & Network Security

For PCI compliance, Check point is Excelent!!

  • October 26, 2021
  • Review provided by G2

What do you like best about the product?
One of the best thing is that we can get more details of each firewall by getting important data such as security overview, security modules, violations, etc., and the coolest thing is that you can print a report in case that is needed
What do you dislike about the product?
It is a little complecated if you want to create your charts or customize your outputs because if you don't have a good idea of what are you doing, you can get lost during the chart creation
What problems is the product solving and how is that benefiting you?
As a PCI compliance corporation, it has been beneficial to share any report needed


    Banking

complete compliance and security suite for check point environment

  • October 14, 2021
  • Review provided by G2

What do you like best about the product?
It's straightforward to use. Price is low compared to other solutions. Many times it is bundled with the initial purchase. There's no need for additional Hardware and Solution required to configure the compliance. You can get the output of the compliance results very quickly. Similar vendors do not have this solution. They are trying the cover the gap throughout the reporting modules or dashboards. Solutions is interactive. This interaction and real time features help the firewall admins to quickly see the operational and logical mistakes while maintaning the daily security activities. Findings screen is interactive where you can jump on the item and solve the issue within a click.
What do you dislike about the product?
It's unique to Checkpoint. Well, Checkpoint had acquired the easy2comply solution in 2011. Then it' had customized this solution for Checkpoint firewalls. However, while it's made the acquisition, some of easy2comply features have been dropped. Why I'm mentioning this because we had an old Dynasec customer. Therefore we had used the solution for overall compliance. Current Checkpoint compliance is just for the Checkpoint firewalls. You can't use the solution for other security components. Some of the problems related to the compliance solutions is the roadmap and workflow entegrations. Product does not have the user defined networking security where you define the critical zones and traffic flow.
What problems is the product solving and how is that benefiting you?
As for the financial companies, you should be align with the regulations. Checkpoint compliance is ensuring us to be compliant with these regulations. Throughout the audit, auditors analyze the compliance module outputs. Therefore this product is assisting the auditors as well as firewall administrators. As there are already defined regulations checks on the solutions, I do not need to know or define every mapped item.
Recommendations to others considering the product:
It's not well suited for a hybrid environment where you have several different vendors. You need to enable the solution to start monitoring. Default installations do not have the solution to be enabled and started. Enable the reporting to get the results. Otherwise, you need to log in open the compliance view, and see the results. It's not a product like let it run and see the results. It's a dynamic solution and needs constant attention to achieve the best results.