My main use case for Check Point Security Management is as a firewall. I have connected it in my office premises as a firewall. The people who connect to the internet in the internal network have their packet captures go through the firewall itself, ensuring everything is safe and secure.
Check Point Security Management
Check Point Software TechnologiesExternal reviews
External reviews are not included in the AWS star rating for the product.
Improved organizational security and efficiency with intuitive management
What is our primary use case?
What is most valuable?
The best feature Check Point Security Management offers is the GUI. The GUI shows everything in different categories such as mobile phones, connected devices, laptops, and desktops. It displays everything in different dashboards, making it easy to understand what is connected to what.
Having that dashboard helps me in my day-to-day work because it saves time. It shows all the devices that have been connected and how many devices are connected in different ways. Through this, I am able to track how many laptops and mobile phones have occupied my IP addresses.
What needs improvement?
If I had to pick one thing that could make my experience even better, I would say they need to change the support resolution time. Everything else meets expectations.
For how long have I used the solution?
I have been using Check Point Security Management for 1.8 years.
What do I think about the stability of the solution?
Check Point Security Management is stable in my experience with no downtime.
What do I think about the scalability of the solution?
Regarding scalability, I have given the rating of nine out of ten. The support is the only aspect having a glitch; everything else is satisfactory.
How are customer service and support?
I choose a nine out of ten specifically because sometimes the support has a glitch.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I used a different solution before but prefer not to disclose that name. Currently, there are no issues with anything, and everything is functioning properly.
What was our ROI?
I have seen a hundred percent return on investment with Check Point Security Management.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing for Check Point Security Management is positive. The products they provide from Check Point are reasonably priced and satisfactory.
Which other solutions did I evaluate?
Before choosing Check Point Security Management, I did not evaluate other options. I chose only one option, which is Check Point.
What other advice do I have?
My advice to others looking into using Check Point Security Management is to ask all vendors and customers to take the demo for five to 10 times. After ensuring it is supported by their organizations, then proceed forward. I rate Check Point Security Management a nine out of ten.
Which deployment model are you using for this solution?
Unifies security policies and streamlines rule updates across sites
What is our primary use case?
My main use case for Check Point Security Management is to unify firewall and threat prevention policies across multiple international sites, so I use SmartConsole to streamline rule updates and monitor security events in real-time.
What is most valuable?
The best features Check Point Security Management offers me are unified management console, automated policy management, and real-time monitoring and reporting.
Check Point Security Management has positively impacted my organization by providing centralized control, allowing us to manage all security policies and gateways from a single console, reducing complexity and saving time, and by enabling faster policy updates, which allowed quicker roll-out of rule changes across multiple sites, improving agility and reducing configuration errors.
What needs improvement?
I see areas of improvement for Check Point Security Management such as GUI stability and performance, and simplified firmware upgrades.
I and my colleagues occasionally report glitches or missing data views with the GUI stability and performance issues, and sometimes SmartConsole crashes.
The main things regarding needed improvements are GUI stability and performance, and there is no need to add more.
For how long have I used the solution?
I have been using Check Point Security Management for five to six years.
What do I think about the stability of the solution?
Check Point Security Management is stable, although sometimes it is not.
What do I think about the scalability of the solution?
Check Point Security Management is scalable.
How are customer service and support?
The customer support for Check Point Security Management is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I did not previously use a different solution before Check Point Security Management.
What was our ROI?
I have seen a strong ROI from using Check Point Security Management through unified policy management, reduced misconfigurations, and faster incident response.
Which other solutions did I evaluate?
I did not evaluate other options before choosing Check Point Security Management.
What other advice do I have?
My advice for others looking into using Check Point Security Management is that if you manage complex or multi-site networks, it is a powerful tool for centralizing control and improving security consistency.
I don't have specific metrics or examples of time saved, fewer errors, or other measurable benefits.
I don't have information regarding pricing, setup cost, and licensing.
My company does not have a business relationship with this vendor other than being a customer.
I was offered a gift card for this review.
On a scale of one to ten, I rate Check Point Security Management an eight.
Which deployment model are you using for this solution?
Enhanced Internal Security and Efficiency
What is our primary use case?
My main use case for Check Point Security Management is using it as a firewall, which ignores all my data threats, and it is useful to secure my inside IT infrastructure. It secures all the data and all the devices connected to the network. Actually, this is not the one I selected; I used Check Point 1800 Quantum Spark, which is not available in your content sharing, and for that reason, I selected this one.
What is most valuable?
Check Point Security Management helps with my daily operations as I use Check Point 1800, which is connected to the internet and all the networks. Nearly 200 to 350 people connect to the inside internet, and my ISP is connected to the firewall, which gives internet access to all the access points. Everyone who connects their laptop, mobile devices, or any kind of device with internet facility is secured because Check Point has internal visibility into end threats and will not allow any other DNS inside. Whenever any unauthorized access occurs with the devices, it gives me a pop-up, and I immediately go and block them. Check Point Security Management is very useful when compared to other devices.
One specific situation where Check Point Security Management really helped me catch or block a threat is its best feature: it segregates all the devices such as mobile devices, phone devices, tablets, smartwatches, laptops, and desktops. It shows each and everything in a segregation method. I have an old device as well, which shows everything in a single line, making it difficult to identify which one is a phone device and which one is a laptop. Check Point Security Management does not operate like that; it shows the mobile device, tablet, smartphone, laptop, and desktop separately so that I can easily find out how many desktops are connected, how many mobile devices are connected, and I can easily block mobile devices and free up the IPs. This is the main beautiful thing about Check Point 1800 Quantum Spark.
What needs improvement?
Check Point Security Management can be improved by addressing a negative challenge I face: sometimes it does not show internet utilization in the GUI. When I ask support, they tell me to upgrade the firmware, which happens quite frequently. Since I deployed the device in my on-premises environment 1.5 years ago, I have experienced this issue three times.
Check Point Security Management has not impacted my daily work or decision-making in any negative way. As an IT person, I occasionally need to check how much internet bandwidth has been used in the internal network over the past month, day, or week. During those times, when I open the data utilization column, it shows nothing available. Each time this happens, I need to upgrade to the latest version of the firmware, and this frequent updating affects my productivity negatively. If Check Point addresses this issue in the future, it will be beneficial for all customers using Check Point SMBs.
For how long have I used the solution?
I have been using Check Point Security Management for the past 1.5 years.
What do I think about the stability of the solution?
In my environment, Check Point Security Management is stable, as I do not see any downtime. The only issue I face is with data utilization not showing, which I have mentioned previously. Other than that, everything is going well.
What do I think about the scalability of the solution?
Check Point Security Management's scalability is quite sufficient for my organization with below 500 employees, and it functions very smoothly. Currently, it handles the network well, and I am unsure if the Check Point 1800 will work adequately if my organization increases from 500 to 600 employees, but so far, it has been functioning smoothly without any issues in the past 1.5 years.
How are customer service and support?
I would rate the customer support for Check Point Security Management as four out of five, or seven out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I previously used a different solution before Check Point Security Management, but I do not want to disclose the product name due to marketing strategies. I switched because that device hung every time when connecting to the network; it could only support 40 to 50 users, while my organization had 150 users when I joined.
How was the initial setup?
The initial setup with Check Point Security Management is very straightforward and easy; we implemented the tools within a six-hour timeframe.
What was our ROI?
I have seen a return on investment with Check Point Security Management, as my security concerns regarding data production have been greatly diminished, and my time is also saved. Additionally, my reports that I send to management monthly are automated, which also saves time.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup costs, and licensing for Check Point Security Management involves a bit of a challenge in pricing, as it is somewhat costlier than previous devices. However, it is worth paying extra for this product.
Which other solutions did I evaluate?
Before choosing Check Point Security Management, I evaluated other options including the same device I had earlier but in a newer version. I found that the latest version and Check Point 1800 have multiple variations and use cases. We checked three other devices as well, which could not match the capabilities of Check Point 1800 due to its significant improvements and multiple use cases. That is why we chose Check Point Security Management for our internal IT infrastructure.
What other advice do I have?
I save significant time with the alert system and device management because it provides data in graphs and reports. Whenever a data threat arises, it alerts me when the threat comes inside the device or from the devices to the inside network. I receive alerts and block that device, preventing the threat from affecting the entire network. This is one of the positive aspects of the Check Point 1800 device.
My advice to others looking into using Check Point Security Management is to first assess your organization's needs regarding how many people will connect to the internal network. This decision depends on that number. If you have more than 500 or 550 people, please check whether this solution will be effective for you. It's important to take demos a few times from Check Point vendors or directly from Check Point before making a purchase.
I rate Check Point Security Management eight out of ten.
Which deployment model are you using for this solution?
Helps us secure our organization effectively
What is our primary use case?
We work with multiple security tools, including network security and information security solutions. Our primary use case includes using Check Point and other tools like CyberArk for privilege access management, Cisco, and WebSight CloudSec.
How has it helped my organization?
The product helps in securing our complete organization. We have not received any alerts that were suspicious, which assures us that it's working as expected.
What is most valuable?
It's already helped secure our organization effectively. That said, the integration of all the firewalls should be centralized, which would make management easier.
What needs improvement?
We are not sure if there is a centralized security console available. It would be beneficial if all firewalls could be integrated under one management console.
For how long have I used the solution?
We have been using the firewall for more than ten years.
What do I think about the stability of the solution?
We are confident in the security solution as we have not faced any alerts that were suspicious.
How are customer service and support?
We have partner support that helps us mitigate vulnerabilities reported by our infrastructure team. Most of the time, we get good support.
How would you rate customer service and support?
Neutral
How was the initial setup?
The first deployment takes two to three days. After setup, maintenance and updates are straightforward.
What's my experience with pricing, setup cost, and licensing?
Since we are using it extensively, we get significant discounts during procurement. The tool is cost-effective.
What other advice do I have?
I'd rate the solution eight out of ten.
Centralized logging and management with easy enabling/disabling features
What is our primary use case?
The Security Management server provides centralized management to manage all the security gateways.
Many organizations will have more than one firewall. This may be in the same location or in a different location. Users can manage all the firewalls from a single location.
It provides centralized logging for all incoming and outgoing traffic.
How has it helped my organization?
The solution centralizes licensing and auto-licensing with smart updating.
In organizations where there are many firewalls, one firewall license may expire. We can easily update licenses from the smart console from the same location or from different locations.
It also provides centralized logging that helps during troubleshooting - which provides detailed logging of access rules, NAT rules, application filters, VPNs, etc.
What is most valuable?
The centralized logs and management are helpful. All of the logs are stored in an external server or within the Management Server. All of the logs are very easy to understand and provide detailed information about the instance.
Through the Management Server we can easily enable all the features and easily disable them as well.
What needs improvement?
Check Point offers PS services in India. As per personal experience and based on many organizations, Check Point needs to improve PS services.
For how long have I used the solution?
For the past one and a half years, I have been using a Check Point Firewall and Check Point Management Server.
What do I think about the stability of the solution?
The stability is the best.
What do I think about the scalability of the solution?
I am satisfied with the scalability.
How are customer service and support?
So far, there is no point reach out to technical support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
No, we have not selected any other solution.
How was the initial setup?
As a Check Point implementation engineer, I found the setup process easy.
What about the implementation team?
The vendor expertise is very good.
What's my experience with pricing, setup cost, and licensing?
The licensing price is a bit expensive. However, it provides very good security at the perimeter level.
Which other solutions did I evaluate?
No, we have not evaluated other options.
What other advice do I have?
They just need to improve PS service in India.
Which deployment model are you using for this solution?
Offers firewall and endpoint security that improves the business security posture
What needs improvement?
To make the tool better, I think we could have some sort of analysis similar to how some products offer information related to social media sentiments. If we could get that kind of assessment, some sort of analysis of some sort, I think that would be something that can really improve the solution.
In the future, I would like to see more frequent updates because of the changing security landscape. We should be seeing more updates in the tool, especially those that are not paid. The tool can also put in efforts in terms of maybe the community by conducting some sort of workshop or some sort of online event to bring the community together so that we can all meet. A community portal is needed.
For how long have I used the solution?
I have been using Check Point Security Management for five years.
What do I think about the stability of the solution?
Stability-wise, I rate the solution a nine to ten out of ten, especially for the cloud version. The on-premises version was a bit unstable, and I think I will give stability a ten out of ten.
What do I think about the scalability of the solution?
Speaking about scalability, in terms of maturity, product security, and reliability, I would rate the tool an eight out of ten.
Around 200 to 250 people in my company use the tool.
How are customer service and support?
I have experience with the solution's technical support, and I don't think the product is doing well. We have to reach out to the first level of support and then to the third level of support. I rate the technical support a six out of ten.
How would you rate customer service and support?
Neutral
How was the initial setup?
The product's initial setup phase had no problems.
The product's installation phase was easy. The moment we transitioned from on-prem to the cloud, we realized that the on-prem version was a bit more difficult to use, and the cloud version was easier because it has some sort of configuration wizard. The provisioning was easy.
The solution is deployed on the private cloud version offered by AWS, but we use it across the company's group, and it is hosted in South Africa.
The solution can be deployed in an hour and a half. The deployment phase was not so bad.
I was not involved in the deployment since I had my tech team with 12 security engineers for it who can take care of the product and the firewall. My company's IT department has around 30 technical members but only 12 take care of information security matters associated with the tool.
What was our ROI?
In terms of the tool's financial and commercial aspects, we do a risk assessment every quarter. There is a huge cycle of risk assessment every quarter. As a part of risk assessment, Check Point reviews threats. When the risk team comes, it assesses the group. They give us some values about the threats that we are facing. They explain that since implementing the solution, this is the threat, and this is the value. Some empirical data is used.
What's my experience with pricing, setup cost, and licensing?
Honestly, the tool is expensive. It's a good product, so definitely, it is expensive. I realized that the tool is a bit more expensive than the rest, at over 20 to 30 percent overall. If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten. There are so many other products out there that are more expensive than Check Point. There are also so many other products that are cheaper than Check Point.
Which other solutions did I evaluate?
Over the other tools in the market, my company chose Check Point even if it is a bit pricey, but it fits the bill. From a business requirements point of view, it fits the bill. With the tool, we have been able to restructure our infrastructure in terms of the IT landscape. We are also able to bring policies without any fear of infiltration. In a nutshell, it fits before a business case.
What other advice do I have?
Check Point Security Management streamlines operations in our specific industry. We used to have a lot of instances, but because of the alerts that come from the kind of configuration the solution offers, we are now able to take care of instances even before they happen. Basically, the tool has really helped us reduce instances by about 40 to 50 percent.
The tool has a firewall and endpoint security to improve our company's security posture, especially for our mobile devices. Our company has a sort of principle where there is a need to bring your own device, so it is used to take care of things in terms of security. The security team within our department escalates things quickly.
Speaking about threat prevention in our daily operations, I would say that before the tool's implementation, we used to report a loss of about 50,000,000 dollars, but it has now gone down after the product was installed. It looks like it has helped capture those threats, alert in advance, and anomaly detection. It has been a very helpful product.
Speaking about the influence of Check Point Security Management on our IT infrastructure, I would say that we have implemented the product across endpoints, including mobile devices and devices that fall under the BYOD category. With Check Point, we were able to implement and allow our staff to bring their devices and work from wherever they want. Without Check Point, we would not have been able to do so, and that changes the landscape and trims down on the devices that we would have been acquiring centrally for our staff.
My company started the analysis on AI and areas like trends. The trends, especially transactional trends and all that kind of thing, are areas where we have already started some use cases for AI, about five of them, and I think the engine is still in the learning phase. I would say that we haven't really started using AI, but we already have it set up in Check Point, and it will be around the area associated with trends. Basically, we have not really explored the AI part yet.
I recommend the tool to others.
The tool's maintenance is done automatically on the cloud. When we were using the tool's on-prem version, we were happy to offer support for the product in our company.
I rate the tool an eight out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Securely manage and deploy configurations to firewall devices with IPS protection
What is our primary use case?
The main function is to securely manage and deploy configurations to firewall devices and logs through its security management console. We configure and test all settings within the security manager and subsequently push these configurations to the relevant firewall devices.
How has it helped my organization?
Check Point Security Management in cloud environments focuses on securing cloud services and managing traffic within the cloud environment. Network security typically involves managing Layer 3 to Layer 4 services. Access Control Lists are used to secure network access.
What is most valuable?
It offers numerous features and blades, including intrusion prevention (IPS) and malware detection. It excels in network security and VPN capabilities, including IPSec VPNs. IPS is particularly powerful due to its signature-based detection, which automatically checks for and identifies malicious software.
What needs improvement?
Check Point is highly regarded for its effectiveness and the three-layer architecture for security, comprising the client, Security Management, and secure management console, integrated with firewall capabilities. This architecture differentiates it from other security solutions like Palo Alto, Cisco, and FortiGate. Our files are more secure against potential compromises with three layers, as configurations are managed centrally on the Management servers. The SmartConsole facilitates easy configuration and management, aligning with modern automation trends. Integrating Check Point with AI and API security features enhances its effectiveness and user-friendliness. Customizable logs tailored to sources, businesses, and IPs can be automated for delivery via email, ensuring accessibility without needing to log into devices directly.
For how long have I used the solution?
I have been using Check Point Security Management as a partner for ten years.
What do I think about the stability of the solution?
The product is stable. I rate the solution’s stability a ten out of ten.
What do I think about the scalability of the solution?
600 users are using this solution.
I rate the solution’s scalability a ten out of ten.
How are customer service and support?
There are multiple ways to contact Check Point Security Management, such as phone calls, chats, and emails. We receive responses based on the ticket's priority and the business need.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is straightforward and takes three hours to complete. I rate it a ten out of ten, where one is difficult and ten is easy.
What's my experience with pricing, setup cost, and licensing?
The product is a bit expensive. It has yearly licensing, costing around 48 bucks.
What other advice do I have?
It is very effective nowadays due to its ability to provide feedback from DDoS attacks and man-in-the-middle attacks, which are powerful and useful in today's enterprise scenarios. It integrates with various software APIs and provides web firewalls and security, which are crucial in security. These features protect against DDoS attacks, man-in-the-middle attacks, and other implementation vulnerabilities. It provides security and ensures that our services are available 24/7.
I recommend the solution because it is proactive and easy to use.
Overall, I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
Easy to open and edit policies, search within them, and view logs
What is our primary use case?
We utilize the security management solution to oversee all our Check Point products, including firewall, IPS, and antivirus policies. It serves as our primary tool for managing all Check Point devices.
What is most valuable?
Check Point Security Management excels over Forti Management in daily operations, policy management, and graphical interface. It is easy to open and edit policies, search within them, and view logs.
What needs improvement?
The only issue is that, you need to install an application instead of managing it through a browser. Thus, it requires installation. Additionally, it can be slow when multiple users access the manager simultaneously. Even with increased CPU and memory resources, some performance issues may still occur when multiple users check simultaneously.
For how long have I used the solution?
I have been using Check Point Security Management for ten years.
What do I think about the stability of the solution?
Sometimes, we encounter crashes while working on Check Point Security Management, necessitating application restarts. We also face connectivity issues with certain firewalls, making it less stable than other products.
What do I think about the scalability of the solution?
The solution’s scalability is good ; adding more CPUs and memory can give you more gateways.
20 managers are using this solution.
I rate the solution’s scalability a nine out of ten.
How are customer service and support?
We currently have at least two or three cases open, and some are regarding demand. We struggle to find a good engineer who can truly help us instead of just sending some comments for us to run and provide feedback. They need to improve, especially in their initial client support.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is complex.
Compared to Forti Management, Check Point Security Management involves much more work and is more difficult. You need to establish connections to all the firewalls manually, one by one. However, with the function manager, you point the firewall to the manager and accept it on the Management, and it's done. Additionally, you need to manage certificates on Check Point, making the process less straightforward than FortiManager.
You depend entirely on the manager to edit the security gateway policies. If the manager encounters an issue with Fortinet, you can still access the FortiGate and delete policies. In Check Point, you cannot delete firewall policies directly on the firewall itself if you encounter a Management issue.
Deployment, including firewall synchronization, takes about four days to complete.
You usually need to create and use the VM Manager VM. So, you need to deploy the VM, configure the IPs, and install the Check Point console software. Then, you need to perform an SIP IT connection to all the firewalls to manage them. After that, you need to configure the firewall networks and public IPs.
I rate the initial setup as seven out of ten, where one is difficult, and ten is easy.
What's my experience with pricing, setup cost, and licensing?
The product is more expensive than Fortinet. We need to pay the license for the Management. I rate the product’s pricing a seven out of ten, where one is cheap and ten is expensive.
What other advice do I have?
It enhances our daily operational efficiency. Therefore, all management personnel prioritizing working on Check Point policies over Fortinet would benefit. However, maintenance upgrades, backups, snapshots, and synchronization between primary and secondary management can become cumbersome. These tasks tend to be more challenging and time-consuming.
The learning curve for Check Point is quite steep. Sometimes, when we recruit new members to our company, they take a lot of time to understand how our Check Point system works, including the connection between the Management and the firewall, among other components. With Fortinet, it takes only two or three weeks for them to get acquainted with everything. With Check Point, they need at least three months to become accustomed to upgrades, managing policies, and maintenance of the Management system. So, it takes at least three or four times longer than with Fortinet.
AI is essential for correlating logs and presenting the ones that matter. They could strengthen how they present logs by giving more attention to the ones that matter most.
Check Point is easy to use, allowing users to drag and drop objects effortlessly. However, it's essential to note that deploying and maintaining the solution may require a bit more expertise than some competitors.
Overall, I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
Centralized management, intuitive user interface, and comprehensive security features
What is our primary use case?
Check Point Security Management Server is a comprehensive solution designed to streamline and centralize the management of security policies across an organization's network infrastructure.
One of the standout features of the Check Point Security Management Server is its ability to manage security policies across multiple Check Point security gateways centrally. This centralized approach simplifies policy deployment, monitoring, and updates, making it easier for administrators to maintain a consistent security posture.
How has it helped my organization?
The Check Point Security Management Server has the ability to centrally manage security policies across multiple Check Point security gateways. This centralized approach simplifies policy deployment, monitoring, and updates, making it easier for administrators to maintain a consistent security posture.
It offers high-performance capabilities to handle large volumes of traffic while maintaining low latency, ensuring minimal impact on network performance. This product greatly improved our company customers and allowed us to implement the solution easily.
What is most valuable?
The most valuable aspects of the solution are:
1. Centralized Management: It can centrally manage security policies across multiple Check Point security gateways. This centralized approach simplifies policy deployment, monitoring, and updates, making it easier for administrators to maintain a consistent security posture.
2. Intuitive User Interface: The management console provides an intuitive user interface that allows administrators to configure and monitor security policies with ease. The interface is well-designed, with clear navigation and comprehensive options for managing security rules, network objects, and logs.
3. Comprehensive Security Features: Check Point Security Management Server offers a wide range of security features, including firewall, intrusion prevention, VPN, application control, and threat prevention capabilities. These features work together to provide multi-layered protection against various cyber threats.
What needs improvement?
Check Point Security Management Server integrates seamlessly with other Check Point security products, providing a cohesive security ecosystem for organizations. It also offers compatibility with third-party security solutions, however, it is not a lot. This needs to be improved.
Check Point offers comprehensive product support and documentation, including online resources, knowledge bases, and technical support services. This ensures that administrators have access to the assistance they need to deploy and maintain the Security Management Server effectively, but when customers raise issues, the support is not satisfactory and timely.
For how long have I used the solution?
I've used the solution for more than one and a half years.
Alert classifications help prioritize critical issues
What is our primary use case?
We utilize Check Point Security Management for our daily security operations, including managing firewall rules, reviewing alerts, and generating reports on a weekly basis.
How has it helped my organization?
We've integrated Check Point Security Management with some of our business associates' portals for HR, finance, and payroll activities, which are outsourced. Check Point alarms us about any version changes on these sites, allowing us to block unauthorized changes. So far, we haven't encountered any serious incidents that require immediate action. We receive incident reports, but they usually involve blocked or quarantined threats rather than major security breaches. Additionally, our internal management console provides us with alerts, adding another layer of security monitoring.
What is most valuable?
Over the past 1.5 years, we've started monitoring it more regularly, analyzing alerts closely. The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as TLS violations or content violations.
While we use a cloud-based Security Control console, we primarily conduct in-depth analysis of reports on a weekly basis to enhance our security posture.
What needs improvement?
Check Point EDR has room for improvement, especially in the area of Data Loss Prevention where it currently lacks functionality.
I'd also like to see enhancements in content filtering and categorization features.
I would appreciate the ability to restrict forwarding of confidential documents to specific groups, ensuring tighter security measures.
For how long have I used the solution?
I have been using Check Point Security Management for the past 1.5 years.
What do I think about the stability of the solution?
I would rate the stability 9 out of 10.
What do I think about the scalability of the solution?
I would rate the scalability 8 out of 10.
How was the initial setup?
We faced issues, but with the help of tech support, it was solved. It took almost one week approximately to set the solution through firewall.
What about the implementation team?
We rely on tech support to enhance our capabilities.
We have a small, focused team of four engineers.
What was our ROI?
Currently, we only use Check Point and are satisfied with its benefits in terms of time-saving and security performance, estimating a 30% time savings.
What's my experience with pricing, setup cost, and licensing?
The pricing can be estimated around 3 or 4 out of 10 in terms of expense.
Which other solutions did I evaluate?
I have evaluated another product before Check Point but found the local account manager to be more aggressive.
What other advice do I have?
I would rate the product overall at 8 out of 10, mentioning that while functionalities are there, improvements could be made to make it more user-friendly for laymen, such as incorporating drag-and-drop functionality.