Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Check Point Security Management

Check Point Software Technologies

Reviews from AWS customer

3 AWS reviews

External reviews

36 reviews
from and

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    reviewer1956864

Has improved daily efficiency by streamlining policy updates and reducing routine task time

  • October 22, 2025
  • Review from a verified AWS customer

What is our primary use case?

The main use case for Check Point Security Management is centralized control of all our security policies and gateways. We use it most often to manage firewall rules, IPS configuration, VPN settings, and threat prevention policies across multiple sites.

A typical task we handle with Check Point Security Management is updating firewall rules across multiple gateways. Before Check Point Security Management, this meant logging into each device separately, applying changes manually, and hoping everything synced correctly. Now with the SmartConsole, we make the change once, validate it with the built-in policy verification, and push it out to all relevant gateways in one go. It's fast, centralized, and reduces the risk of misconfiguration.

What is most valuable?

The best feature of Check Point Security Management is the SmartConsole interface because the GUI is intuitive and powerful, allowing admins to create, modify, and deploy policies quickly.

The part of the SmartConsole interface that stands out most is the policy editor. It's laid out as a spreadsheet, so you can see all your rules at a glance: source, destination, service, action, and comments, without having to click through endless menus. You can drag and drop rules, search instantly, and even simulate changes before pushing them live. That's a huge time-saver and helps avoid mistakes.

Check Point Security Management has had a very positive impact on our organization in terms of efficiency, consistency, and visibility.

What needs improvement?

Check Point Security Management could be improved by enhancing third-party integrations, simplifying policy workflows, and expanding automation and reporting capabilities.

The documentation is detailed, but it can be overwhelming for new users. More interactive tutorials, videos, walk-throughs, and real-world configuration examples would help teams ramp up faster. A community-driven knowledge base with shared best practices and troubleshooting tips would add practical value.

For how long have I used the solution?

I have been using Check Point Security Management for around three years.

What do I think about the stability of the solution?

Check Point Security Management is stable.

What do I think about the scalability of the solution?

Check Point Security Management's scalability is good.

How are customer service and support?

The customer support for Check Point Security Management is great for me. I would rate the customer support an eight on a scale of 1 to 10.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I didn't previously use a different solution before Check Point Security Management.

How was the initial setup?

I have a good experience with the pricing and setup. The licensing covers the features or tools by Check Point Security Management.

What about the implementation team?

I use Azure for purchasing Check Point Security Management through the AWS Marketplace.

What was our ROI?

Tasks updating firewall rules across multiple gateways used to take us two to three hours. Now with the centralized policy management, we can complete them in under 30 minutes. That's a 75% reduction in time for a routine change.

Which other solutions did I evaluate?

I didn't evaluate other options before choosing Check Point Security Management.

What other advice do I have?

Check Point Security Management is a great tool for controlling gateways in a centralized area. On a scale of one to ten, I rate Check Point Security Management an eight.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Niyajuddin Tiwale

Centralized management has improved productivity and streamlined network configuration

  • October 16, 2025
  • Review provided by PeerSpot

What is our primary use case?

Our main use case for Check Point Security Management is to centrally manage our multiple gateways to push any configuration centralized.

What is most valuable?

A standout feature of Check Point Security Management is its user-friendly interface, which is easy to understand, and we can easily generate custom reports to present to our management team.

In terms of custom reporting, we generally generate reports such as top 10 or top 20 users consuming more bandwidth or top 10 risky users, helping us have visibility into users accessing malicious websites or security events that happened recently.

After deploying Check Point Security Management, we improved our productivity by integrating all devices into a single console instead of managing separate log-ins for each branch's gateways, making our admin team's tasks easier.

I have noticed that it has reduced errors because when configuring through the security management, a single configuration is pushed to all gateways, saving time and reducing mistakes.

What needs improvement?

It can be improved because sometimes it lags when accessing the management gateway.

For how long have I used the solution?

I have been with my current organization for more than four years, and I have more than 10 years of experience in this field.

What do I think about the stability of the solution?

Check Point Security Management is stable, but there are some lags.

What do I think about the scalability of the solution?

The scalability is outstanding and handles growth and increased demand very well.

How are customer service and support?

The support team is outstanding, helping us with troubleshooting when we require technical support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Before choosing Check Point Security Management, we evaluated Fortinet.

How was the initial setup?

We have been using Check Point Security Management since the start.

What was our ROI?

After deploying the security management, our time has been saved, and we require fewer engineers, allowing a single team to handle all security gateways, saving costs at the management level.

What's my experience with pricing, setup cost, and licensing?

The setup cost and pricing are a little concerning, but considering the features and stability of the devices, they are outstanding.

What other advice do I have?

If anyone has more than one branch and multiple security gateways, they should definitely consider Check Point Security Management or a cloud-based solution to manage all security gateways easily.

Everything looks perfect right now.

On a scale of 1-10, I rate Check Point Security Management an 8.

Which deployment model are you using for this solution?

On-premises


    Suraj Jv

Central management has simplified policy enforcement and improved reporting

  • October 13, 2025
  • Review provided by PeerSpot

What is our primary use case?

We are using Check Point Security Management to centrally manage and configure the firewalls in our day-to-day operations.

In my scenario, while using Check Point Security Management, there are more than one gateways, so we create policies or any modification regarding IPS or VPNs or application control policies. We centrally enforce all these configurations or modifications from centralized security management.

What is most valuable?

Based on my experience with Check Point Security Management, the best part is that we can enforce all configurations such as firewall policy or application control across all managed gateways. We can also generate compliance reports based on our requirements. We are using this central management for simplified configuration.

The reports generated through Check Point Security Management are very useful for our audit team. Whenever they ask for our logs or reports on network incidents, we generate the reports based on audit requirements and hand them over to our audit team.

With Check Point Security Management, the management of multiple gateways has become very easy and we can easily modify or enforce any changes in our existing configuration. We can also monitor from central, which is very useful.

What needs improvement?

The initial setup of Check Point Security Management is a little bit complex. This process could be made easier so that the configuration or initial setup would be simpler to configure.

For how long have I used the solution?

We have been using Check Point Security Management for more than three years.

What do I think about the stability of the solution?

Check Point Security Management is stable.

What do I think about the scalability of the solution?

The scalability of Check Point Security Management is excellent. We can integrate and manage multiple gateways.

How are customer service and support?

The customer support for Check Point Security Management is good.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We have been using Check Point firewall and Check Point Security Management from the beginning.

We evaluated FortiManager before choosing Check Point Security Management.

How was the initial setup?

The initial setup of Check Point Security Management is a little bit complex. This process could be made easier so that the configuration or initial setup would be simpler to configure.

What about the implementation team?

As the administrator of the central management, I can say that the benefit of using Check Point Security Management includes time saving and fewer resources needed to manage it. This is beneficial for any organization.

What was our ROI?

Using Check Point Security Management has reduced the configuration timeline and helped us easily become compliant with security requirements.

What's my experience with pricing, setup cost, and licensing?

I was not part of the pricing or setup cost decisions.

Which other solutions did I evaluate?

We evaluated FortiManager before choosing Check Point Security Management.

What other advice do I have?

I suggest anyone looking to manage Check Point gateways centrally should consider Check Point Security Management. It is really helpful and time-saving. You can enforce any configuration from central, which will be very helpful and beneficial for any organization. I rate Check Point Security Management 8 out of 10.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other


    Luis Diego Alvarado Diaz

Has improved gateway control and speeds up detection of suspicious activity

  • October 12, 2025
  • Review provided by PeerSpot

What is our primary use case?

I need to use Check Point Security Management because it's necessary for controlling and administering our gateways.

When I need to change different policies in my gateway, I need to go into Check Point Security Management because I need to change and review new different items or objects in my security company.

Another main use case is when I need to review or check different logs, I need to use Check Point Security Management to check.

What is most valuable?

The best features Check Point Security Management offers are its intuitive tools. Around the technology, Check Point Security Management is the best way for controlling my gateways. When I need to use logs, events, and policies, and different things around controlling my gateways, it's very easy to use logs, events, and monitoring in Check Point Security Management. When I need to check different possibilities of hackers or others, it is very intuitive to use these features.

Check Point Security Management has impacted my organization positively because the organization's security and perimeter area is better after using this technology. Two years ago, when I needed to report different activities about suspicious activities, I needed to check faster, and I controlled the situation much faster.

Check Point Security Management offers great features for controlling your gateways.

What needs improvement?

Different features in Check Point Security Management indicate that Check Point needs to create different dashboards and different options to give their clients more creative solutions.

For how long have I used the solution?

I have been using Check Point Security Management for around five years.

What do I think about the stability of the solution?

My experience with Check Point Security Management is very stable. There are no problems with different issues.

What do I think about the scalability of the solution?

Check Point Security Management is very scalable.

How are customer service and support?

My experience with Check Point Security Management's customer support in the past was not the best. However, at this time, the customer support is better.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I only use Check Point.

How was the initial setup?

My experience with Check Point Security Management's pricing is so-so because the license is very high in different products around Check Point. Regarding the setup, it is very easy. Other aspects provide a great experience around this feature.

What about the implementation team?

I need to purchase Check Point Security Management in the Marketplace in Azure.

What's my experience with pricing, setup cost, and licensing?

The price is very high. The license for the different features of Check Point infrastructure is also high.

What other advice do I have?

I need to use Check Point Security Management in my security department and it is a very important tool for us. The support during the years is better than in the past.

In my case, I deploy Check Point Security Management in cloud and on-premises.

On a scale of 1-10, I rate Check Point Security Management a 9 out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Abnet Tsegaye Belay

Has unified access control and policy management while improving operational efficiency

  • September 24, 2025
  • Review provided by PeerSpot

What is our primary use case?

We need central management for our policy, monitoring, and different day-to-day administrative tasks, so Check Point Security Management fits all the requirements for our needs. As we know, Check Point Security Management can be used for central policy management. It is an all-in-one management system. We can manage firewalling, application control, URL filtering, IPS, Anti-Bot, and Threat Emulation. We can unify the rule base and reduce it in one central management console called SmartConsole. That is our main use case for this product.

I can use one console for access lists, application control, managing day-to-day reporting, granular access control, managing large and segmented environments with multiple domains or customers, and integrating threat management with that console. It has summed up the tasks in one console, which is our specific use case.

We can manage one firewall in one site, one cluster in one of our sites, and another cluster in another site with a single console. This feature allows us to manage large and sophisticated management tasks in one console, which is why it is called Multi-Domain Security Management.

What is most valuable?

The granular and general access control allows us to centralize our policy management in one console for firewall, application control, URL filtering, IPS, Anti-Bot, Threat Emulation, and Threat Extraction. It is unified in one console, allowing us to unify the rule base to reduce complexity. These features are beneficial, and the system is scalable.

Administrators are operational, so it creates operational efficiency through faster rollouts of change with policy packages, creating faster and easier operational day-to-day activities.

I strongly admire the compliant support feature. It creates detailed logs, audit trails, and customizable reports. It has excellent reporting features including the threat blades, threat prevention blades, and firewalling blades. I can comply with this and provide it for auditors, which makes it an interesting feature.

What needs improvement?

Performance with logs needs improvement as Check Point Security Management has large-scale environments that need dedicated log servers. If you store logs on the central management server or Check Point SMS, it will create resource-intensive tasks. When the logs are too heavy for the security management server, the CPU spike will be high, causing our management day-to-day activity to lag or become difficult. This needs to be improved. Additionally, the resource demands need improvement. For example, log indexing related to SmartEvent needs strong servers, which should be improved for the future.

For how long have I used the solution?

I have been deploying Check Point Security Management products for almost three years.

What do I think about the stability of the solution?

It is stable for our clients.

What do I think about the scalability of the solution?

It is scalable because it can manage different gateways or different firewalls in different sites. It can be multi-domain Security Management server and can manage large or segmented environments with multiple domains or customers.

Which solution did I use previously and why did I switch?

For management, we did not use another solution. We just used Cisco ASA on that single firewall which can be managed through CLI. We switched from Cisco ASA, but that was not management; it was a firewall.

Which other solutions did I evaluate?

We considered other vendors such as FortiGate and Palo Alto firewalls. We chose Check Point Security Management server because we selected Check Point for our firewall.

What other advice do I have?

I rate Check Point Security Management nine out of ten because it has good features. I decreased one point due to the performance and resource demanding issues on the log indexing, and SmartEvent needs strong servers, which needs to be considered.

It is deployed on-premises and is not costly. The management server can be expensive, but it excels at what it does.

Check Point Security Management server centralizes our policy management by unifying the firewalling features and threat prevention features to manage it in one console. It creates ease and operational efficiency. We save time and increase our day-to-day operational efficiency by removing management complexity.

If you want to centralize your policy management such as firewalling, application control, URL filtering, and different threat prevention features, and unify your rule base to reduce operational complexity, you need to use Check Point Security Management.

Which deployment model are you using for this solution?

On-premises


    San Murthe

Improved organizational security and efficiency with intuitive management

  • August 27, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Security Management is as a firewall. I have connected it in my office premises as a firewall. The people who connect to the internet in the internal network have their packet captures go through the firewall itself, ensuring everything is safe and secure.

What is most valuable?

The best feature Check Point Security Management offers is the GUI. The GUI shows everything in different categories such as mobile phones, connected devices, laptops, and desktops. It displays everything in different dashboards, making it easy to understand what is connected to what.

Having that dashboard helps me in my day-to-day work because it saves time. It shows all the devices that have been connected and how many devices are connected in different ways. Through this, I am able to track how many laptops and mobile phones have occupied my IP addresses.

What needs improvement?

If I had to pick one thing that could make my experience even better, I would say they need to change the support resolution time. Everything else meets expectations.

For how long have I used the solution?

I have been using Check Point Security Management for 1.8 years.

What do I think about the stability of the solution?

Check Point Security Management is stable in my experience with no downtime.

What do I think about the scalability of the solution?

Regarding scalability, I have given the rating of nine out of ten. The support is the only aspect having a glitch; everything else is satisfactory.

How are customer service and support?

I choose a nine out of ten specifically because sometimes the support has a glitch.

How would you rate customer service and support?

Which solution did I use previously and why did I switch?

I used a different solution before but prefer not to disclose that name. Currently, there are no issues with anything, and everything is functioning properly.

What was our ROI?

I have seen a hundred percent return on investment with Check Point Security Management.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for Check Point Security Management is positive. The products they provide from Check Point are reasonably priced and satisfactory.

Which other solutions did I evaluate?

Before choosing Check Point Security Management, I did not evaluate other options. I chose only one option, which is Check Point.

What other advice do I have?

My advice to others looking into using Check Point Security Management is to ask all vendors and customers to take the demo for five to 10 times. After ensuring it is supported by their organizations, then proceed forward. I rate Check Point Security Management a nine out of ten.

Which deployment model are you using for this solution?

On-premises


    Mohammad Taleb

Unifies security policies and streamlines rule updates across sites

  • July 27, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Security Management is to unify firewall and threat prevention policies across multiple international sites, so I use SmartConsole to streamline rule updates and monitor security events in real-time.

What is most valuable?

The best features Check Point Security Management offers me are unified management console, automated policy management, and real-time monitoring and reporting.

Check Point Security Management has positively impacted my organization by providing centralized control, allowing us to manage all security policies and gateways from a single console, reducing complexity and saving time, and by enabling faster policy updates, which allowed quicker roll-out of rule changes across multiple sites, improving agility and reducing configuration errors.

What needs improvement?

I see areas of improvement for Check Point Security Management such as GUI stability and performance, and simplified firmware upgrades.

I and my colleagues occasionally report glitches or missing data views with the GUI stability and performance issues, and sometimes SmartConsole crashes.

The main things regarding needed improvements are GUI stability and performance, and there is no need to add more.

For how long have I used the solution?

I have been using Check Point Security Management for five to six years.

What do I think about the stability of the solution?

Check Point Security Management is stable, although sometimes it is not.

What do I think about the scalability of the solution?

Check Point Security Management is scalable.

How are customer service and support?

The customer support for Check Point Security Management is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I did not previously use a different solution before Check Point Security Management.

What was our ROI?

I have seen a strong ROI from using Check Point Security Management through unified policy management, reduced misconfigurations, and faster incident response.

Which other solutions did I evaluate?

I did not evaluate other options before choosing Check Point Security Management.

What other advice do I have?

My advice for others looking into using Check Point Security Management is that if you manage complex or multi-site networks, it is a powerful tool for centralizing control and improving security consistency.

I don't have specific metrics or examples of time saved, fewer errors, or other measurable benefits.

I don't have information regarding pricing, setup cost, and licensing.

My company does not have a business relationship with this vendor other than being a customer.

I was offered a gift card for this review.

On a scale of one to ten, I rate Check Point Security Management an eight.

Which deployment model are you using for this solution?

On-premises


    Pravir KumarSinha

Helps us secure our organization effectively

  • November 11, 2024
  • Review provided by PeerSpot

What is our primary use case?

We work with multiple security tools, including network security and information security solutions. Our primary use case includes using Check Point and other tools like CyberArk for privilege access management, Cisco, and WebSight CloudSec.

How has it helped my organization?

The product helps in securing our complete organization. We have not received any alerts that were suspicious, which assures us that it's working as expected.

What is most valuable?

It's already helped secure our organization effectively. That said, the integration of all the firewalls should be centralized, which would make management easier.

What needs improvement?

We are not sure if there is a centralized security console available. It would be beneficial if all firewalls could be integrated under one management console.

For how long have I used the solution?

We have been using the firewall for more than ten years.

What do I think about the stability of the solution?

We are confident in the security solution as we have not faced any alerts that were suspicious.

How are customer service and support?

We have partner support that helps us mitigate vulnerabilities reported by our infrastructure team. Most of the time, we get good support.

How would you rate customer service and support?

Neutral

How was the initial setup?

The first deployment takes two to three days. After setup, maintenance and updates are straightforward.

What's my experience with pricing, setup cost, and licensing?

Since we are using it extensively, we get significant discounts during procurement. The tool is cost-effective.

What other advice do I have?

I'd rate the solution eight out of ten.


    Dhiren

Centralized logging and management with easy enabling/disabling features

  • July 31, 2024
  • Review provided by PeerSpot

What is our primary use case?

The Security Management server provides centralized management to manage all the security gateways.

Many organizations will have more than one firewall. This may be in the same location or in a different location. Users can manage all the firewalls from a single location.                                    

It provides centralized logging for all incoming and outgoing traffic.

How has it helped my organization?

The solution centralizes licensing and auto-licensing with smart updating. 

In organizations where there are many firewalls, one firewall license may expire. We can easily update licenses from the smart console from the same location or from different locations.                                               

It also provides centralized logging that helps during troubleshooting - which provides detailed logging of access rules, NAT rules, application filters, VPNs, etc.                                                                                                              

What is most valuable?

The centralized logs and management are helpful. All of the logs are stored in an external server or within the Management Server. All of the logs are very easy to understand and provide detailed information about the instance. 

Through the Management Server we can easily enable all the features and easily disable them as well. 

What needs improvement?

Check Point offers PS services in India. As per personal experience and based on many organizations, Check Point needs to improve PS services. 

For how long have I used the solution?

For the past one and a half years, I have been using a Check Point Firewall and Check Point Management Server.

What do I think about the stability of the solution?

The stability is the best.

What do I think about the scalability of the solution?

I am satisfied with the scalability.

How are customer service and support?

So far, there is no point reach out to technical support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No, we have not selected any other solution.

How was the initial setup?

As a Check Point implementation engineer, I found the setup process easy. 

What about the implementation team?

The vendor expertise is very good.

What's my experience with pricing, setup cost, and licensing?

The licensing price is a bit expensive. However, it provides very good security at the perimeter level.

Which other solutions did I evaluate?

No, we have not evaluated other options.

What other advice do I have?

They just need to improve PS service in India.

Which deployment model are you using for this solution?

On-premises


    Joachim Kinyua

Offers firewall and endpoint security that improves the business security posture

  • July 13, 2024
  • Review from a verified AWS customer

What needs improvement?

To make the tool better, I think we could have some sort of analysis similar to how some products offer information related to social media sentiments. If we could get that kind of assessment, some sort of analysis of some sort, I think that would be something that can really improve the solution.

In the future, I would like to see more frequent updates because of the changing security landscape. We should be seeing more updates in the tool, especially those that are not paid. The tool can also put in efforts in terms of maybe the community by conducting some sort of workshop or some sort of online event to bring the community together so that we can all meet. A community portal is needed.

For how long have I used the solution?

I have been using Check Point Security Management for five years.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a nine to ten out of ten, especially for the cloud version. The on-premises version was a bit unstable, and I think I will give stability a ten out of ten.

What do I think about the scalability of the solution?

Speaking about scalability, in terms of maturity, product security, and reliability, I would rate the tool an eight out of ten.

Around 200 to 250 people in my company use the tool.

How are customer service and support?

I have experience with the solution's technical support, and I don't think the product is doing well. We have to reach out to the first level of support and then to the third level of support. I rate the technical support a six out of ten.

How would you rate customer service and support?

Neutral

How was the initial setup?

The product's initial setup phase had no problems.

The product's installation phase was easy. The moment we transitioned from on-prem to the cloud, we realized that the on-prem version was a bit more difficult to use, and the cloud version was easier because it has some sort of configuration wizard. The provisioning was easy.

The solution is deployed on the private cloud version offered by AWS, but we use it across the company's group, and it is hosted in South Africa.

The solution can be deployed in an hour and a half. The deployment phase was not so bad.

I was not involved in the deployment since I had my tech team with 12 security engineers for it who can take care of the product and the firewall. My company's IT department has around 30 technical members but only 12 take care of information security matters associated with the tool.

What was our ROI?

In terms of the tool's financial and commercial aspects, we do a risk assessment every quarter. There is a huge cycle of risk assessment every quarter. As a part of risk assessment, Check Point reviews threats. When the risk team comes, it assesses the group. They give us some values about the threats that we are facing. They explain that since implementing the solution, this is the threat, and this is the value. Some empirical data is used.

What's my experience with pricing, setup cost, and licensing?

Honestly, the tool is expensive. It's a good product, so definitely, it is expensive. I realized that the tool is a bit more expensive than the rest, at over 20 to 30 percent overall. If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten. There are so many other products out there that are more expensive than Check Point. There are also so many other products that are cheaper than Check Point.

Which other solutions did I evaluate?

Over the other tools in the market, my company chose Check Point even if it is a bit pricey, but it fits the bill. From a business requirements point of view, it fits the bill. With the tool, we have been able to restructure our infrastructure in terms of the IT landscape. We are also able to bring policies without any fear of infiltration. In a nutshell, it fits before a business case.

What other advice do I have?

Check Point Security Management streamlines operations in our specific industry. We used to have a lot of instances, but because of the alerts that come from the kind of configuration the solution offers, we are now able to take care of instances even before they happen. Basically, the tool has really helped us reduce instances by about 40 to 50 percent.

The tool has a firewall and endpoint security to improve our company's security posture, especially for our mobile devices. Our company has a sort of principle where there is a need to bring your own device, so it is used to take care of things in terms of security. The security team within our department escalates things quickly.

Speaking about threat prevention in our daily operations, I would say that before the tool's implementation, we used to report a loss of about 50,000,000 dollars, but it has now gone down after the product was installed. It looks like it has helped capture those threats, alert in advance, and anomaly detection. It has been a very helpful product.

Speaking about the influence of Check Point Security Management on our IT infrastructure, I would say that we have implemented the product across endpoints, including mobile devices and devices that fall under the BYOD category. With Check Point, we were able to implement and allow our staff to bring their devices and work from wherever they want. Without Check Point, we would not have been able to do so, and that changes the landscape and trims down on the devices that we would have been acquiring centrally for our staff.

My company started the analysis on AI and areas like trends. The trends, especially transactional trends and all that kind of thing, are areas where we have already started some use cases for AI, about five of them, and I think the engine is still in the learning phase. I would say that we haven't really started using AI, but we already have it set up in Check Point, and it will be around the area associated with trends. Basically, we have not really explored the AI part yet.

I recommend the tool to others.

The tool's maintenance is done automatically on the cloud. When we were using the tool's on-prem version, we were happy to offer support for the product in our company.

I rate the tool an eight out of ten.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)