Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Check Point Security Management

Check Point Software Technologies

Reviews from AWS customer

2 AWS reviews

External reviews

33 reviews
from and

External reviews are not included in the AWS star rating for the product.


5-star reviews ( Show all reviews )

    reviewer2751156

Years of using the solution significantly improve log management and troubleshooting efficiency

  • August 22, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Security Management is that we use it to manage all our firewalls and also look at the logs that the firewalls generate.

I use the logs in Check Point Security Management both for troubleshooting, seeing traffic from one IP to another IP, and for threat detection, viewing what the IPS and IDS and anti-bot and antivirus generate. It gives a very nice overview where you can see what has happened, when, and what client has generated the logs. It's very easy to get an overview of what's happening in the network.

How has it helped my organization?

Check Point Security Management has positively impacted my organization because, after migrating from our previous firewall, a Cisco ASA, we were able to see what traffic was passing through the firewall and from that, build out least access privilege firewall rules. So only what's actually needed by the organization is being let through. The rest is being dropped.

The measurable outcomes with Check Point Security Management show that the troubleshooting is definitely quicker. Now it just takes a few minutes to find out where the error is and resolve it. Before, it was at least an hour or two of troubleshooting to locate the issue.

What is most valuable?

The best feature Check Point Security Management offers is definitely the log management. I've worked with other firewall vendors and the overview of the logs that you get in Check Point Security Management is superb. You don't get that anywhere else. It's very easy to troubleshoot what traffic is being dropped, what traffic is being passed. It's easy to build firewall rules and everything else. It's miles ahead of anyone else.

What needs improvement?

Check Point Security Management could definitely improve the lag inside the application. The application has a tendency to get slow when you have a lot of firewall rules inside it. Additionally, it crashes pretty regularly, so they could resolve the stability issues as well.

Regarding the crashes in Check Point Security Management, at least once a day, the application crashes with some random error message. Then you have to close it out and open it up again. The process takes around a minute or two to get back to where you were. It's very frustrating.

For how long have I used the solution?

I have been using Check Point Security Management for about seven years now.

What do I think about the stability of the solution?

Check Point Security Management is stable, but the SmartConsole used to administrate the security management is somewhat unstable. The application crashes at least once a day with some random error message. Then you have to close it out and open it up again. The process takes around a minute or two to get back to where you were.

How are customer service and support?

The customer support for Check Point Security Management is great. We have had no issues with them.

I would rate the customer support for Check Point Security Management an eight on a scale of one to 10.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Before Check Point Security Management, I previously used a Cisco ASA.

I switched from Cisco ASA to Check Point Security Management because the Cisco ASA was standalone and had no central management. We went from that to using Check Point Security Management for centralized management of all of our firewalls.

What was our ROI?

In terms of return on investment, we definitely need fewer employees to manage the amount of firewalls than before. The time to resolve issues is very much better now with Check Point Security Management.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for Check Point Security Management is that the licensing is straightforward. We pay on a three-year base. It's very fair pricing.

Which other solutions did I evaluate?

Before choosing Check Point Security Management, I did not evaluate other options.

What other advice do I have?

I would definitely give Check Point Security Management a 10 out of 10 because the logging oversight that Check Point Security Management gives is superb compared to anything else I've ever tried.

My advice to others looking into using Check Point Security Management is to definitely talk with Check Point Professional Services on how to deploy it since creating management of remote sites over VPN can be challenging. Having a plan on how to actually do that is great beforehand.

Overall rating: 10/10

Which deployment model are you using for this solution?

On-premises


    networke1856865

Centralized management of extensive firewall infrastructure reduces errors and saves time

  • August 20, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Security Management is to manage about 500 Check Point firewalls, and we manage all this equipment with this solution.

In my day-to-day work, I manage typical tasks with Check Point Security Management such as policy updates, monitoring, and troubleshooting, and it's easy to manage all the firewalls in this big environment with this solution.

I do not have anything else to add about my main use case or how I use Check Point Security Management.

What is most valuable?

In my opinion, the best feature Check Point Security Management offers is the ability to upgrade firewalls directly from the management console of the security management, which stands out to me.

Being able to upgrade firewalls directly from the management console makes a big difference for me because it reduces errors, and we do a lot of things automatically, which improves the upgrade process.

Check Point Security Management has positively impacted my organization by saving a lot of time because we have a lot of firewalls, and it provides a console where I can see directly all the managed firewalls, allowing us to manage all of our firewalls from just one point.

What needs improvement?

I have used Check Point Security Management for several years and have seen its evolution, and I believe they can improve the management by allowing better API functionality because the API now is a little complicated, making it difficult to do automation.

The improvements I would like to see in the API specifically relate to ease of use because the REST API is not easy to use.

For how long have I used the solution?

I have been using Check Point Security Management for more than 13 years.

What do I think about the stability of the solution?

Check Point Security Management is really stable, and I have not experienced any downtime or issues with reliability except for when we do upgrades, but after the upgrade, the platform is very stable.

How are customer service and support?

I have reached out to customer support for Check Point Security Management many times, and they answer quickly, with the level of support depending on the difficulty of the problem.

Which solution did I use previously and why did I switch?

Before using Check Point Security Management, I used a Cisco solution, and we switched to Check Point because Cisco management was not user-friendly, had a lot of bugs, and was very difficult to use.

What was our ROI?

I can't respond to how much time I've saved or how many incidents have been reduced since I started using Check Point Security Management because I'm pretty sure we saved a lot of time due to the central point of this tool, but I can't share examples.

I have not seen a return on investment in terms of time saved, fewer employees needed, or other benefits since I cannot share any relevant metrics.

Which other solutions did I evaluate?

We use Fortinet and Cisco as other tech products.

What other advice do I have?

My advice to others looking into using Check Point Security Management is that if you're looking for an easy tool to manage your firewall, you have to use this tool.

I do not have any additional thoughts about Check Point Security Management before we wrap up.

On a scale of one to ten, I rate Check Point Security Management a ten.

Which deployment model are you using for this solution?

On-premises


    Edrisa Biliba

The solution provides real visibility and secures the infrastructure effectively

  • January 21, 2025
  • Review provided by PeerSpot

What is our primary use case?

This is the Wi-Fi documentation. I work with the service, and we are partners with Check Point. One of our clients, Parliament, required an upgrade from physical to virtual implementation. This was my first implementation. We have another client, and the plan is to do something with them this year, although I'm not sure when. I've been involved in some other things, however, this was my first implementation.

What is most valuable?

It's a reliable solution for security without mentioning its importance. We can't work without Check Point since it provides the real visibility needed to manage the environment. You can depend on it, as it assures the environment is well-secured. It's doing great work, and we can't work without SQL. We don't work with any other solution.

What needs improvement?

One case I saw was with the logs, which gave me the transfer and the vibration. There's a lot of logs, and I'm unsure about their validity, however, they take up a lot of space. We had to provision the virtual machine twice. Another reason is that the database was already large thanks to the numerous logs. I'm not sure how they can be managed comprehensively.

For how long have I used the solution?

I have done my first implementation of the solution.

What do I think about the stability of the solution?

Ever since I implemented it, we have not had any complaints from the client side. That is a good sign regarding stability.

How are customer service and support?

Check support was involved during the implementation. We had support during the migration process. The issue was the size of the partition for logs. After the support, we realized we needed to resize. The challenge was with drivers due to the size, and we had not provisioned the partition to the right size. This was resolved with support.

How would you rate customer service and support?

Neutral

How was the initial setup?

We had to determine the specifications required for the security of the virtual machine, such as memory, storage, and network setup. The provisioning of the VM depended on the available resources since the box itself had a lot of memory. Specifications are crucial for the setup, and we needed enough storage. The migration was time-consuming but manageable.

Which other solutions did I evaluate?

With Check Point, I can compare it with Fortinet. Fortinet is a bit lower, while Check Point is on a higher level in terms of visibility and reliability. I've seen recommendations for Check Point over other products.

What other advice do I have?

I would definitely recommend Check Point, especially since our client was already using it. We had considered other options, but Check Point was preferable. The implementation supports an environment with more than one hundred users. 

Overall, I would rate this product a ten out of ten.


    Kalpesh Panchal

Provides multifactor authentication, IPS protection, and threat emulation

  • July 10, 2024
  • Review from a verified AWS customer

What is our primary use case?

We use the solution for VPN with multifactor authentication, IPS protection, and threat emulation. We have deployed the product in the cloud data center.

What is most valuable?

It's very easy for management to understand workflow and everything.

What needs improvement?

Check Point Tech Support will not assist with new configurations if we encounter any issues during the configuration process. They only provide support if there are issues with existing configurations.

For how long have I used the solution?

I have been using Check Point Security Management for four years.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

It is 100% scalable. Behind the firewalls, around 25 web applications are accessed daily. Each application can be accessed by up to one lakh people every day.

How are customer service and support?

Support is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously, I worked with FortiGate, and integrating that product with cloud platforms was very difficult. The workflows were overly complex, and the documentation was inadequate.

Check Point is superior to other security vendors. Their signature database, which includes antivirus, IPS, and anti-malware, is highly advanced. The system is easy to understand, and deployment via the web interface is also straightforward.

For example, during the COVID-19 pandemic, a new vulnerability known as Log4j emerged. While many vendors were unaware of this vulnerability, Check Point promptly emailed all its customers to inform them. They reassured customers that their gateways already had predefined prevention signatures to protect against this threat, requiring no additional action. 

How was the initial setup?

The initial setup is straightforward. Fresh deployment and creating the gateways will take approximately three to four hours.

With Fortinet, managing the product through cloud formation can be difficult to implement in a cloud environment because it's not straightforward. First, we need to spin up some VMs and configure everything manually. In contrast, Check Point provides a more seamless cloud formation process. With Check Point, you click on the cloud formation option, and the VMs and necessary configurations are automatically set up. You will get GUI access quickly.

Only two resources are required. One knows Check Point, and another guy knows the cloud platform where they want to deploy the gateway.

What other advice do I have?

The integration process is straightforward. If you have some knowledge of your cloud service provider, you can easily integrate with it.

It has improved over the past four years. Previously, pushing any policy from the management server to the security gateway could take around ten to fifteen minutes. However, this task is now completed in about one minute with the new firmware version. This improvement demonstrates the substantial advancements made in the Management of Check Point products. It continuously updates its products to align with security standards and market awareness. They implement these updates in their own unique way. It is a strong player in the security market and has a long-standing presence. Their solutions are reliable and trusted for real security needs.

Maintenance is very easy.

First, we will thoroughly understand their requirements. Once we understand clearly, we will design tailored solutions for them. Next, we will present these solutions to the customer for review and discussion. Following their approval, we will run POC, collect evidence as required, and submit the comprehensive report.

Overall, I rate the solution a ten out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    SanjeevKumar20

Access to detailed network logs in real time helps us decide and take prompt action to block and fix threats

  • June 08, 2024
  • Review provided by PeerSpot

What is our primary use case?

We use the product as a perimeter and core firewall for multiple clients at different locations.

We have physical Smart-1 appliances and virtual appliances in our environment. We merged all of the old managers into these managers and managed to centralize the management of firewalls and see the logs altogether.

We are using management API for large configs, and clear rules, blocking malicious IP addresses with SAM rules, and migrating the VLANs with it.

We have deployed Check Point high-end firewall UTMs to medium business-grade devices with different models. We also have a cloud-based Check Point firewall for one of our clients. It's easy to manage either centrally or as separate devices. We use them for network security including firewall rules, NATTing, Web application access, IPSec VPN tunneling between offices and cloud services, user VPN clients for access from home, data encryption, anti-malware/anti-virus solutions, and as network gateway devices for routing and DNS.

How has it helped my organization?

Check Point's management portal and firmware are very stable and don't require frequent maintenance. Their IPSec tunneling is very stable, especially with Azure and AWS networks.

Access to detailed network logs in real time helps us decide and take prompt action to block and fix threats.

Centralized management is great. With this, we manage all of Check Point products from one central management, we can apply rules, and NATS and manage app and URL Policies, threat prevention, and IPS protection rules.

Secondly, centralized log and report management is important. We can distribute logs to our log appliances with centralized management and view logs without logging additional devices.

HA Structure provides good coverage and works fine. With the HA structure, we can manage two data centers as one, and this is helping much.

We can keep old revisions, and with that, we can check or revert to one when needed.

What is most valuable?

The most valuable aspects of the solution include:

  • IPSec VPN Tunneling, 
  • DDoS Protection
  • HÀ and Clustering, 
  • Firewall Rules, 
  • Proxy support, 
  • Revision history
  • Detailed audit log, 
  • Smart Event
  • Filter syntax.

These features are easy to configure and offer multiple options to set them up with cloud services and other vendor firewall products.

We can always feel secure if some things go wrong, I'm sure that we can restore to the old one.

We can apply centralized proxy settings to get additional databases when we need them.

We can get a graphical view of the traffic and provide history when we need it.

What needs improvement?

We didn't find any major feature missing or lacking in Check Point products that we used. We'd just like them to continue to improve their products with new features and updates.

However, license update and upgrade processes can be made a little easier.

Also, I'd like to see more integration possibilities between Check Point and other vendor security solutions.

The Check Point SandBlast platform could also be merged with the Check Point GAIA platform for a central management console and easier controls.

For how long have I used the solution?

I have been using Check Point for more than 10 years for different clients.

What do I think about the scalability of the solution?

The solution is highly scalable.

How are customer service and support?

Check Point's knowledge base is very vast and provides lots of information if we need some help. The community is very helpful as well.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We have multiple clients and use different technologies, so we work on other vendor products also.

How was the initial setup?

We have a professional service team that we work together for setup-related work to Check Point appliances.

What about the implementation team?

We handle the initial setup in-house.

Which other solutions did I evaluate?

We have multiple clients and use different technologies, so we work on other vendor products also like Cisco ASA, FTD, Palo Alto, FortiGate etc.

What other advice do I have?

Overall I am fully satisfied with Check Point

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other


    Charity Kimotho

Provides security and reliability, integrates well with other products, and the exceptions work well

  • February 21, 2024
  • Review provided by PeerSpot

What is our primary use case?

We use the solution mostly for policy pushing to other gateways.

How has it helped my organization?

We deployed the tool for a customer. They faced an attack, but Check Point did not allow it. Check Point does not allow unauthorized access to the network. It just sends a message to the person saying they are not authorized to access the network. The exceptions work very well. Most of the attacks go through the web path. The tool does a good job of securing the web path.

What is most valuable?

We can easily push the policies to any of our gateways. The solution manages the gateways. It works well with other products. It integrates well with Cisco products, too.

What needs improvement?

The tool is expensive.

For how long have I used the solution?

I have been using the solution for the last two years.

What do I think about the stability of the solution?

The tool is very stable. The equipment is never down.

What do I think about the scalability of the solution?

We have more than ten customers.

How are customer service and support?

The support is very good. We get a response immediately whenever we enter a support request on the website. We do not have to wait for one or two hours. The team also offers remote support. The support provided by Check Point is one of the best in the market.

How was the initial setup?

We have most of the products on-premise. We have only one client on a VM. Check Point offers training for their products. They usually send us a link every time they launch a new feature. Unless we go through the tutorials, it will be difficult for us to deploy the solution. However, it is easy to deploy when you know how to do it. It is easy to navigate if we have read about the gadget.

What's my experience with pricing, setup cost, and licensing?

The tool is expensive. However, if we buy Check Point Security Management, we do not have to buy anything else. We get all the features we need in a single solution. We get value for our money.

What other advice do I have?

If we want to troubleshoot, we just have to log in to the SMS. Everything is listed there. We just have to log in to the gateway we have an issue with. We need not go to the server rooms. I see no improvements needed in the product. The other gateways and SD-WAN could be improved. If someone wishes to use the product, they have chosen the best option. It provides security, reliability, and support. Though it is expensive, it is the best. It has all the features we need. The product is absolutely excellent. Overall, I rate the tool a ten out of ten.

Which deployment model are you using for this solution?

On-premises


    reviewer06814135

Great DDoS protection, high availability, and useful firewall rule implementation

  • October 12, 2023
  • Review provided by PeerSpot

What is our primary use case?

We use the product as a primary gateway firewall for all offices at different locations. 

We have deployed their high-end firewall UTMs to medium business grade devices 1400 series. They are easy to manage either centrally or as separate devices. We are using them for Network security including firewall rules, NATTing, Web application access, IPSec VPN tunneling between offices and cloud services, user VPN clients for access from home, data encryption, anti-malware/anti-virus solutions, and as network gateway devices for routing and DNS.

How has it helped my organization?

We have seen tremendous improvement in the overall security of the organization's IT assets. We performed Pen Tests and External vulnerability audits on our network and we always scored top-rated thanks to Check Point. 

Their management portal and firmware are very stable and don't require frequent maintenance. Their IPSec tunneling is very stable, especially with Azure and AWS networks. 

Access to detailed network logs in real time helps us decide and take prompt action to block/fix threats. 

What is most valuable?

The most valuable aspects of the solution include:

  • IPSec VPN Tunneling: they are easy to configure and offer multiple options to set them up with Cloud services and other vendor firewall products over certificates, shared keys etc.
  • DDoS Protection: Firewall cleverly handles such attacks without compromising on performance.
  • HA and Clustering: Seamless load management and High Availability between nodes of firewall clusters.
  • Firewall Rules: You have access to set up rules at a very granular level and all are accessible through the GUI platform as well as over CMDLET.

What needs improvement?

We didn't find any major feature missing or lacking in Check Point products that we used. We'd just like them to continue to improve their products with new features and updates. 

We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners.

The Check Point SandBlast platform could also be merged with the Check Point GAIA platform for a central management console and easier controls.

For how long have I used the solution?

I've used the solution for more than ten years.

What do I think about the stability of the solution?

The solution is very stable compared to peers.

What do I think about the scalability of the solution?

The solution is highly scalable.

How are customer service and support?

Technical support is satisfactory, however, it takes some time to escalate your ticket.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did use Sophos and Cisco ASA, however, they were either complicated products to manage or lacked features.

How was the initial setup?

The initial setup wasn't difficult after you attended free platform support sessions by Check Point.

What about the implementation team?

We handled the initial setup in-house.

Which other solutions did I evaluate?

We evaluated Sophos, Cisco ASA, SonicWall, and FortiGate.

Which deployment model are you using for this solution?

On-premises


    LucianoMiguel

A highly accessible and fast tool that provides a very good technical support

  • June 26, 2023
  • Review provided by PeerSpot

What is our primary use case?

I use it for managing ten clusters in our on-premise environment. With this kind of management, it's possible to question its policy and change many configurations in the files. With its management, we got all the logs from the environment. With Check Point Security Management, we get the benefits of deploying the configuration.

How has it helped my organization?

Owing to the availability of many kinds of incidents, I can say that the solution has served to improve my organization.

What is most valuable?

Regarding the tool's valuable features, I would say that Check Point is a very accessible and fast tool, especially when dealing with logs for the first time. It is a perfect solution for me.

What needs improvement?

From the Check Point Security Management solution, it's possible to get the situation of my clusters. I guess it lacks in providing visibility of the many incidents. Hence, the visibility of incidents is an area where I want the solution to improve.

For how long have I used the solution?

I have been using Check Point Security Management since 2005, so I have used it for maybe twenty years. Also, I am using Check Point Security Management E84.20.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a ten out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a ten out of ten.

How are customer service and support?

The solution's technical support is very good. Hence, I rate the technical support a ten out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The solution's initial setup was easy.

What was our ROI?

It took a year to see a return on investment. I did experience a return on investment using the solution.

What's my experience with pricing, setup cost, and licensing?

Price-wise, it is an expensive solution.

What other advice do I have?

I recommend the solution to those planning to use it.

I rate the overall product between nine to ten out of ten.

Which deployment model are you using for this solution?

On-premises


    Computer & Network Security

For PCI compliance, Check point is Excelent!!

  • October 26, 2021
  • Review provided by G2

What do you like best about the product?
One of the best thing is that we can get more details of each firewall by getting important data such as security overview, security modules, violations, etc., and the coolest thing is that you can print a report in case that is needed
What do you dislike about the product?
It is a little complecated if you want to create your charts or customize your outputs because if you don't have a good idea of what are you doing, you can get lost during the chart creation
What problems is the product solving and how is that benefiting you?
As a PCI compliance corporation, it has been beneficial to share any report needed


    venkatesh G.

Great Platform To Fulfill Up To Date Security Requirements !!!!

  • July 15, 2021
  • Review provided by G2

What do you like best about the product?
The best thing I like the most about Cloudguard IaaS is the new feature, such as Updateable Object, Datacenter Object. We use the Updateable Object for the Cloud service, and we don't need to add many IP addresses that need to be. It saves the time to edit the firewall policy and can update the IP address automatically from the freed. Datacenter Object is another feather used in our cloud environment
What do you dislike about the product?
The most dislinking part is the license. We need to use the command to apply the license to the gateway but not the Smart Update, and it is not friendly to our environment cause execute the controls at the management server need to raise change request.
What problems is the product solving and how is that benefiting you?
Datacenter Object is another feather used in our cloud environment. Before we use this, we need to add a lot of firewall policies to allow the connection. After implementing the Datacenter Object, we just need to edit the cloud tag to add or remove the IP/subnet.
Recommendations to others considering the product:
I recommend everyone to try this platform once, and you will get to know the features involved.