Our main use case for Check Point Security Management is to use it as a firewall where we block all the malware, all the Trojans, and all the policies we have enabled, and all the VLANs have been enabled into this. To secure our internal IT infrastructure, we use this security management.
A specific example of how we use Check Point Security Management in our daily operations is that we use it as a firewall that captures all the inbound and outbound traffic, not allowing any users to reach out to any malware, bot activity, or anything else. It is helping us more than my previous device.
Regarding our main use case, it handles a lot of logs. It has a hard disk inside that saves all the logs until it fills up, allowing me to see what happened, what kind of notifications were issued, and what kind of malware attacks occurred to which device and IP. We can see everything that happened and what is going to happen, securing all my IT infrastructure according to the IT field.
The best features Check Point Security Management offers, which stand out to me the most, are mainly the dashboard, which captures all the things, showing which devices are connected and what is getting hampered, displayed in different dashboards. I recommend Check Point Security Management 10 out of 10 for everyone, especially in smaller organizations. Currently, I am using SMB for 500 to 550 users, and it is very useful, depending on another firewall.
The dashboard feature works by showing not all Check Points or firewalls have the feasibility to display what kind of asset is connected, how many are connected, and what type of device it is, whether it's an IoT device, firewall, switches, printers, laptops, desktops, mobile phones, tablets, or watches. Each type is shown in different dashboards; for example, if 30 laptops are connected, one dashboard shows those 30 laptops, another shows 30 desktops, and another shows the mobile phones connected. This provides a clear understanding and the GUI is user-friendly.
Check Point Security Management has positively impacted my organization by already providing the best opportunities and excellent performance, and there is nothing that needs to be changed; whatever is currently in place is already perfect.
Check Point Security Management has helped my team save time, improve security, and reduce manual work significantly. I've noticed specific outcomes such as the ability to easily identify which device connected has malware installed via the MAC address and what issues have been faced. When a user reaches a bot activity or downloads an unwanted application, the administrator receives a pop-up notification on their phone, allowing swift resolution without any glitches in the internal network.
There is nothing to improve in Check Point Security Management; whatever features are available are already working well.
Everything is functioning actively, and I hope Check Point Security Management continues with this feasibility for a few years unless they introduce a new GUI.
I have been using Check Point Security Management for 1.8 years.
Check Point Security Management is stable at 100%.
Check Point Security Management's scalability is exceptional as it handles growth in users or devices very well; it captures all logs and conveys them in the GUI, making it easy to find solutions.
The customer support rates at five out of 10.
Before Check Point Security Management, we used Sophos, which was not helping my IT infrastructure, prompting our switch to Check Point Security Management.
My experience with pricing, setup cost, and licensing for Check Point Security Management involves licensing everything available in the Check Point GUI. We have taken all necessary licenses, including antivirus, IPS, and IPsec. The cost is relatively high compared to other brands, but the output we receive justifies the expenditure.
I have seen a return on investment; it's not about saving money as I have spent a lot, but I am getting the output I expect, particularly in terms of saving time from malware, Trojans, and bot activities since adding the licenses.
We did not evaluate other options; we chose Check Point Security Management as our only option.
My advice for others looking into Check Point Security Management is to take multiple demos before committing. Only after the demos are finalized and prove to be effective should one decide to proceed with Check Point Security Management; otherwise, consider other brands.
In addition to being a customer, I am a partner with this vendor.
I rate Check Point Security Management 9 out of 10.