We just raised a $30M Series A: Read our story

Check Point Pointsec [EOL] OverviewUNIXBusinessApplication

What is Check Point Pointsec [EOL]?

Check Point Pointsec [EOL] was previously known as Pointsec.

Buyer's Guide

Download the Endpoint Encryption Buyer's Guide including reviews and more. Updated: November 2021

Check Point Pointsec [EOL] Customers
Glatfelter
Check Point Pointsec [EOL] Video

Check Point Pointsec Software Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
CA
Network Security Architect at a financial services firm with 10,001+ employees
Real User
Top 5Leaderboard
Stable and easy to use, but it needs application identity support

What is our primary use case?

Check Point GAiA was part of our firewall and security solution.

What is most valuable?

The threat detection is good. Check Point GAiA is easy to use.

What needs improvement?

The installation, setup, and configuration should be easier to complete. In the next release of this solution, I would like to see application identity support.

For how long have I used the solution?

We only evaluated this solution for a short time.

What do I think about the stability of the solution?

This is a stable solution. I find that all of the solutions in this category are stable and that the set of features is more important.

What do I think about the scalability of the solution?

There were between 2,000 and 3,000 people using this solution.

How are

What is our primary use case?

Check Point GAiA was part of our firewall and security solution.

What is most valuable?

The threat detection is good.

Check Point GAiA is easy to use.

What needs improvement?

The installation, setup, and configuration should be easier to complete.

In the next release of this solution, I would like to see application identity support.

For how long have I used the solution?

We only evaluated this solution for a short time.

What do I think about the stability of the solution?

This is a stable solution. I find that all of the solutions in this category are stable and that the set of features is more important.

What do I think about the scalability of the solution?

There were between 2,000 and 3,000 people using this solution.

How are customer service and technical support?

If you have a Premium Support plan then the technical support is very good.

Which solution did I use previously and why did I switch?

I have used solutions by several similar vendors, including Palo Alto. There was not a single feature in this solution that we did not have with Palo Alto.

How was the initial setup?

The initial setup is more difficult than it is with other vendors. For example, it is much easier to set up the Palo Alto solution.

The length of time required for deployment depends on how complex the environment is.

What about the implementation team?

We did the implementation ourselves.

We have ten to fifteen people in the corporation but only two or three who worked directly with Check Point.

What other advice do I have?

Overall, this is a good product but it does lack features that we need.

I would rate this solution a seven out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Endpoint Encryption Report and find out what your peers are saying about Check Point, Microsoft, Broadcom, and more!