We changed our name from IT Central Station: Here's why
2019-06-24T12:13:00Z

What is your primary use case for Check Point NGFW?


How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
Guest
103103 Answers

author avatar
User

I protect customers and other types of data by ensuring a secure environment. Check Point allows me to deploy quickly and securely, along with using more advanced detection and prevention. By securing multiple sites and various infrastructure elements, I have reduced my overall workload. I'm using a lot of permanent tunnels and protecting them to ensure that monitoring customer infrastructure is not compromised in any way, shape, or form. Various hardware has been deployed at proper sizing for customers and the equipment is stable without the need for a lot of custom configuration

2021-11-22T19:17:00Z
author avatar
Vendor

The Check Point firewall is a reliable perimeter security product. Check Point gives me access to explore various security features in a single box (loaded with all features that an organization needs most). I can say I have been using it for one year and getting a grip on it and I will always try to implement it wherever it is required. When it comes to Check Point, there are great security features and a marvelous inbuilt design that caters to handling all threats, including zero-day attacks and perimeter security. I really like the user-friendly interface of the Smart Console dashboard and the maximum security is integrated.

2021-11-22T11:35:00Z
author avatar
User

Our business houses just over 100 staff, along with over 200 devices ranging from mobile to tablets, computers, laptops, and Servers. We use a Check Point 5100 cluster running R80.40 to protect our business from external threats. Our network is also extended to the likes of Microsoft Azure, Amazon AWS, and other 3rd parties utilizing secure VPN tunnels terminating on our Check Point 5100 cluster. Our business also offers the ability of hybrid working - which is only possible with our Check Point solution.

2021-11-19T11:41:00Z
author avatar
User

Check Point firewall is used as edge protection. Traffic to the internet and from the internet does go through the firewall where IPS, URL, and app policies are applied. Check Point was also used as an internal firewall to segment traffic between the data center and the user network. Basically, all traffic from any user will have to be inspected by an internal Check Point firewall before any server is accessed. Check Point is also used for PCI-DSS credit card checks within any email sent or received. This is effective in detecting credit card numbers within any email sent by a user in error and blocks that from being exposed.

2021-11-19T02:12:00Z
author avatar
User

I work for a systems integrator and have designed and deployed solutions over many years with Check Point components. Problems solved with Check Point NGFWs have included securing the edge, data center segregation, SWG replacement, Remote Access, and many others. I have designed and installed Check Point deployments from a single SMB appliance to multiple highly available chassis, running numerous virtual systems. Numerous different use cases include appliance form-factors, running modules, and licenses.

2021-11-18T21:57:00Z
author avatar
User

This is the perimeter firewall and manages all security facing towards the internet, It's a distributed solution composed of a Security Gateway and a Security Manager. It controls all the traffic from the LAN to the Internet and the VPN tunnels for connections with external partners. We control the traffic to the internet with blades as URL filtering to manage the bandwidth, limit the use of this resource, and apply the security policies as well as protect the LAN network against advanced threats from the internet to the servers and PCs.

2021-11-18T21:57:00Z
author avatar
Top 20User

We use the product to secure our network, using all Check Point has to offer, including multi-domain servers, centralized log servers, gateways on-premise, and VSX. It has improved a lot with the last versions making day-to-day operations very user-friendly. I have used almost all the blades Check Point has and it's incredible what a Next-Generation firewall is capable of, including VPN, IPS, monitoring, mobile access, compliance, and more. The reports of the Smart Event console are also very useful. It's good to have a view of what's going on in our network. Since Check Point has Linux working on them, it gives us plenty of tools to adapt to any specific need we have.

2021-11-18T15:56:00Z
author avatar
Top 20User

We use the solution as a frontend firewall in our headquarters and in our branches. We use packet inspection, the antispam feature, and the VPN. We have configured threat prevention and content awareness to improve security on incoming email and on web surfing from interlan networks wits SSL inspection. Mobile access through the VPN mobile client is also used from all outside workers and is fully integrated with our AD. We also use the solution to route traffic on internal networks and manage security through client and server networks.

2021-11-18T14:30:00Z
author avatar
User

What can you do about threats that get past simple packet inspection by a regular firewall? You could have a layer 3 firewall inspect the protocol and block known threats from certain URLs, however, what if it comes from a URL that has not been reported and is a socially engineered exploit designed to hijack your data? This is where a Layer 7 firewall will be able to inspect the application, known as payload inspection. While this is possible to do with a Layer 3 firewall, it can be difficult due to the number of protocol messages in Layer 7. You would need to create a signature for each application you wanted to protect; however, network signatures tend to block legitimate data and increase your MTTR (mean time to resolve an issue). Plus, having these signatures makes it hard to manage and keep up with by the IT staff. Relying on the power of AI and the cloud in order to leverage the Layer 7 firewall is key. The advantage of Layer 7 is its protocol awareness, which allows it to differentiate between different network traffic (application knowledge) and not just packets or flows that identify ports and IPs (Layer 3).

2021-11-18T04:29:00Z
author avatar
Vendor

Working in an MSP environment, there are more than a hundred firewalls and we use Check Point NGFW firewall which is mainly implemented as perimeter security and internal segmentation firewall. Due to our requirements, we implement site-to-site VPN between clients and cloud providers (AWS/Goggle/Azure). The centralized managed infrastructure makes it simple for the IT staff to operate and monitor the firewalls. The Smart Console provides a single pane of glass that allows the IT staff to easily manage the environment and troubleshoot issues.

2021-11-18T04:27:00Z
author avatar
Real User

My primary use case of this solution is for the data center in the perimeter security. We configure all of our security features like anti-boot, antivirus, and filtering.

2021-11-06T03:19:00Z
author avatar
Top 20User

I use the NGFW as a Firewalling device, for VPN tunneling, and for virtual patching. My environment is a two-tier network environment. I also use the Check Point NGFW as an IPS.

2021-11-01T09:45:00Z
author avatar
User

We first deployed Check Point for our clients. Our first client wanted to deploy the security appliances in a cluster solution for their network infrastructure solution. The NGTW chosen was the 5800 series and it was deployed as a software solution on clients' servers. Everything is going smoothly and the client seems happy with our proposal.

2021-10-13T23:20:00Z
author avatar
Top 20User

Check Point is currently our perimeter firewall at various locations. We use their failover clustering with high availability option, which performs flawlessly. Upgrades are easy to perform and have always worked reliably for us. Technical support is always available to assist with these operations, which makes the process less stressful to the admins. We are also using their ISP Redundancy feature, which works as advertised - perfectly! It's easy to implement, especially with the awesome documentation from our engineer. We also use their Remote Access VPN offering and have really seen its value this past year, due to COVID-19. The VPN has been 100% rock solid, especially during the most critical times in our history.

2021-10-13T18:59:00Z
author avatar
User

We are a Critical Access hospital with close to 1,000 endpoints and hundreds of users. We currently have multiple ISPs coming into the hospital for internet redundancy. There are multiple buildings on our campus that are connected with copper and fiber. We have had clinics in multiple cities attached to our network at various times. We installed the Check Point NGFW in our environment to act as our main firewall and gateway. This allows us to keep several of the vendor devices (lab analyzers and other third-party equipment) segregated on different VLANs so they have no access to our production VLAN. This system is also our VPN concentrator for several site to site VPNs and remote software VPN connections.

2021-10-13T15:29:00Z
author avatar
Top 20User

We needed to replace our external firewall solution as we were having issues with the HTTPS inspection on our previous solution and the level of support being provided was terrible, leaving us with an issue that could not be fixed for over six months. We had already deployed a new internal firewall solution but needed something that would protect that from external factors. We also needed a new solution to replace our client VPN solution. The Check Point solution gave us that as one whole solution instead of having to manage multiple services.

2021-10-13T15:02:00Z
author avatar
Top 20Consultant

We use our Check Point NGFW firewall mainly for perimeter security. Those firewalls are placed at many sites distributed over Europe. We love the firewall management and think it's still the golden standard for creating a rule base and we go more and more in the direction of identity bases user access to secure our environment. The other firewall blades, such as Anti-Bot, Application and URL-Filtering, and IPS, are used on all sites. It's easy to deploy, as the firewall is able, with the latest version, to learn from the traffic and adapt the IPS policy.

2021-10-11T13:23:00Z
author avatar
Top 5LeaderboardReal User

We use Check Point firewalls to prevent attacks against the data center servers by adding more layers of security, such as IPS, Data Leak Prevention. We have also used Check Point to implement security policies in layer 7 and applications as well as to configure the VPN for internal users of the organization.

2021-09-23T20:25:00Z
author avatar
Real User

I am using Check Point Next Generation.

2021-09-03T14:55:52Z
author avatar
Top 5LeaderboardReal User

We use the solution for a perimeter firewall, an internal segmentation firewall, and a routing device in our organization.

2021-08-10T09:31:13Z
author avatar
Top 20User

I have been designing, deploying, implementing, and operating Check Point's Security solutions including NGFWs and EndPoint security as well as Remote Access VPNs, Intrusion Prevention systems, URL filtering, user identity, UTMs, et cetera, for around 12 years. I have also used VSX and MDS/MDLS solutions. In my organisation I am using over 150 virtual and physical appliances and also MDS for virtualized/contanerized central configuration management and also central log management MDLS/MLM. We are using this not just for NGFW but also for other Perimeter security solutions.

2021-07-14T23:47:00Z
author avatar
Top 20Real User

It's our main firewall and the first line of protection from the outside! We use it to interconnect our remote locations (that use different vendors and equipment) and let the employees work remotely. We're a small site with 300 users and this equipment is more than enough for us. We use almost all the blades and the equipment has run smoothly for years. This NGFW monitors all the traffic outside of the main network, prevents malicious activities, and lets us easily manage network policies to shape our connections.

2021-06-25T10:44:00Z
author avatar
Real User

The primary use of the solution is as an enterprise perimeter firewall in our data centers. We also use software blades for IPS/IDS functions as well. We have a combination of enterprise-grade firewalls like the 15000 and16000 series as well as mid-size versions like the 5000 and 6000 series which are for specific segment isolation or other purposes. The software blades are running on HP servers. Management is done via 5150 appliances. 5000 and 6000 series appliances are primarily used for segment isolation while the larger appliances are used for perimeter security.

2021-06-15T14:52:00Z
author avatar
Top 5Real User

We use this solution for permissions regarding access ports and services. We also use Check Point Remote Access VPN as an endpoint VPN. We use it for site-to-site configuration. All of the traffic that comes through our sites passes through our firewall. Basically, everyone, including our staff and clients, passes through our firewall. In other words, we have thousands of users using this solution.

2021-06-03T09:49:16Z
author avatar
Top 20Real User

We use this solution for perimeter security and data center security.

2021-05-26T21:08:10Z
author avatar
Top 20Reseller

We use Check Point NGFW for perimeter protection of our network from the internet. We also use it for threat protection at the network level and the endpoint level. We provide implementation, installation, and support services. We know about all types of firewalls, and we work with all types of installations. We usually use appliances, but in test environments, we use virtual appliances.

2021-05-24T20:02:50Z
author avatar
Top 20User

I use Check Point NGFW for controlling traffic and controlling access to the production server. It is a HA (high availability) environment. It is easy to use failover solutions. We use it on our disaster recovery (DR Site) and it runs smoothly.

2021-05-20T12:14:00Z
author avatar
Top 5Real User

We primarily use this product for cloud computing security. It is an integration platform for IPS and I also use it for performance monitoring. I also coach classes on the use of this firewall, which is installed on my personal laptop.

2021-05-17T14:14:52Z
author avatar
Top 5Real User

We use this solution for the VPN, from site-to-site and remote. We also use it for advanced IPS, IDS, malware protection, and the sandbox. The sandboxing functionality is one of the best features.

2021-05-14T14:53:54Z
author avatar
Top 5Real User

We use this product for providing perimeter security, as well as advanced threat protection capabilities to critical infrastructure. The solution is expected to deliver high-performance throughput for voluminous traffic continuously. We are using these gateways for multiple functionalities such as: * Perimeter Gateways * Anti - APT (Advanced Persistent Threat) * Anti Malware / Anti Virus * SSL Inspection * Network Intrusion Prevention System * Private Threat Cloud All of our solutions are expected to run in high availability and have good resiliency.

2021-05-10T14:21:00Z
author avatar
Top 5Real User

We use this solution for complete protection against advanced zero-day threats with Threat Emulation and Threat Extraction. We also use: * NSS Recommended IPS to proactively prevent intrusions * Antivirus to identify and block malware * Anti-bot to detect and prevent bot damage * Anti-Spam to protect an organization's messaging infrastructure * Application Control to prevent high-risk application use * URL Filtering to prevent access to websites hosting malware * Identity Awareness to define policies for user and groups * Unified Policy that covers all web, applications, users, and machines * Logging and Status for proactive data analysis

2021-05-08T13:39:00Z
author avatar
Top 5Real User

Our primary use case is as a perimeter firewall for main and DR sites for a financial institution. It secures Internet access for users through IPS/AV/Threat Emulation/Application control and URL filtering with HTTPS inspection and geolocation restrictions. It secures our email and MDM solutions. We also use it to create site-to-site VPNs with vendors. Remote access is achieved through the use of a secure workspace and SSL network extender. Securing and inspecting HTTP traffic to our web servers is another important task. It secures several DMZs and segregates them from the rest of the network. We use all of the security features available.

2021-05-07T14:36:00Z
author avatar
Top 5Real User

I'm a consultant at a Check Point partner. I have deployed a lot of Check Point firewalls and support Check Point firewalls for our customers. Our customer environments are different. I have deployed standalone, cluster, and two-layered firewalls.

2021-05-06T16:40:00Z
author avatar
Top 5Real User

We have a pretty small office and therefore, a small network environment, and the SMB appliances from Check Point were a perfect fit and exactly what we were looking for in order to improve our overall security posture in the office. It was critical for us to be able to secure our network, including intrusion detection and prevention along with threat emulation and extraction for zero-day threat help, and Check Point fit perfectly. After implementing the solution, we were able to get through a third-party penetration test of our network without issue.

2021-05-05T19:37:00Z
author avatar
Real User

Our branch offices and customer sites require Internet access for the on-site staff and remote access capabilities for after-hours and remote support. The Check Point firewalls allow us to provide site-to-site VPN, client VPN, web/app filtering, and IPS functionalities. Client VPN is leveraged by site staff due to the majority of our sites requiring 24-hour support and also allows centralized teams to remotely assist with multiple sites globally. We also use these at locations to provide security when our stand-alone network requires connectivity to the customer's network.

2021-03-30T14:26:00Z
author avatar
Top 5Real User

The role NGFW plays is to protect the organization against Layer 7 network attacks. The solution has helped us to guard our perimeter security on a wider level. This is not like plain vanilla firewall. We have got a wider visibility with the help of this next-generation firewall; it shows us the traffic flowing across the network and based upon that, we have made the modifications required to restrict access. Also, the active cluster module has helped us to balance the load during peak hours. Since moving to the active-active module, we have got the much-needed breathing space.

2021-03-29T13:23:00Z
author avatar
Top 5LeaderboardReal User

The primary use is to protect the organization from any kind of attack. It is able to isolate, secure, and control every device on the network at all times. Solutions should have the ability to block infected devices from accessing corporate data and assets. It provides access to the Internet for corporate resources in a secure manner. Our resources are used to host applications and services that are accessible to end-users over the Internet. It is used to provide required/limited access for third parties who want to connect to our corporate network. Access is granted based on application type and should be independent of port or protocol. It provides next-generation protection including IPS/Web Filtering/SSL decryption and more. It offers centralized policy management capabilities for all firewalls.

2021-03-29T10:19:00Z
author avatar
Top 10Real User

Our primary use case is to secure the perimeter and users in our network. We use IPS/IDS, deep packet inspection, and VPN.

2021-03-26T14:01:00Z
author avatar
Top 10Real User

In my company, we use the Check Point NG Firewall solution to secure the perimeter and user network. We use IPS/IDS, deep packet inspection, and VPN. We have implemented routing rules based on the destination of the traffic, and the performance of the global solution is satisfactory. We use the solution, too, as the firewall in a core node, which is very important to the business. It secures the network equipment and service integrity. We are delighted with the powerful management console and diagnostic tools.

2021-03-26T13:09:00Z
author avatar
Top 5Real User

Nowadays, there are many threats and it's necessary to have an automatic process to defend your organization. The Check Point NGFW is a good solution for this use case.

2021-03-22T10:00:00Z
author avatar
Top 20User

We support various clients in the government sector in Mexico. We provide different solutions in terms of network security, data security, and perimeter security. The NGFM Firewall is available locally and different offices and/or institutions of the government sector pass through a more secure and controlled infrastructure. This type of infrastructure has different zones or areas that are managed and keeping them centralized has helped us to maintain and control them. In addition, we are generating fast and safe solutions for our users on each site.

2021-03-20T06:48:00Z
author avatar
Real User

We have deployed Check Point firewalls for perimeter security and also for filtering East-West traffic. Check Point helps in improving perimeter security along with giving insights into different kinds of traffic and attacks. Isolation between different tiers of APPs is critical for us and Check Point is utilized for handling high traffic volumes of East-West traffic. We are leveraging the VPN module on the perimeter firewall for users to access the VPNs. VPN authentication is integrated with RSA for multi-factor authentication.

2021-03-18T20:43:00Z
author avatar
Top 20Real User

We were looking for an easy, centrally-managed firewall infrastructure as we were using a standalone solution that was difficult to operate and maintain because it was composed of several different systems. We needed a solution that had support for virtual systems, and we needed such flexibility without increasing the cost by too much. On the other hand, comparing within the sector, Check Point NGFW has a good stack of security mechanisms (modules, aka blades in CKP terminology) that are easy to implement and use.

2021-03-15T12:40:00Z
author avatar
Top 5LeaderboardReal User

We deployed a Check Point firewall on the perimeter as well as on the internal network. Both are in HA & we have enabled all threat prevention blades. All devices are 5600 & 4200. We are managing our two firewalls with two different security management servers. Currently, we are using the R80.20 firmware version and we have a pretty simple design. Our primary uses are firewall security, VPN, web filtering & monitoring. We have also used the TE-100X appliance for private cloud sandboxing.

2021-03-15T07:49:00Z
author avatar
Top 10Real User

The purpose of using the firewall is to protect the users from the external network, internet. Apart from that, we have set up IPsec tunnels between two different sites, and for internal usage, between two different zones, we use these firewalls as well. Our environment consists of a 3-tier architecture, which is recommended by Check Point. We use the central management system to manage our 3-tier architecture, and we use the Smart Console as well.

2021-03-04T01:49:00Z
author avatar
Top 10Real User

We use this firewall to protect the internal network and to set up the IPSec standard from one location to another.

2021-03-02T19:08:00Z
author avatar
Top 5LeaderboardReal User

We use this solution as a layer 3/4 firewall deploying access rules in our DMZ. We have more than six different centers with different service layers, a core of up to 500Gb per site, and other service centers providing security for all inbound and outbound connections. VSX gives us the capacity to consolidate hardware in fewer devices, reducing the OPEX, and creating different VFWs to provide service to different environments or services. Layer 7 features allow us to upgrade our security services. Activating the required features only requires upgrading the license.

2021-03-02T15:18:00Z
author avatar
Top 5LeaderboardReal User

In today's world, we can't completely rely on traditional signature-based devices, as technology involving cyberattacks is becoming more sophisticated. We require an all-in-one solution that can defend against newly-created attacks, necessitating the usage of NGFW firewalls. This is where Check Point comes into the picture. Our environment contains multiple roaming users, where we have to extend trust beyond the organizational network. Not only is there east-west traffic to deal with, but a large volume of north-south traffic, as well. We are required to monitor all of the traffic, which includes many branch offices connected centrally. Monitoring Data via DLP in such a scenario, we require a single solution, which is nothing but Checkpoint.

2021-02-26T11:13:00Z
author avatar
Top 10Real User

I work as an internal network team member. We protect the company environment from outside threats, outside viruses, and ransomware attacks. It is kind of an IT administrator job. They are protecting internal security as well as giving us security from the outside world or public environment.

2021-02-18T22:07:00Z
author avatar
Top 10Real User

We use firewalls to protect our private environment from the public environment. My IT group is in charge of protecting the environment and maintaining safe usage of the internet. This product gives us a better, safer solution for the users within our company.

2021-02-17T11:56:00Z
author avatar
Top 5Real User

The main use case is Firewall provisioning and integration with Tufin and Skybox. Also, we focus on firewall compliance, rule review, VPN configuration, and network troubleshooting.

2021-01-18T10:55:00Z
author avatar
Top 10Real User

We use Check Point firewalls to secure our internal network from the outside world and to provide a good, comfortable, and secure environment for our employees. We have various models from the R80 series, such as the R80.10 and the R80.30.

2020-12-14T06:56:00Z
author avatar
Top 10Real User

We have two clusters. We are using them as both perimeter firewalls and data center firewalls.

2020-11-15T06:39:00Z
author avatar
Top 10Real User

We use the solution to protect our organization and workers from the outside Internet or any untrusted network. We have the three-tier architecture of Check Point. We use its consoles, central management system, and firewall device for managing it. This three-tier architecture is recommended by the Check Point Community.

2020-11-09T08:11:00Z
author avatar
Top 10Real User

We are using this solution for the security enhancement of our internal company network. This is to protect our customers as well as internal users from the untrusted network or outside world. I am using the physical appliances of Check Point Firewall as well as virtual machines (VMs). We are using the same versions of R80 on our VMs that we are using for our physical appliances.

2020-10-13T07:21:00Z
author avatar
Top 10Real User

Our primary use cases for Check Point NGFW are for perimeter security and content filtering for browsing behavior.

2020-10-04T06:40:00Z
author avatar
Top 10Real User

We're using Check Point Next Generation Firewalls to secure the internal LAN network from unwanted threats and for protecting the environment for business use.

2020-09-27T04:10:00Z
author avatar
Top 20Real User

The Next Generation Firewalls, the 64000 and 44000 series, provide us with support for large data centers and telco environments. They're quite reliable and provide great performance.

2020-09-27T04:10:00Z
author avatar
Top 10Real User

In my previous company, one of the clients was a big chocolate company. They had this payment card infrastructure (PCI), where they needed to have auditors from PCI check the firewalls to see if everything was okay. So, they had web-based authentication. I'm working with the 5800, 5600, and 5200 models. I work with the UTMs as well. These are physical appliances as well as open servers.

2020-09-23T06:10:00Z
author avatar
Top 10MSP

We use it to protect our network from the outside world and unsecured networks. We also use it to provide a safe, secure network to the internal users of our organization. I am using various versions on the model, like R80.10 and R80.30.

2020-09-22T07:16:00Z
author avatar
Top 20Real User

Check Point protects our environment from external threats. In particular, we use: * Application Control for Internet access * HTTPS Inspection for outgoing connections into the internet * Separate the OT network from the normal data LANs * SSL VPN for End Users - Check Point Mobile VPN Client is used on the end-user clients * Site-to-Site VPN for connecting other companies to our environment We are using two Check Point boxes in a ClusterXL Setup so that one appliance can die and the environment is not affected. We also use a cloud gateway for internet security on users, which are only connected to the internet (outside the office).

2020-09-15T09:02:00Z
author avatar
Top 10Real User

I support multiple clients within the UK, the EMEA region, the US, and now in Asia Pacific as well. I specialize in Check Point firewalls. I design and secure their data centers, their on-premises solutions, or their businesses security. The firewalls are mostly on-premise because most of our clients are financial organizations and they have strict compliance requirements. They feel more secure and have more control when things are on-premise in the data center. However, there are use cases where I have helped them to deploy Check Point solutions in the cloud: AWS, Azure, and in Google as well. But cloud deployments are very much in the early stages for these clients, on a development or testing basis. Most of the production workloads are still on-premise in data centers. Most of my customers are still using R77.30, and they are on track to upgrade from that to R80, which is the current proposed version by Check Point.

2020-09-14T06:48:00Z
author avatar
Top 5Reseller

It's an on-prem deployment where we use it to protect our client and end-users who are working with the internet, and to protect their servers from external access. They have about 100 users and two servers.

2020-09-14T06:48:00Z
author avatar
Top 10Real User

We use it as a normal firewall for perimeter security, using some of the Next Generation features, like Anti-Bot and Antivirus. We have two ISPs. We have a different firewall system in front of the Check Point Firewall. We also have normal Cisco switches combined with the Check Point solution. Then, our internal network is with Cisco, which is about 300 servers and 1,500 clients.

2020-09-13T07:02:00Z
author avatar
Top 5Real User

We recommend to clients who are installing applications that they can work with Check Point Next Generation Firewalls. Our role is to support our customers in terms of their migration, firewall room cleanups, and implementing all the security features that the firewall has. Our clients have branch offices in Mexico and Bermuda. Check Point is one of the top names in these areas.

2020-09-10T07:35:00Z
author avatar
Top 5LeaderboardReal User

The primary use is to segregate the environment internally to create a lab environment and a production environment, for example. We also use them to protect the company from the internet and when going to the internet; to protect the perimeter of the company. We use them to create a VPN with customers and clients, and with the other companies that belong to the group. We work with 1200s, 1500s, 4000s, and 5000s.

2020-09-09T06:29:00Z
author avatar
Top 10Real User

We use them to protect our edge infrastructure and for interconnecting our sites using the VPN.

2020-09-09T06:29:00Z
author avatar
Top 20Real User

We provide solutions for various customers where we apply Check Point Firewalls, either for a VPN gateway or for securing their networks. We have provided them to a couple of financial customers to protect their mobile banking as well.

2020-09-08T05:15:00Z
author avatar
Top 5Real User

The primary use of the firewall is to allow or block some traffic. Mainly, it is the perimeter firewall for the Internet. It filters the traffic from external to internal, e.g., to secure the traffic. Some of our customers have been demanding Check Point as their firewall product. I do the installation, support, firewalls, etc.

2020-09-07T05:57:00Z
author avatar
Top 5Real User

We use it for VSX virtualization and we use it for normal firewall functions as well as NAT. And we use it for VPN. We don't use a mobile client, we just use the VPN for mobile users.

2020-09-07T05:57:00Z
author avatar
Top 5Real User

I had 3200 appliances deployed in my company where we had two CMSs. We had multiple VSXs on those appliances due to the main firewall that we had on the VLAN. We also had an external firewall on the VLAN, which were used to monitor and allow the traffic within the network. That is how we were using it. They have a new R81 in place. Currently, they also have R75 deployed in the environment, but they are planning to upgrade to R80.20 because that particular firewall has very high CPU utilization and there is no more support for R75.

2020-09-06T08:04:00Z
author avatar
Top 5MSP

For the SMB appliances, the use case is tricky because I don't actually like them too much. If you have a very small branch office, you could use one of them, but in that case I would just go for the lowest version of the full GAiA models. But for small locations that are not that important, it is possible to use one of the SMB appliances, the 1400 or 1500 series. The full GAiA models, starting with the 3200 and up to the chassis, are the ones we work with the most, and you can use them in almost every environment that you want to secure, from Layer 4 to Layer 7. The only reason to go higher is if they don't perform well enough, and then you go to the chassis which are for really big data centers that need to be secure. About a year or a year-and-a-half ago, they introduced the Maestro solution, which gives you the flexibility of using the normal gateways in a way that you can extend them really easily, without switching to the chassis. You can just plug more and more gateways into the Maestro solution.

2020-09-06T08:04:00Z
author avatar
Top 10Consultant

We work with these firewalls for overall security, including content filtering.

2020-09-03T07:49:00Z
author avatar
Top 5Real User

We are mainly using it for policy installation and access purposes. We have a bank project where we are using mobile access, Antivirus, and IPS. These are all are configured on the Check Point Firewall, where we are using it on a daily basis. I have worked on the following firewall series and models: * 15000 * 23900 * 41000 * 44000. I have worked on the following versions: * R77.30 * R80.10 * R80.20. I am currently working on the R80.20 version and the hardware version is from the 23000 series.

2020-09-03T07:49:00Z
author avatar
Top 5Real User

We use several of the blades. We use it for regular access control, but we also use the application control. We use HTTPS inspection and threat prevention. We use the Mobile Access blades as well IPS. We have a Smart-1 205 as our management server and for the gateway we've got 3200s.

2020-09-02T06:45:00Z
author avatar
Top 10Real User

We use Check Point's firewall to provide network security to our organization as well as to other, third-party vendors.

2020-09-01T05:25:00Z
author avatar
Top 10Real User

We use it to provide security to our environment from the outside world. We are using it to provide security against vulnerabilities using threat prevention, Antivirus, and IPS.

2020-08-30T08:33:00Z
author avatar
Top 10Real User

We use it to provide security in our organization. Check Point Next Generation Firewalls are designed to support large networks, like a telco environment.

2020-08-30T08:33:00Z
author avatar
Top 10MSP

My role is to do implementation and troubleshooting on the Check Point Firewall. We use this firewall for our organization's security by adding restrictions and security from viruses and other tech from the external Internet. It is used in our internal company-wide network. It protects our company throughout the LAN network.

2020-08-27T07:02:00Z
author avatar
Top 5Real User

The reason we have the Check Point Next Generation Firewall is that it's our main perimeter firewall in all our branches around the world. It secures the IT infrastructure in all of our environments and our subsidiaries. We also use it to set up tunnels between all our sites. We have multiple versions from the legacy R77 to the latest R80.40.

2020-08-19T07:57:00Z
author avatar
Top 10Real User

I am using this solution for perimeter security in the company. Our firewall security is centralized under one management. Also, we use this firewall to manage some of the VPN clients and the employees' access across the company. Each firewall is capable of using the VPN client, but we only use two. We have five in total, but we only use two for these issues. I am using the firmware version for the operating system. The blades are firewalled for IPS and mobile access.

2020-08-12T07:01:00Z
author avatar
Top 5Real User

We use Check Point NGFW as a perimeter NAT Gateway with the security features, it helps us to prevent hackers. We implement Check Point-based infrastructures for our customers. In most cases, this is the same perimeter gateway and internal segmentation firewalls. Many of our customers also using the VPN feature to organize remote access to the company's assets for employees, especially in the COVID period, and to connect their branch offices to the base infrastructure. Environments are differing from one out customer to another, but these are primary use cases.

2020-08-02T13:27:00Z
author avatar
Top 5LeaderboardReal User

I have been using this solution since the GAIA OS R77 was there. I am using it for my day to day access such as policy creation, policy modification, and also regularly policy disabling and deletion. I have 17K+ users in my organization, 100 + client to site VPN and I have a number of S2S as well. My daily job is health checkup, security log monitoring and incident management, daily IPS checks, threat presentation reports and to analyze the risk and take necessary action on that as well.

2020-07-30T10:05:00Z
author avatar
Top 10Real User

Check Point NGFW is being used as a security product in the environment. It is securing the IT infrastructure and delivering the services as expected. In the current world scenario, IT is becoming the backbone for every organization, and most business is highly dependant on IT so securing the IT infrastructure is becoming challenging. Check Point NGFW meets the expectations of our organization to secure the IT infrastructure as per organizational need. Check Point NGFW also gives many security features in single box which reduce your management complexities.

2020-07-29T19:59:00Z
author avatar
Top 5LeaderboardReal User

*Perimeter Firewalls - to protect regional hubs and local offices from public space and provide L3-L7 filtering *Internal Segmentation Firewalls - to secure company's internal network from movement of malicious actors and reduce traffic flows only to authorised ones *Public and Private Cloud - to secure hybrid environment either onprem or in the cloud while achieving micro segmentation per host *Cloud Compliance - to get a visibility into cloud environment and and related vulnerabilities *Data Center *SaaS

2020-07-28T14:42:00Z
author avatar
Top 20Real User

The firewall is the primary use case of this solution & IPS is secondary use case of the solutions. We are looking forward to Sandblast solutions. We also use it for cloud expansions The Check Point NGFWs brought up the security level with the help of the advanced software blades - we use Application Control, URL Filtering, IPS, Anti-Bot, and Antivirus. The setup was simple, and the performance is great - we have significant resources to expand the environment in the future without disabling any blades and thus maintaining the security on the same, high level.

2020-07-28T09:29:00Z
author avatar
Top 5LeaderboardReal User

Check Point leading industry provides a complete solution that is required to perimeter security along with deep packet inspection for network traffic. Check Point not only acts as a traditional firewall but it provides you with complete security for users who work from home. Work from home users observed that Check Point gives 100 % functionality without any trouble. It offers centralized management to customers where they have an IT member so there Check Point management can work properly. It is available in a smaller range to higher. Customers can get it at an affordable price.

2020-07-27T11:07:00Z
author avatar
Top 5LeaderboardReal User

The Check Point Next-Generation is a firewall that provides security to our inside network from the outside with next-gen features like Blocking Antibot, Antivirus, IPS, etc. Other than that, Check Point supports threat prevention for zero-day attacks. With the addition to that Check Point firewall, it also provides a VPN. We can configure Star and Mesh IPSec VPN as well as SSL VPN. Logging and reporting is one more important aspect when we talk about firewalls and Check Point did a great job in that.

2020-07-23T14:53:00Z
author avatar
Top 5Real User

Our company works in developing and delivering online gambling platforms. The Check Point NGFWs are the core security solution we use to protect our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Clusters serve as firewalls for both inter-VLAN and external traffic.

2020-07-23T10:53:00Z
author avatar
Top 20Real User

We use it for standard firewalls.

2020-07-22T08:17:00Z
author avatar
Top 10Real User

It is a typical firewall that has been implemented in most of our regions. We use it for normal firewall policies and VPNs. We are mainly using Check Point firewalls. We also have a few Check Point cloud security programs.

2020-07-22T08:17:00Z
author avatar
Top 5Reseller

We have around 500 firewalls all around the world with a global team to manage them. We are using Check Point NGFW for Internet traffic, IPS, and UTM devices. Atos provides this solution, including network design and advice.

2020-07-14T08:15:00Z
author avatar
Top 10Real User

Our primary uses for the Check Point NGFW are network segmentation, identity awareness, and application control.

2020-06-28T08:51:00Z
author avatar
Top 20Real User

We primarily use this solution for routing and the protection of our internal corporate network.

2020-06-28T08:51:00Z
author avatar
Top 10Real User

We are a system integrator and the Check Point Next-Generation Firewall is one of the solutions that we implement for our clients. It is primarily used for data protection, VPNs, and sandboxing. We also use it in our own data center.

2020-06-25T10:49:23Z
author avatar
Top 10Consultant

I am a Check Point distributor and the Next-Generation Firewall is one of the products that I am dealing with. My customers use this as part of their security solution that covers mobile devices, computers, their network, cloud, SD-WAN, IoT devices, IP phones, IP cameras, and others.

2020-06-17T10:55:58Z
author avatar
Top 10Real User

We have a big environment with nearly fifteen multi-vendor clusters. We are using firewalls mainly for layer three access rules. But nowadays, application-layer-based security and threat prevention are also important. We are using IPS and antivirus blades actively, too. In the Intrusion Prevention System blade, we are using a lot of different signatures and actions according to the impact, severity, and cost of the specified signature. The antivirus blade is also in the same logic as the Intrusion Prevention System.

2020-02-17T15:12:00Z
author avatar
Top 20Real User

We use Checkpoint Firewalls to protect Datacenter VLANs against each other. In addition, we use them to protect our perimeter systems from the internet, and our internal network from the perimeter. We have virtualized the systems on a VSX-Cluster using VSLS, but the basics are still the same compared to a traditional cluster. VSX gives us a bit more flexibility in the case of load-sharing. Therefore, it’s quite easy to react in the case of heavily used hardware distributing the load by failover or prioritizing VSs onto different nodes.

2020-02-10T14:40:00Z
author avatar
Top 5Real User

This is a complex high availability solution growing by over 100% per year. The complexity of the business environment made the ability to increase capacity without having to remove previous hardware much easier. We have a large online presence with users needing realtor access to our environment.

2020-02-07T20:14:00Z
author avatar
Top 10Real User

The Check Point NGFW is the best product that I have ever used. It has pluses and minuses, as do others, but the usability, simplicity, and the configuration abilities are very user-friendly. After a while, other vendors just don’t come close to it. The second thing is that is just works and it does it with ease. The upgrades and bug fixes are frequent and well documented. Also, the patches just work ;-) There are some negatives but as I already said, they aren’t many and from my point of view, we can see past them.

2020-02-06T11:13:00Z
author avatar
Real User

We use this solution for our perimeter firewall to protect our web applications, systems, and network. We are running our complete business with Check Point. The complete traffic is managed by Check Point. The Check Point threat emulation blade is enabled to protect zero-day attacks and it will detect and prevent attachments and other payloads from this type of attack.

2020-01-14T11:08:00Z
author avatar
Reseller

The management of our company requires a firewall implementation. We use Check Point to complete the network compliance rules.

2019-07-02T11:50:00Z
author avatar
Top 20Real User

We primarily use the solution as a firewall device and for our VPN.

2019-06-24T12:13:00Z
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: January 2022.
564,643 professionals have used our research since 2012.