Product Avatar Image

Check Point Software Technologies

Show rating breakdown
2,776 reviews
  • 32 profiles
  • 66 categories
Average star rating
4.5
#1 in 27 categories
Grid® leader
Serving customers since
1993
Profile Filters

All Products & Services

Product Avatar Image
Check Point Next Generation Firewalls (NGFWs)

582 reviews

Check Point Firewall. The Check Point Firewall Software Blade incorporates all of the power and capability of the revolutionary FireWall-1 solution while adding user identity awareness to provide granular event awareness and policy enforcement.

Product Avatar Image
Check Point Harmony Email & Collaboration

511 reviews

Check Point Harmony Email & Office, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.

Product Avatar Image
Check Point Cloud Firewall (formerly CloudGuard Network Security)

286 reviews

Check Point CloudGuard Network Security for private and public cloud platforms is designed to protect assets in the cloud against the most sophisticated threats.

Product Avatar Image
Check Point Harmony Endpoint

284 reviews

Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X protection.

Product Avatar Image
Check Point SASE

215 reviews

Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.

Product Avatar Image
Check Point Exposure Management

169 reviews

Cyberint is now a Check Point Company. Its impactful intelligence solution combines cyber threat intelligence, external attack surface management, brand protection, and digital supply chain intelligence into a single, powerful solution. By leveraging autonomous discovery of all of an organization’s external-facing assets, coupled with open, deep & dark web intelligence, the solution enables cybersecurity teams to accelerate the detection and disruption of their most pressing cyber risks. Global customers, including Fortune 500 leaders across all major market verticals, rely on us to prevent, detect, investigate, and remediate phishing, malware, fraud, brand abuse, data leaks, external vulnerabilities, and more, ensuring continuous external protection from cyber threats.

Product Avatar Image
Check Point Infinity Platform

116 reviews

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyberattacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectiviity and inefficient security

Product Avatar Image
Check Point Remote Access VPN

98 reviews

Check Point Remote Access VPN is an enterprise-grade solution that enables secure and seamless remote access to corporate networks and resources for employees working remotely or traveling. It ensures the privacy and integrity of sensitive information through multi-factor authentication, endpoint compliance scanning, and encryption of all transmitted data. Key Features and Functionality: - Secure Remote Access: Provides full IPsec VPN connectivity, ensuring strong authentication, data integrity, and confidentiality. - Multi-Factor Authentication Support: Offers comprehensive authentication options, including username/password, SecurID, RADIUS Challenge/Response, CAPI software and hardware tokens, and P12 certificates. - Endpoint Compliance Scanning: Verifies that client devices comply with the organization's security policies, blocking non-compliant connections to the network. - Seamless User Experience: Features VPN Auto-Connect and logoff when corporate resources are needed and upon network roaming, ensuring a hassle-free experience for users. - Integrated Management: Allows configuration of policies and viewing of VPN events from a single console, streamlining administration. Primary Value and User Solutions: Check Point Remote Access VPN addresses the critical need for secure remote connectivity, enabling employees to access corporate resources safely from any location. By implementing robust security measures such as multi-factor authentication and endpoint compliance scanning, it mitigates risks associated with remote work, including data breaches and unauthorized access. The solution's seamless integration and user-friendly experience enhance productivity while maintaining stringent security standards, making it an essential tool for organizations with remote or traveling employees.

Product Avatar Image
Check Point WAF (formerly CloudGuard WAF)

70 reviews

Automate your application security and API protection with AppSec powered by contextual AI. Stop attacks against your web applications with a fully automated, cloud native application security solution.

Profile Name

Star Rating

2092
604
58
9
14

Check Point Software Technologies Reviews

Review Filters
Profile Name
Star Rating
2092
604
58
9
14
Nijat I.
NI
Nijat I.
Full Stack Developer
05/13/2026
Validated Reviewer
Review source: G2 invite
Incentivized Review

Excellent Traffic Insights for Securing Web Apps and APIs

Check Point WAF was mostly used for monitoring and securing internet-facing applications and APIs receiving traffic from outside clients. The majority of daily operations entailed examining rejected requests, analyzing security events post-deployment, and tuning protection rules in case legitimate traffic was impacted. The main asset in terms of operational activities was insight provided at the HTTP and API level. This allowed for examination of request patterns, header details, path and URL parameters and, if needed, the actual contents of blocked requests, rather than looking at basic network data. It made things more clear whether strange behavior was caused by legitimate application operation, automated scanning, or attack attempts against available services. Post-updates policy tuning was done occasionally because even minor front-end or API changes were affecting some protection settings.
Nijat I.
NI
Nijat I.
Full Stack Developer
05/13/2026
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review

Extensive Network Traffic Visibility That Simplifies Log Analysis and Policy Updates

Most of my work with the Check Point Next Generation Firewalls involved analyzing firewall logs, verifying security policies following infrastructure changes, and examining traffic within, outside, and across the network. One feature that came in particularly handy was having detailed information for any connection that was blocked. Rather than just getting information about the source and destination, I was able to examine the traffic at the application level to see which services and protocols were causing the traffic. In the context of policy changes or adding new apps, this allowed me to make sure that there wasn't any unnecessary exposure while retaining necessary business traffic. Checking hit counts and ensuring that traffic was behaving as expected after making policy changes was also an important task.
Sobit T.
ST
Sobit T.
Head - Information Security Officer | Learner | Security Governance | ISO 27001:2022, 42001:2023 Lead Auditor | CEH | CRG
05/13/2026
Validated Reviewer
Review source: G2 invite
Incentivized Review

Robust Threat Prevention and Fast Browsing, but Setup and Licensing Are Complex

i like its high level of security, blocking almost all threats effectively. It has simple cloud dashboard, which makes it easier to manage security for remote and hybrid workers in one place.

About

Contact

HQ Location:
Redwood City, CA

Social

@CheckPointSW

What is Check Point Software Technologies?

Check Point Software Technologies is a global leader in cybersecurity solutions, providing advanced threat prevention and security management for enterprises, cloud environments, and mobile devices. Established in 1993, the company offers a comprehensive range of products, including firewalls, endpoint protection, and cloud security services, designed to safeguard networks and data from various cyber threats. Check Point's innovative technologies are built on a unified architecture, enabling organizations to consolidate their security infrastructure and enhance their overall security posture. For more information, visit their website at https://www.checkpoint.com/.

Details

Year Founded
1993
Ownership
NASDAQ:CHKP