Product Avatar Image

Check Point Software Technologies

Show rating breakdown
2,778 reviews
  • 32 profiles
  • 66 categories
Average star rating
4.5
#1 in 27 categories
Grid® leader
Serving customers since
1993
Profile Filters

All Products & Services

Product Avatar Image
Check Point Next Generation Firewalls (NGFWs)

583 reviews

Check Point Firewall. The Check Point Firewall Software Blade incorporates all of the power and capability of the revolutionary FireWall-1 solution while adding user identity awareness to provide granular event awareness and policy enforcement.

Product Avatar Image
Check Point Harmony Email & Collaboration

511 reviews

Check Point Harmony Email & Office, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.

Product Avatar Image
Check Point Cloud Firewall (formerly CloudGuard Network Security)

286 reviews

Check Point CloudGuard Network Security for private and public cloud platforms is designed to protect assets in the cloud against the most sophisticated threats.

Product Avatar Image
Check Point Harmony Endpoint

284 reviews

Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X protection.

Product Avatar Image
Check Point SASE

215 reviews

Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.

Product Avatar Image
Check Point Exposure Management

169 reviews

Cyberint is now a Check Point Company. Its impactful intelligence solution combines cyber threat intelligence, external attack surface management, brand protection, and digital supply chain intelligence into a single, powerful solution. By leveraging autonomous discovery of all of an organization’s external-facing assets, coupled with open, deep & dark web intelligence, the solution enables cybersecurity teams to accelerate the detection and disruption of their most pressing cyber risks. Global customers, including Fortune 500 leaders across all major market verticals, rely on us to prevent, detect, investigate, and remediate phishing, malware, fraud, brand abuse, data leaks, external vulnerabilities, and more, ensuring continuous external protection from cyber threats.

Product Avatar Image
Check Point Infinity Platform

117 reviews

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyberattacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectiviity and inefficient security

Product Avatar Image
Check Point Remote Access VPN

98 reviews

Check Point Remote Access VPN is an enterprise-grade solution that enables secure and seamless remote access to corporate networks and resources for employees working remotely or traveling. It ensures the privacy and integrity of sensitive information through multi-factor authentication, endpoint compliance scanning, and encryption of all transmitted data. Key Features and Functionality: - Secure Remote Access: Provides full IPsec VPN connectivity, ensuring strong authentication, data integrity, and confidentiality. - Multi-Factor Authentication Support: Offers comprehensive authentication options, including username/password, SecurID, RADIUS Challenge/Response, CAPI software and hardware tokens, and P12 certificates. - Endpoint Compliance Scanning: Verifies that client devices comply with the organization's security policies, blocking non-compliant connections to the network. - Seamless User Experience: Features VPN Auto-Connect and logoff when corporate resources are needed and upon network roaming, ensuring a hassle-free experience for users. - Integrated Management: Allows configuration of policies and viewing of VPN events from a single console, streamlining administration. Primary Value and User Solutions: Check Point Remote Access VPN addresses the critical need for secure remote connectivity, enabling employees to access corporate resources safely from any location. By implementing robust security measures such as multi-factor authentication and endpoint compliance scanning, it mitigates risks associated with remote work, including data breaches and unauthorized access. The solution's seamless integration and user-friendly experience enhance productivity while maintaining stringent security standards, making it an essential tool for organizations with remote or traveling employees.

Product Avatar Image
Check Point WAF (formerly CloudGuard WAF)

70 reviews

Automate your application security and API protection with AppSec powered by contextual AI. Stop attacks against your web applications with a fully automated, cloud native application security solution.

Profile Name

Star Rating

2092
604
58
10
14

Check Point Software Technologies Reviews

Review Filters
Profile Name
Star Rating
2092
604
58
10
14
Verified User in Consulting
UC
Verified User in Consulting
05/20/2026
Validated Reviewer
Review source: G2 invite
Incentivized Review

Powerful NGFW, but complexity, licensing headaches, and performance hits create friction

Here is a structured deep dive across those six key pillars for Check Point Next Generation Firewalls (NGFWs): 1. UI / UX SmartConsole: The centralized management interface is highly regarded for its object-oriented architecture. Once you define a network object, you can reuse it across any policy or rule base seamlessly. Complexity: The sheer depth of configuration options means it has a steeper learning curve compared to more minimalist competitors. It is powerful but requires dedicated expertise to navigate efficiently. 2. Integrations Extensive API Support: Check Point provides robust REST APIs, making it highly compatible with CI/CD pipelines, orchestration tools (like Ansible or Terraform), and SIEM/SOAR platforms. Cloud & Hybrid Environments: It integrates smoothly across AWS, Azure, and Google Cloud, allowing unified policy enforcement across on-premise and cloud workloads. 3. Performance Maestro Hyperscale: Check Point's clustering technology allows you to scale performance dynamically by distributing traffic across multiple firewalls, avoiding traditional active-passive bottlenecks. Inspection Overhead: Enabling deep packet inspection, TLS 1.3 decryption, and advanced sandboxing simultaneously will impact throughput, requiring precise sizing during deployment. 4. Pricing / ROI Premium Cost: It sits at the higher end of the enterprise market. Hardware, software licensing (blades), and ongoing support require significant capital. Long-Term Value: The ROI comes from risk mitigation. Preventing a single major breach or downtime event often justifies the upfront licensing costs for enterprise environments. 5. Support / Onboarding User Community & TAC: The Check Point Technical Assistance Center (TAC) is generally responsive for critical issues, and the "CheckMates" user community is an excellent resource for real-world troubleshooting. Onboarding Curve: Due to the complexity of blade architectures (e.g., separating Application Control, URL Filtering, and Threat Prevention), initial deployment usually requires certified professional services or experienced in-house engineers. 6. AI / Intelligence ThreatCloud AI: This is the backbone of their security effectiveness. It aggregates real-time threat intelligence globally, using machine learning models to block zero-day exploits and phishing attempts before they hit the internal network. Autonomous Security: Recent updates lean heavily into automated policy adjustments, minimizing human error in rule creation.
Nijat I.
NI
Nijat I.
Full Stack Developer
05/13/2026
Validated Reviewer
Review source: G2 invite
Incentivized Review

Excellent Traffic Insights for Securing Web Apps and APIs

Check Point WAF was mostly used for monitoring and securing internet-facing applications and APIs receiving traffic from outside clients. The majority of daily operations entailed examining rejected requests, analyzing security events post-deployment, and tuning protection rules in case legitimate traffic was impacted. The main asset in terms of operational activities was insight provided at the HTTP and API level. This allowed for examination of request patterns, header details, path and URL parameters and, if needed, the actual contents of blocked requests, rather than looking at basic network data. It made things more clear whether strange behavior was caused by legitimate application operation, automated scanning, or attack attempts against available services. Post-updates policy tuning was done occasionally because even minor front-end or API changes were affecting some protection settings.
Nijat I.
NI
Nijat I.
Full Stack Developer
05/13/2026
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review

Extensive Network Traffic Visibility That Simplifies Log Analysis and Policy Updates

Most of my work with the Check Point Next Generation Firewalls involved analyzing firewall logs, verifying security policies following infrastructure changes, and examining traffic within, outside, and across the network. One feature that came in particularly handy was having detailed information for any connection that was blocked. Rather than just getting information about the source and destination, I was able to examine the traffic at the application level to see which services and protocols were causing the traffic. In the context of policy changes or adding new apps, this allowed me to make sure that there wasn't any unnecessary exposure while retaining necessary business traffic. Checking hit counts and ensuring that traffic was behaving as expected after making policy changes was also an important task.

About

Contact

HQ Location:
Redwood City, CA

Social

@CheckPointSW

What is Check Point Software Technologies?

Check Point Software Technologies is a global leader in cybersecurity solutions, providing advanced threat prevention and security management for enterprises, cloud environments, and mobile devices. Established in 1993, the company offers a comprehensive range of products, including firewalls, endpoint protection, and cloud security services, designed to safeguard networks and data from various cyber threats. Check Point's innovative technologies are built on a unified architecture, enabling organizations to consolidate their security infrastructure and enhance their overall security posture. For more information, visit their website at https://www.checkpoint.com/.

Details

Year Founded
1993
Ownership
NASDAQ:CHKP