Its a software that I can trust to give me a high-quality performance to keep all my data safe. I like how they release reliable charts that lets me see if there is a problem occurring in my security.
The method of URL Filtering is the safest way, in my opinion, to implement in my company since it seems to detect everything from the "roots" of the problem and helps keep everything in place by scanning and filtering results.
Getting started was really easy and this software does not require much knowledge but they still are very responsive, which I absolutely love. Review collected by and hosted on G2.com.
I don't think there's much I dislike since Check Point has proven to be a software that is fully supportive and tries to keep updates on time to preserve a safe environment for everyone. I like that I'm able to relay on this software to keep my data safe. Review collected by and hosted on G2.com.
I like that how easy it is to implement the new protecting mechanisms on Check Point in general - you just enable the new software blade and it's done. The Check Point URL Filtering blade is not an exception. After enabling, it's up and ready to serve - you may start using the "URL categories" in the security policies used by your Check Point Gateways and Clusters. I have found all the categories needed and even didn't have to create any new groups or domain lists manually - the Check Point team has a long experience in this field and have preconfigured everything in advance - the amount of the built-in categories is amazing. Review collected by and hosted on G2.com.
The Check Point Check Point URL Filtering software blade for version R80.10 we use in our company is efficient and mature product, so I didn't face any issues I could complaint about during configuration or maintaining this solution. Review collected by and hosted on G2.com.
1. There are hundreds of pre-defined website categories in the built-in database.
2. You may create the custom categories or group the predefined categories into objects and simply use them in the firewall policy rules.
3. Granularity - it's possible to block access to specific pages of the website without blocking the general access to it.
4. Check Point provides the external URL Categorization portal where you could the the domain and it's categories.
5. The databases are updated on a regular basis and you don't need to install the security policy on the GWs to use the updated databases. Review collected by and hosted on G2.com.
We are completely satisfied with the Check Point URL Filtering software blade - it was easy to implement and configure. Review collected by and hosted on G2.com.