Check Point Software Technologies

Firewall-1


5 / 5
2 reviews


Average Ratings

2 Reviews

  • 5 / 5
    Overall

  • 5 / 5
    Ease of Use

  • 4.5 / 5
    Customer Service

Product Details

  • Starting Price
    Not provided by vendor
  • Deployment
    Cloud, SaaS, Web
  • Training
    Webinars
    Live Online
  • Support
    Online
    Business Hours

Vendor Details

  • Check Point Software Technologies
  • www.checkpoint.com
  • Israel

About Firewall-1

Firewall that provides access control, content security, authentication and centralized management.


Spotlight media placeholder

Firewall-1 Features

  • Anti Spam
  • Anti Virus
  • Email Attachment Protection
  • Event Tracking
  • Internet Usage Monitoring
  • Intrusion Detection System
  • IP Protection
  • Spyware Removal
  • Two-Factor Authentication
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Anti Spam
  • Anti Virus
  • Audit Trail
  • Compliance Management
  • Database Security Audit
  • File Access Control
  • Financial Data Protection
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
  • Virus Definition Update
  • Vulnerability Protection

Firewall-1 Reviews Recently Reviewed!


Capterra loader

My computer system has been absolutely protected

May 24, 2018
5/5
Overall

5 / 5
Ease of Use

5 / 5
Features & Functionality

4 / 5
Customer Support

5 / 5
Value for Money
Likelihood to Recommend: 10.0/10 Not
Likely
Extremely
Likely

Pros: It was easy to install, connectivity has been secured, It allows to block not authorized accesses and prevents hackers access to my private network or confidential information.

Cons: To know with accuracy the configuration in order to avoid any block in connections or programs and some attacks do not pass through the software

Overall: computer security

Security and confidence at the computer level.

Jun 13, 2018
5/5
Overall

5 / 5
Ease of Use

5 / 5
Features & Functionality

5 / 5
Customer Support

5 / 5
Value for Money
Likelihood to Recommend: 10.0/10 Not
Likely
Extremely
Likely

Pros: It is easy to install and manage, executes unsafe page locks and allows to keep information on the computer safe.

Cons: learn to choose the best configuration according to the use that is given to the computer to avoid blocking of pages of routine use.

Overall: Surf securely on the network.