About Check Point Software Technologies

Check Point Software Technologies, founded in 1993 and headquartered in California, United States, provides cybersecurity solutions to governments and businesses. Check Point's multi-level security architecture protects networks, cloud and mobile operations from all known attacks combined with a single point of control management system.

Connect with Check Point Software Technologies


Check Point Software Technologies Products
Showing 6 of 6 products

Details:Firewall that provides access control, content security, authentication and centralized management.
Details: Firewall that provides access control, content security, authentication and centralized management.
Details:Firewall that provides access control, content security, authentication and centralized management.
Details: Firewall that provides access control, content security, authentication and centralized management.
Details:Provides a single management console, security compliance verification, media encryption, anti-malware and program control.
Details: Provides a single management console, security compliance verification, media encryption, anti-malware and program control.

Software Categories:

Details:Provides a single management console, security compliance verification, media encryption, anti-malware and program control.
Details: Provides a single management console, security compliance verification, media encryption, anti-malware and program control.

Software Categories:

Details:Anti-spam and email security app for messaging. Includes zero-hour/signature-based detection and email IPS protection against DoS.
Details: Anti-spam and email security app for messaging. Includes zero-hour/signature-based detection and email IPS protection against DoS.

Software Categories:

Details:Anti-spam and email security app for messaging. Includes zero-hour/signature-based detection and email IPS protection against DoS.
Details: Anti-spam and email security app for messaging. Includes zero-hour/signature-based detection and email IPS protection against DoS.

Software Categories:

Details:CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.
Details: CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.

Software Categories:

Details:CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.
Details: CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.

Software Categories:

Details:Cloud DLP app that allows businesses to protect data from unforeseen loss via document watermark and protocol inspection.
Details: Cloud DLP app that allows businesses to protect data from unforeseen loss via document watermark and protocol inspection.

Software Categories:

Details:Cloud DLP app that allows businesses to protect data from unforeseen loss via document watermark and protocol inspection.
Details: Cloud DLP app that allows businesses to protect data from unforeseen loss via document watermark and protocol inspection.

Software Categories:

Details:Security solution that helps protect enterprise information and prevent attacks on SaaS and cloud-based applications.
Details: Security solution that helps protect enterprise information and prevent attacks on SaaS and cloud-based applications.

Software Categories:

Details:Security solution that helps protect enterprise information and prevent attacks on SaaS and cloud-based applications.
Details: Security solution that helps protect enterprise information and prevent attacks on SaaS and cloud-based applications.

Software Categories:


Check Point Software Technologies Reviews

Showing 3 most recent reviews across 6 products

Overall
4.5/5
Ease of Use
4.5/5
Customer Service
4.5/5
Avatar Image
Mustafa Ö.
Senior Security Engineer
Banking, 5001-10,000 employees
Used the software for: 1-2 years
Overall Rating
3/5
Ease of Use
4/5
Customer Service
4/5
Features
4/5
Value for Money
4/5
Likelihood to Recommend
8/10
Reviewer Source 
Source: Capterra
May 19, 2019

Review of Firewall-1

“It is a successful firewall platform with strong administrative capability.”

OverallWe have been using this product for years. We will soon implement a firewall with Next-Generation Firewall features. We have used security, integration and management features successfully for years. However, in order to use more security features, the transition to a new version of Firewall is quite important.
ProsThe administrative ease of the product, the user-specific interface can be designed and the architecture of the product can be detected quickly by an admin.
ConsMail management in the sense of professionalism has provided to us. Since we've used this platform, we have been used all the features of archiving, backup, continuity, and security.
Reviewer Source 
Source: Capterra
May 19, 2019
Javier Bueso B.
CSO
Chemicals, 1001-5000 employees
Used the software for: 2+ years
Overall Rating
4/5
Ease of Use
4/5
Customer Service
4/5
Features
4/5
Value for Money
4/5
Likelihood to Recommend
8/10
Reviewer Source 
Source: Capterra
May 15, 2019

Review of SandBlast Threat Emulation

“Enough functionality without great efforts”

OverallIt is a good additional measure to security, but I would not implement it as a major countermeasure.
ProsIt is possible to carry out a production start without too much effort, with the default configuration provided by the blades
ConsThe system needs advanced configurations in the network (breaking of SSL, visibility of users) to be fully functional, which forces to design the networking taking into account these requirements
Reviewer Source 
Source: Capterra
May 15, 2019
Avatar Image
Julio M.
Especialista en Redes
Banking, 5001-10,000 employees
Used the software for: 2+ years
Overall Rating
5/5
Ease of Use
5/5
Customer Service
4/5
Features
5/5
Value for Money
5/5
Likelihood to Recommend
9/10
Reviewer Source 
Source: Capterra
August 2, 2018

Review of Blade

“Checkpoint is one of the best in the area of information security”

OverallInitially in the implementation the initial configuration may be a little difficult, however once configured it can be said that it is a platform that is managed and operates without problems
ProsThis is among the best tools in terms of security, you can create personalized rules regarding the actions to be followed according to the company's policies and can use pre-established policies, has good support from the provider
ConsFor some small companies it can be expensive, but beyond that having the data protected I do not see it as a cost or expense but rather an investment
Reviewer Source 
Source: Capterra
August 2, 2018