Top Rated Check Point Identity Awareness Alternatives
Active Directory integration is enriching user and entity behaviors this enrichment is improving the visibility over users and computers. Policies can be created over users and entities. Review collected by and hosted on G2.com.
Debugging the Integration of the Active Directory is lıttle bit hard. Review collected by and hosted on G2.com.
20 out of 21 Total Reviews for Check Point Identity Awareness
Overall Review Sentiment for Check Point Identity Awareness
Log in to view review sentiment.

It the solution that most of the organization looking for to create RBAC Policy and user access. It very easy to enable on Magament server and easy to implement as well. Review collected by and hosted on G2.com.
Since more than 1.5 years i am using biut there os no point which i dislike about it. Review collected by and hosted on G2.com.
CheckPoint Identity awareness has ability to provide, user basd access controls, easy integration with existing and AD/LDAP and easy to implemet. check point provide 30 day free trail to use this feature and explore this. Review collected by and hosted on G2.com.
no points which I dislike about this also recived positive feedback from many of our costomers. Review collected by and hosted on G2.com.

The checkpoint Indentity awareness is the easy to deploy , easy to implmemets and works on access roles which reduces network congetions and unauthorized access Review collected by and hosted on G2.com.
no points which i dislike about it. as still I am explorings. Review collected by and hosted on G2.com.

the checkpoint identity awareness is the solution that provides authentication with internal AD and LDAP. it is easy to deploy and also easy to integrate with AD and Management Server. Review collected by and hosted on G2.com.
still i am using this solution and as of now i have not faced any issue. Review collected by and hosted on G2.com.
Check Point Zero Trust Security has strong, proactive threat prevention, easy-to-use access control, which is why I like it. Review collected by and hosted on G2.com.
Setting everything up and configuring for the first time takes a lot of time. Review collected by and hosted on G2.com.

check Point idendity awareness provide access base on user that no other user take access of person for which actually policy is created. also it is very ease to implemet. Review collected by and hosted on G2.com.
As far some time it gives false positive outcome. that outcome is alos provided with other OEM. Review collected by and hosted on G2.com.

The most outstanding features of this solution give us complete visibility of user activity and access to resources, giving us a solution that allows us to see users in real time, assign them policies based on a profile and role, which allows us granularity. with increased network security by identifying and validating each instance of user activity in question Review collected by and hosted on G2.com.
It is important to understand that there are features that we do not like and it is that its configuration is a bit complex which may require expert And continuous training so that the administrators can manage each of the integrations with other authentication systems, how to make active directory active directory any other of the services that would need a compatibility resolution problem Review collected by and hosted on G2.com.
Check Point Identity Awareness has many security features such as the identification of users who access the network and provides access control also ensures compliance with various regulations. With these and other features, they improve security by being able to integrate user identity information into security policies and provide a valuable tool and better visibility. Review collected by and hosted on G2.com.
In order to use this tool, the IT department must have a basic knowledge of the tool, as the learning curve is high, which can cause the initial setup and deployment of the solution to be complex, as well as the requirements that must be taken into account. of the organization since if additional features are required, the solution is more expensive, on the other hand, continuous maintenance must be carried out, which if you are not trained, you have to use the support and this leads to more expenses Review collected by and hosted on G2.com.
It's free of charge with the product. You have many options for integration with Active directory and other 3rd party vendors—no need to install additional software for integration. Firewalls can query the AD on their own. Support for Directory agent is an excellent option for large environments. There's terminal support and Syslog option even we can parse the logs to check user info. Smartview tracker shows all the user-based activities. Deployment is straightforward, just open the blade and follow the steps. User sharing is great for large firewall deployments. Smart event and reporter show user-based activities in many reports. Review collected by and hosted on G2.com.
Large environments should use the directory agent. Otherwise, firewalls have performance issues. We have seen even bandwidth peaks on the lines. Service users should be analyzed and taken into consideration. Problem resolution needs debugging on the firewall side. Duplicate users or logins can be seen in the deployment. The first deployment needs an admin account on the AD, otherwise fails. Review collected by and hosted on G2.com.
You can create policies user based and easily identify activities even with ip tracking. Review collected by and hosted on G2.com.
good management, easy to use, great service, check point high standards remains Review collected by and hosted on G2.com.