Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Check Point Identity Awareness Alternatives

Check Point Identity Awareness Reviews & Product Details - Page 2

Check Point Identity Awareness Overview

What is Check Point Identity Awareness?

Check Point Identity Awareness provides granular visibility of users, groups and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console.

Check Point Identity Awareness Details
Show LessShow More
Product Description

Check Point Identity Awareness provides granular visibility of users, groups and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console.


Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,158 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
Ownership
NASDAQ:CHKP
Total Revenue (USD mm)
$2,064
Description

Check Point Software Technologies is a global leader in cybersecurity solutions, providing advanced threat prevention and security management for enterprises, cloud environments, and mobile devices. Established in 1993, the company offers a comprehensive range of products, including firewalls, endpoint protection, and cloud security services, designed to safeguard networks and data from various cyber threats. Check Point's innovative technologies are built on a unified architecture, enabling organizations to consolidate their security infrastructure and enhance their overall security posture. For more information, visit their website at https://www.checkpoint.com/.


MN
Overview Provided by:

Recent Check Point Identity Awareness Reviews

Dhiren J.
DJ
Dhiren J.Mid-Market (51-1000 emp.)
4.5 out of 5
"Checkpoint identity Awareness: access roles and control"
It the solution that most of the organization looking for to create RBAC Policy and user access. It very easy to enable on Magament server and eas...
Aankush K.
AK
Aankush K.Mid-Market (51-1000 emp.)
4.5 out of 5
"Identity Awareness: Application and access control"
The checkpoint Indentity awareness is the easy to deploy , easy to implmemets and works on access roles which reduces network congetions and unauth...
Niyaj T.
NT
Niyaj T.Mid-Market (51-1000 emp.)
4.5 out of 5
"Identity Awareness: Know your user"
the checkpoint identity awareness is the solution that provides authentication with internal AD and LDAP. it is easy to deploy and also easy to int...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Check Point Identity Awareness Media

Answer a few questions to help the Check Point Identity Awareness community
Have you used Check Point Identity Awareness before?
Yes

21 Check Point Identity Awareness Reviews

4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Popular Mentions
The next elements are radio elements and sort the displayed results by the item selected and will update the results displayed.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
21 Check Point Identity Awareness Reviews
4.5 out of 5
21 Check Point Identity Awareness Reviews
4.5 out of 5

Check Point Identity Awareness Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
This product has not yet received any negative sentiments.

Overall Review Sentiment for Check Point Identity AwarenessQuestion

Time to Implement
<1 day
>12 months
Return on Investment
<6 months
48+ months
Ease of Setup
0 (Difficult)
10 (Easy)
Log In
Want to see more insights from verified reviewers?
Log in to view review sentiment.
G2 reviews are authentic and verified.
Verified User in Consumer Services
AC
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Check Point Identity Awareness?

The integration with a domain controller or LDAP protocol to grant access over the user name that can be selected from the active directory to have more dynamic control over your LAN environment and not just pass through the IP address Review collected by and hosted on G2.com.

What do you dislike about Check Point Identity Awareness?

I don't have anything to dislike over this blade doe that has been helpful in our corporation, and every college likes the way that they can connect to their services Review collected by and hosted on G2.com.

What problems is Check Point Identity Awareness solving and how is that benefiting you?

The way of creating the rules based on LDAP user´s in orde to grant access to DMZ sevrers or the internet and not just the IP address from the workstation which is a more dynamic way of control Review collected by and hosted on G2.com.

Verified User in Financial Services
UF
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Check Point Identity Awareness?

Active Directory integration is enriching user and entity behaviors this enrichment is improving the visibility over users and computers. Policies can be created over users and entities. Review collected by and hosted on G2.com.

What do you dislike about Check Point Identity Awareness?

Debugging the Integration of the Active Directory is lıttle bit hard. Review collected by and hosted on G2.com.

What problems is Check Point Identity Awareness solving and how is that benefiting you?

As a part of Next Generation Firewall this blade is natively integrated and boosts the user and groups control all over the intranet. This blade also gives visibility on SIEM solutıon to correlation and detection of anomalies. Review collected by and hosted on G2.com.

Verified User in Telecommunications
AT
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Check Point Identity Awareness?

Its integration with various identity solutions such as Active Directory, Identity Service Engine, etc... Review collected by and hosted on G2.com.

What do you dislike about Check Point Identity Awareness?

There is nothing much to dislike on our side as the solution is efficient. Review collected by and hosted on G2.com.

What problems is Check Point Identity Awareness solving and how is that benefiting you?

The need to authenticate end-users in a more stronger way than just looking at their IP address. It resulted in a much more secure information system. Review collected by and hosted on G2.com.

GM
Infra Tech Lead
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Check Point Identity Awareness?

Creating policies user based so that user activities can be identified. It can also be mapped with IP address Review collected by and hosted on G2.com.

What do you dislike about Check Point Identity Awareness?

Nothing as such. It works good as identity management Review collected by and hosted on G2.com.

What problems is Check Point Identity Awareness solving and how is that benefiting you?

Identity management at ease. Review collected by and hosted on G2.com.

KP
Senior Executive
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Check Point Identity Awareness?

Check Point Adentity Awareness is very easy to configure and manage. Need to open ldap connectivity between ldap server to check point gateway. Review collected by and hosted on G2.com.

What do you dislike about Check Point Identity Awareness?

It is required global domain admin rights to enable the features. as per check point only some permission is required but we have checked it is not working as per Check Point suggested SK. Review collected by and hosted on G2.com.

What problems is Check Point Identity Awareness solving and how is that benefiting you?

After enabling Idenity Awareness blade we are able to find the end users name in logs and also we can create user based policies. Review collected by and hosted on G2.com.

AM
Network Engineer
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Check Point Identity Awareness?

Check Point Identity Awareness allow us to identify the end users who is accessing the resources also it is allow us to create policies based on Users name. We can identify each users activities even we have provided access with IP based also. Review collected by and hosted on G2.com.

What do you dislike about Check Point Identity Awareness?

Identity Awareness blade need AD domain admin credentials to identify users or fetch the users. But there is no dislike for this blade. Review collected by and hosted on G2.com.

Recommendations to others considering Check Point Identity Awareness:

For fetching users activities you must have to enable and configure Check Point Identity Awareness blade Review collected by and hosted on G2.com.

What problems is Check Point Identity Awareness solving and how is that benefiting you?

Identity awareness allow us to identify each users via smart log, we can filter it. It is not possible without identity awareness blade. Review collected by and hosted on G2.com.

Verified User in Financial Services
UF
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Check Point Identity Awareness?

You no longer need to use static IP addresses for rule creation. Review collected by and hosted on G2.com.

What do you dislike about Check Point Identity Awareness?

If it fails to identify users, it causes significant problems. Review collected by and hosted on G2.com.

What problems is Check Point Identity Awareness solving and how is that benefiting you?

We do not need to use static IP addresses and, users can work on any workstation without implementing additional rules. Review collected by and hosted on G2.com.

Oleg P.
OP
Senior DevOps Engineer
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Check Point Identity Awareness?

I like that with the Check Point Identity Awareness we are able to configure our security policy taking into account not only the IP addresses of the users, but their identity - the credential used to log in to the system, the groups user is listed in and so on. I think this approach is more secure, since the rules based on IPs/subnets only may be bypassed by IP spoofing tools on end user PCs. Review collected by and hosted on G2.com.

What do you dislike about Check Point Identity Awareness?

The solution is mature and efficient, I didn't have any struggles while configuring or maintaining it. Review collected by and hosted on G2.com.

What problems is Check Point Identity Awareness solving and how is that benefiting you?

The Check Point Identity Awareness is one of the software blades activated on the Next Generation Firewall used to protect the environment of our DataCenter located in Asia. It provides the system with additional capabilities - now we are able to use not just IP addresses or subnets in our firewall rules, but the access roles created based on the identity of the user trying to reach the networking services. Fo that to work, we integrated Check Point Identity Awareness to work with the Microsoft Active Directory (for end users), and also use identity agents on the terminal servers. It was easy to configure, and doesn't require advanced knowledge about the Active Directory or Check Point products. I think the usage of the Check Point Identity Awareness significantly increases the security of our DataCenter. Review collected by and hosted on G2.com.

AP
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Check Point Identity Awareness?

1. There's a number of ways to collect the identity of the users (we rely mostly on AD integration and Captive Portal).

2. It's easy to create the Access Roles and used them in the unified Security Policy.

3. The mapped user identities are shown in the logs and you could search the entries based on them. Review collected by and hosted on G2.com.

What do you dislike about Check Point Identity Awareness?

Limited support for the RADIUS attributes - we has issues while integrating the Check Point into the Cisco Wireless ecosystem. Review collected by and hosted on G2.com.

Recommendations to others considering Check Point Identity Awareness:

I think the Check Point Identity Awareness software blade provides a great benefit for modern networks from the security standpoint, by simplifying the way you define the security policies. Review collected by and hosted on G2.com.

What problems is Check Point Identity Awareness solving and how is that benefiting you?

The Check Point Identity Awareness software blade is part of the Check Point Next Generation Firewall functionality. We use a number of Check Point NGFW Gateways and Clusters to protect our office networks. With the Identity Awareness software blade you may define the Access Roles of the users based not on IPs, but the their identities - Active Directory credential, groups they belong and so on. The Access Roles then used in the unified security policy. With this blade there's no need to managed the user's IPs or VLANs so scrupulously anymore, which is a great benefit for the modern offices with widespread of the office networks. Review collected by and hosted on G2.com.

Verified User in Consumer Services
IC
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
Business partner of the seller or seller's competitor, not included in G2 scores.
What do you like best about Check Point Identity Awareness?

Can create Dynamic, user based policy while providing multiple identity collectors Review collected by and hosted on G2.com.

What do you dislike about Check Point Identity Awareness?

You need in-depth knowledge to read kernel debugs to understand the issue many at times which can delay resolution. Review collected by and hosted on G2.com.

What problems is Check Point Identity Awareness solving and how is that benefiting you?

You can create policy based on users/groups to allow/deny specific IPs/URLs which using identity connectors which can be used both via agent/agentless based on organization's need. It can integrate without difficulties with the Active Directory and does automatic Sync periodically preventing admins from doing any manual work. Review collected by and hosted on G2.com.