Top Rated Check Point Identity Awareness Alternatives
21 Check Point Identity Awareness Reviews
Overall Review Sentiment for Check Point Identity Awareness
Log in to view review sentiment.
The integration with a domain controller or LDAP protocol to grant access over the user name that can be selected from the active directory to have more dynamic control over your LAN environment and not just pass through the IP address Review collected by and hosted on G2.com.
I don't have anything to dislike over this blade doe that has been helpful in our corporation, and every college likes the way that they can connect to their services Review collected by and hosted on G2.com.
Active Directory integration is enriching user and entity behaviors this enrichment is improving the visibility over users and computers. Policies can be created over users and entities. Review collected by and hosted on G2.com.
Debugging the Integration of the Active Directory is lıttle bit hard. Review collected by and hosted on G2.com.
Its integration with various identity solutions such as Active Directory, Identity Service Engine, etc... Review collected by and hosted on G2.com.
There is nothing much to dislike on our side as the solution is efficient. Review collected by and hosted on G2.com.
Creating policies user based so that user activities can be identified. It can also be mapped with IP address Review collected by and hosted on G2.com.
Nothing as such. It works good as identity management Review collected by and hosted on G2.com.
Check Point Adentity Awareness is very easy to configure and manage. Need to open ldap connectivity between ldap server to check point gateway. Review collected by and hosted on G2.com.
It is required global domain admin rights to enable the features. as per check point only some permission is required but we have checked it is not working as per Check Point suggested SK. Review collected by and hosted on G2.com.
Check Point Identity Awareness allow us to identify the end users who is accessing the resources also it is allow us to create policies based on Users name. We can identify each users activities even we have provided access with IP based also. Review collected by and hosted on G2.com.
Identity Awareness blade need AD domain admin credentials to identify users or fetch the users. But there is no dislike for this blade. Review collected by and hosted on G2.com.
You no longer need to use static IP addresses for rule creation. Review collected by and hosted on G2.com.
If it fails to identify users, it causes significant problems. Review collected by and hosted on G2.com.

I like that with the Check Point Identity Awareness we are able to configure our security policy taking into account not only the IP addresses of the users, but their identity - the credential used to log in to the system, the groups user is listed in and so on. I think this approach is more secure, since the rules based on IPs/subnets only may be bypassed by IP spoofing tools on end user PCs. Review collected by and hosted on G2.com.
The solution is mature and efficient, I didn't have any struggles while configuring or maintaining it. Review collected by and hosted on G2.com.
1. There's a number of ways to collect the identity of the users (we rely mostly on AD integration and Captive Portal).
2. It's easy to create the Access Roles and used them in the unified Security Policy.
3. The mapped user identities are shown in the logs and you could search the entries based on them. Review collected by and hosted on G2.com.
Limited support for the RADIUS attributes - we has issues while integrating the Check Point into the Cisco Wireless ecosystem. Review collected by and hosted on G2.com.
Can create Dynamic, user based policy while providing multiple identity collectors Review collected by and hosted on G2.com.
You need in-depth knowledge to read kernel debugs to understand the issue many at times which can delay resolution. Review collected by and hosted on G2.com.