Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Check Point Identity Awareness Alternatives

Check Point Identity Awareness Reviews & Product Details - Page 3

Check Point Identity Awareness Overview

What is Check Point Identity Awareness?

Check Point Identity Awareness provides granular visibility of users, groups and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console.

Check Point Identity Awareness Details
Show LessShow More
Product Description

Check Point Identity Awareness provides granular visibility of users, groups and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console.


Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,158 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
Ownership
NASDAQ:CHKP
Total Revenue (USD mm)
$2,064
Description

Check Point Software Technologies is a global leader in cybersecurity solutions, providing advanced threat prevention and security management for enterprises, cloud environments, and mobile devices. Established in 1993, the company offers a comprehensive range of products, including firewalls, endpoint protection, and cloud security services, designed to safeguard networks and data from various cyber threats. Check Point's innovative technologies are built on a unified architecture, enabling organizations to consolidate their security infrastructure and enhance their overall security posture. For more information, visit their website at https://www.checkpoint.com/.


MN
Overview Provided by:

Recent Check Point Identity Awareness Reviews

Dhiren J.
DJ
Dhiren J.Mid-Market (51-1000 emp.)
4.5 out of 5
"Checkpoint identity Awareness: access roles and control"
It the solution that most of the organization looking for to create RBAC Policy and user access. It very easy to enable on Magament server and eas...
Aankush K.
AK
Aankush K.Mid-Market (51-1000 emp.)
4.5 out of 5
"Identity Awareness: Application and access control"
The checkpoint Indentity awareness is the easy to deploy , easy to implmemets and works on access roles which reduces network congetions and unauth...
Niyaj T.
NT
Niyaj T.Mid-Market (51-1000 emp.)
4.5 out of 5
"Identity Awareness: Know your user"
the checkpoint identity awareness is the solution that provides authentication with internal AD and LDAP. it is easy to deploy and also easy to int...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Check Point Identity Awareness Media

Answer a few questions to help the Check Point Identity Awareness community
Have you used Check Point Identity Awareness before?
Yes

21 Check Point Identity Awareness Reviews

4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Popular Mentions
The next elements are radio elements and sort the displayed results by the item selected and will update the results displayed.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
21 Check Point Identity Awareness Reviews
4.5 out of 5
21 Check Point Identity Awareness Reviews
4.5 out of 5

Check Point Identity Awareness Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
This product has not yet received any negative sentiments.

Overall Review Sentiment for Check Point Identity AwarenessQuestion

Time to Implement
<1 day
>12 months
Return on Investment
<6 months
48+ months
Ease of Setup
0 (Difficult)
10 (Easy)
Log In
Want to see more insights from verified reviewers?
Log in to view review sentiment.
G2 reviews are authentic and verified.
Kirtikumar P.
KP
Network Engineer
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Check Point Identity Awareness?

With this blade we are able to find out our end user based logs and also we can create users based policy on our perimeter device. Review collected by and hosted on G2.com.

What do you dislike about Check Point Identity Awareness?

dislike for this blade? no there is no such disadvantages Review collected by and hosted on G2.com.

Recommendations to others considering Check Point Identity Awareness:

If you haave checkpoint on perimeter then you should must have to purchase Check POint Identity Awareness Review collected by and hosted on G2.com.

What problems is Check Point Identity Awareness solving and how is that benefiting you?

With checkpoint Identity awareness we are able to create and find users based access. Review collected by and hosted on G2.com.