Top Rated Check Point Services Alternatives
24 Check Point Services Reviews
Overall Review Sentiment for Check Point Services
Log in to view review sentiment.
We just refreshed our checkpoint hardware, opted this time to not go with appliances as we found them extremely overpriced compared to the hardware you are getting, we saved money by going with their open server license and buying our own servers to run it on. Essentially just buying their software. This also will help keep the performance high throughout the years after updates, as we have them on proper servers, not celeron / i3 processors. They license by core, so get a powerful processor with fast but few cores to save money. Review collected by and hosted on G2.com.
We have been running checkpoint here for a long time and there is good and bad with it. Its security rating is one of the highest, its GUI for management is great, and its log tracker "SmartLog" makes it incredibly easy and fast to obtain the info you need when researching problems or pulling up information. Review collected by and hosted on G2.com.
Excellent cyber security service! Works extremely well for my company, gets the job done. Would totally recommend this product to others. Interface is not too complicated and works like a charm. Review collected by and hosted on G2.com.
I like the customer service and ease of use, the application never felt like a challenge to use, like other, more complicated products my company has previously used. Review collected by and hosted on G2.com.
We had to upgrade an existing firewall in the current company environment Review collected by and hosted on G2.com.
I loved their professionality, and the actual advices we were given to upgrade our system with the minimum effort required. The whole process was quite straightforward and we had no problems in have it running before the due date. Review collected by and hosted on G2.com.

The scenario involved a complete restructuring of security controls, adding to the process of recovering business continuity after a massive attack and theft of critical information. Review collected by and hosted on G2.com.
Immediate response to the incident, highly trained and highly professional advisers, tailored solutions and integrated with the company's infrastructure Review collected by and hosted on G2.com.