Top Rated Checkpoint Zero Trust Security Alternatives
In short time we can integrate data resources and gain telemetry within environment. This tool interface good visualizations and designed for bid database. Review collected by and hosted on G2.com.
When we going to create any custom machine learning model it gets crashed and sometimes it will hang also. It's important to fix this issue on priority basis and there are no more such particular dislikes to discuss. It's an awesome platform to work. Review collected by and hosted on G2.com.
156 out of 157 Total Reviews for Checkpoint Zero Trust Security
Overall Review Sentiment for Checkpoint Zero Trust Security
Log in to view review sentiment.
Inexpensive solution that does exactly what we need with very few hiccups ever. Using this as a cloud VPN for users to access company network. Seamless, very easy to set up and use. Support is always responsive when I have a question. Online chat works really well when I have a quick question. We only have a dozen users that need it. It requires little maintenance. It just works. Review collected by and hosted on G2.com.
Had troubles setting it up to work with our DNS. It was only working with IP addresses and not with the names (e.g., to RDP to a server you had to use the IP address; server name wasn't working). Most of the issue was with our infrastructure, not Check Point. Support helped us get it working. Review collected by and hosted on G2.com.

Their sales process sold us lies about compatibility with IOS and Android when they never had it. And I have mentioned it isn't on the roadmap anymore for next year. Review collected by and hosted on G2.com.
No Split tunneling of traffic available on Android and iOS platforms
Logs cannot be exported to external logging services.
Entra AD integration is only supported through SAML and not SCIM. SCIM process needs to be controlled manually.
No Tunnel Monitoring Logs
There is no direct Integration with the AWS transit gateway. You have to buy additional modules for this.
Network segmentation is not possible depending on the Entra group
Limited Device posture check
Client logging is not available
DLP monitoring is not available
Minimal support for iAC or Terraform. Everything is point and click, thus not supporting a baseline configuration.
No API
No Alerting for tunnel status
No Up-to-date Terraform provider
Limited egress logging
Ad-blocking and/or Malware Protection is a separate module you must purchase.
No Kill Switch Review collected by and hosted on G2.com.

It the solution that most of the organization looking for to create RBAC Policy and user access. It very easy to enable on Magament server and easy to implement as well. Review collected by and hosted on G2.com.
Since more than 1.5 years i am using biut there os no point which i dislike about it. Review collected by and hosted on G2.com.

Check Point Harmony SASE is a user-friendly service edge solution. Deployment process is often reported as straightforward, with clear guidance and support provided by Check Point. Users find Check Point Harmony SASE to be a reliable solution for daily operations. The solution offers a wide range of features, including threat prevention, secure web browsing, data loss prevention, and more. Check Point continuously updates its services with new features anda enhancements, ensuring that users stay ahead of emerging threats and technologies. Supports a wide range of devices and platforms, allowing organizations to unify their security management across different environments. Review collected by and hosted on G2.com.
While there may be a learning curve and some cost considerations, these are minor compared to the overall benefits and security enhancements offered by Check Point Harmony SASE. Overall Good. Review collected by and hosted on G2.com.

Check Point Endpoint Security Suite has enhanced secure collaboration of teams in the enterpries and remote areas. The platform tracks data from initial processing to the end user providing best security measures that cannot be easily compromised. Data analysis has been safe and there is zero cases of malicious attacks. Review collected by and hosted on G2.com.
The security suite has achieved most crucial objectives of securing endpoint devices. Review collected by and hosted on G2.com.
CheckPoint Identity awareness has ability to provide, user basd access controls, easy integration with existing and AD/LDAP and easy to implemet. check point provide 30 day free trail to use this feature and explore this. Review collected by and hosted on G2.com.
no points which I dislike about this also recived positive feedback from many of our costomers. Review collected by and hosted on G2.com.

The checkpoint Indentity awareness is the easy to deploy , easy to implmemets and works on access roles which reduces network congetions and unauthorized access Review collected by and hosted on G2.com.
no points which i dislike about it. as still I am explorings. Review collected by and hosted on G2.com.

The platform offers comprehensive protection cover against all forms of external threats that can affect development lifecycle. It provides secure access with powerful VPN to our remote developers to enhance secure collaboration and connection. Check Point Endpoint Security Suite has enhnaced compliance with security policies that safeguards data. Review collected by and hosted on G2.com.
The performance has been stable since we deployed this platform in the enterprise. Review collected by and hosted on G2.com.

the checkpoint identity awareness is the solution that provides authentication with internal AD and LDAP. it is easy to deploy and also easy to integrate with AD and Management Server. Review collected by and hosted on G2.com.
still i am using this solution and as of now i have not faced any issue. Review collected by and hosted on G2.com.

This is the most advanced tool that has highly prevented cyber attacks in my department. It offers timely alerts when there impending ransoware attacks targeting our development projects. There were high rate of cases that could lead to higher risks and expose confidential customer data to external threats. Check Point Endpoint Security Suite has promoted secure data handling ethics. Review collected by and hosted on G2.com.
I encountered few learning curve challenges after deployment which lasted shortly afer full enrollment for video and physical training sessions. Review collected by and hosted on G2.com.