Product Avatar Image

Check Point Software Technologies

Show rating breakdown
2,762 reviews
  • 33 profiles
  • 73 categories
Average star rating
4.5
#1 in 27 categories
Grid® leader
Serving customers since
1993
Profile Filters

All Products & Services

Product Avatar Image
Check Point URL Filtering

58 reviews

Check Point's URL Filtering solution is designed to enhance web security by controlling access to a vast array of websites, categorized by users, groups, and machines. This approach safeguards users from malicious sites and promotes safe internet usage. By integrating UserCheck technology, it educates users on web usage policies in real time, fostering a more informed and secure browsing environment. Key Features and Functionality: - Extensive and Dynamic URL Coverage: The solution offers organizations the capability to dynamically allow, block, or limit access to specific websites in real time. It can manage access to entire websites or specific pages within a site, with fine-tuning policies that incorporate whitelisting and blacklisting of particular URLs. - SSL/TLS Traffic Inspection: Equipped with Check Point's SSL inspection technology, the system scans and secures encrypted SSL/TLS traffic passing through the gateway. Organizations can define granular exceptions for SSL/TLS inspection to protect user privacy and adhere to corporate policies. - 360° Visibility and Reporting: Achieve unparalleled visibility to detect and prevent web access security events. The URL Filtering solution seamlessly integrates with SmartEvent, enabling proactive prevention of web access-related security incidents. - Integration with Application Control: The solution is fully integrated with Application Control, allowing unified enforcement and management across all aspects of web security. This integration enables organizations to define, enforce, and report on web and application security policies at the user and group levels. Primary Value and User Solutions: Check Point's URL Filtering solution addresses the critical need for organizations to protect their networks from web-based threats. By controlling and monitoring web access, it prevents exposure to malicious sites, reduces the risk of data breaches, and ensures compliance with corporate internet usage policies. The integration with UserCheck technology not only enforces security measures but also educates users, promoting responsible web usage. This comprehensive approach enhances overall network security, optimizes operational efficiency, and reduces the total cost of ownership by eliminating the need for external proxies and additional security solutions.

Product Avatar Image
Check Point CloudGuard WAF

56 reviews

Automate your application security and API protection with AppSec powered by contextual AI. Stop attacks against your web applications with a fully automated, cloud native application security solution.

Product Avatar Image
Check Point Harmony Mobile Protection

55 reviews

Check Point Harmony Mobile is a comprehensive mobile threat defense solution designed to safeguard corporate data by securing employees' mobile devices across all attack vectors, including applications, networks, and operating systems. It seamlessly integrates into existing mobile environments, ensuring robust protection without compromising user experience or privacy. Key Features and Functionality: - App and File Protection: Detects and blocks the download of malicious apps and files in real-time, preventing malware from infiltrating devices. - Network Protection: Offers a range of network security capabilities, including anti-phishing, safe browsing, anti-bot measures, URL filtering, protected DNS, and Wi-Fi network security to detect and prevent network-based attacks. - User-Friendly Deployment: Integrates seamlessly with existing mobile environments, allowing for quick deployment and scaling without impacting user experience or privacy. - Comprehensive Threat Defense: Utilizes advanced technologies to prevent threats to the operating system, applications, and network, ensuring a high threat catch rate with minimal impact on device performance. Primary Value and User Solutions: Harmony Mobile addresses the growing need for robust mobile security in organizations by providing complete protection against sophisticated cyber threats targeting mobile devices. It ensures that corporate data remains secure, even as employees access resources from various devices and locations. By offering a user-friendly and easily deployable solution, Harmony Mobile enables organizations to enforce security policies effectively, maintain compliance, and protect sensitive information without disrupting productivity or user privacy.

Product Avatar Image
Check Point Infinity Platform

49 reviews

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyberattacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectiviity and inefficient security

Product Avatar Image
Check Point Mobile Access

30 reviews

Mobile data protection (MDP) systems and procedures are needed to protect business data privacy, meet regulatory and contractual requirements, and comply with audits.

Product Avatar Image
Check Point ZoneAlarm for Business

26 reviews

ZoneAlarm, a Check Point Software Technologies, Inc. Company, is a world leader in mobile privacy protection (VPN & antivirus) and consumer Internet security.

Product Avatar Image
Check Point Infinity Global Services

26 reviews

Check Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats.

Product Avatar Image
Quantum DDoS Protector

25 reviews

Check Point DDoS Protector uses a hybrid of dedicated on-premises and cloud-based resources to defend against volumetric, application, reflective and resource-exhaustive DDoS attacks.

Product Avatar Image
Check Point Capsule Mobile Secure Workspace

21 reviews

Check Point Capsule Mobile Secure Workspace is a mobile security solution that establishes a secure, isolated corporate environment on personal devices, ensuring the protection of corporate data both within and beyond the corporate network. By creating an encrypted container, it allows employees to access business resources securely without compromising personal data, thereby supporting a balanced approach to Bring Your Own Device (BYOD) policies. Key Features and Functionality: - Secure Access Control: Implements robust authentication methods, including Active Directory, LDAP, RADIUS, and RSA SecureID, to ensure that only authorized users can access corporate resources. - Data Encryption: Utilizes AES256-bit encryption to safeguard data at rest and in transit, maintaining the confidentiality and integrity of corporate information. - Remote Wipe Capability: Enables administrators to remotely erase corporate data from lost or stolen devices, mitigating potential data breaches. - Root and Jailbreak Detection: Identifies compromised devices and restricts their access to corporate resources, preventing security vulnerabilities. - Seamless User Experience: Provides intuitive access to essential business applications such as email, calendar, contacts, and corporate intranets, enhancing productivity without sacrificing security. - Platform Compatibility: Supports both iOS and Android devices, ensuring broad accessibility across various mobile platforms. Primary Value and User Solutions: Check Point Capsule Mobile Secure Workspace addresses the critical need for secure mobile access to corporate data in today's increasingly mobile workforce. By segregating corporate and personal data, it upholds user privacy while enforcing stringent security measures. This solution empowers organizations to implement effective BYOD strategies, boosting employee productivity without compromising data security. Additionally, its simplified management reduces the time, effort, and cost associated with securing mobile devices and data, offering a comprehensive and efficient approach to mobile security.

Profile Name

Star Rating

2089
588
58
8
14

Check Point Software Technologies Reviews

Review Filters
Profile Name
Star Rating
2089
588
58
8
14
ANKIT S.
AS
ANKIT S.
Executive Engineer (IT)
04/13/2026
Validated Reviewer
Review source: G2 invite
Incentivized Review

Effective Threat Prevention and Unified Cloud Security Management

It provides deep visibility and control, helping teams quickly detect, respond, and remediate threats across distributed environments.it stands out for combining scalability, automation, and high detection accuracy.
Verified User in Financial Services
UF
Verified User in Financial Services
04/13/2026
Validated Reviewer
Review source: G2 invite
Incentivized Review

Impressive AI Enablement and Fast Data Throughput for Stronger Protection

The AI enablement and the sheer speed at which data can pass through Check Point are amazing. With AI-driven cyber fraud on the rise, almost every online business requires more protection than ever before against bot attacks, ransomware, and similar threats.
Onix C.
OC
Onix C.
On a Mission To Find Elite Sap Talent
04/13/2026
Validated Reviewer
Review source: G2 invite
Incentivized Review

Reliable Cloud-Ready Check Point NGFWs with Strong Threat Prevention

Check Point NGFWs perform reliably in cloud-heavy environments with stable VPC routing, segmentation, and HA behavior even as traffic scales, and that their threat engines remain very strong for inline inspection, TLS decryption, and custom signatures without killing performance.

About

Contact

HQ Location:
San Carlos, CA

Social

@CheckPointSW

What is Check Point Software Technologies?

Check Point Software Technologies is a global leader in cybersecurity solutions, providing advanced threat prevention and security management for enterprises, cloud environments, and mobile devices. Established in 1993, the company offers a comprehensive range of products, including firewalls, endpoint protection, and cloud security services, designed to safeguard networks and data from various cyber threats. Check Point's innovative technologies are built on a unified architecture, enabling organizations to consolidate their security infrastructure and enhance their overall security posture. For more information, visit their website at https://www.checkpoint.com/.

Details

Year Founded
1993
Ownership
NASDAQ:CHKP