Product Avatar Image

Check Point Software Technologies

Show rating breakdown
2,777 reviews
  • 33 profiles
  • 73 categories
Average star rating
4.5
#1 in 27 categories
Grid® leader
Serving customers since
1993
Profile Filters

All Products & Services

Profile Name

Star Rating

2092
604
58
9
14

Check Point Software Technologies Reviews

Review Filters
Profile Name
Star Rating
2092
604
58
9
14
Nijat I.
NI
Nijat I.
Full Stack Developer
05/13/2026
Validated Reviewer
Review source: G2 invite
Incentivized Review

Excellent Traffic Insights for Securing Web Apps and APIs

Check Point WAF was mostly used for monitoring and securing internet-facing applications and APIs receiving traffic from outside clients. The majority of daily operations entailed examining rejected requests, analyzing security events post-deployment, and tuning protection rules in case legitimate traffic was impacted. The main asset in terms of operational activities was insight provided at the HTTP and API level. This allowed for examination of request patterns, header details, path and URL parameters and, if needed, the actual contents of blocked requests, rather than looking at basic network data. It made things more clear whether strange behavior was caused by legitimate application operation, automated scanning, or attack attempts against available services. Post-updates policy tuning was done occasionally because even minor front-end or API changes were affecting some protection settings.
Nijat I.
NI
Nijat I.
Full Stack Developer
05/13/2026
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review

Extensive Network Traffic Visibility That Simplifies Log Analysis and Policy Updates

Most of my work with the Check Point Next Generation Firewalls involved analyzing firewall logs, verifying security policies following infrastructure changes, and examining traffic within, outside, and across the network. One feature that came in particularly handy was having detailed information for any connection that was blocked. Rather than just getting information about the source and destination, I was able to examine the traffic at the application level to see which services and protocols were causing the traffic. In the context of policy changes or adding new apps, this allowed me to make sure that there wasn't any unnecessary exposure while retaining necessary business traffic. Checking hit counts and ensuring that traffic was behaving as expected after making policy changes was also an important task.
Sobit T.
ST
Sobit T.
Head - Information Security Officer | Learner | Security Governance | ISO 27001:2022, 42001:2023 Lead Auditor | CEH | CRG
05/13/2026
Validated Reviewer
Review source: G2 invite
Incentivized Review

Robust Threat Prevention and Fast Browsing, but Setup and Licensing Are Complex

i like its high level of security, blocking almost all threats effectively. It has simple cloud dashboard, which makes it easier to manage security for remote and hybrid workers in one place.

About

Contact

HQ Location:
Redwood City, CA

Social

@CheckPointSW

What is Check Point Software Technologies?

Check Point Software Technologies is a global leader in cybersecurity solutions, providing advanced threat prevention and security management for enterprises, cloud environments, and mobile devices. Established in 1993, the company offers a comprehensive range of products, including firewalls, endpoint protection, and cloud security services, designed to safeguard networks and data from various cyber threats. Check Point's innovative technologies are built on a unified architecture, enabling organizations to consolidate their security infrastructure and enhance their overall security posture. For more information, visit their website at https://www.checkpoint.com/.

Details

Year Founded
1993
Ownership
NASDAQ:CHKP