Check Point SASE Cybersecurity Solutions

Sector, Company Type, and Location:Healthcare  |  Retail  |  Education  |  Financial Services  |  Government  |  ICS/SCADA Control Systems  |  Vendor  |  Europe  |  Asia  |  Australia  |  South Africa  |  Israel  |  United Arab Emirates  |  UK  |  North America  |  South America
Tags & Search Filters:XDR  |  CASB  |  ZTNA  |  DIY SD WAN servicesand 23 more tags  |  SASE Cybersecurity  |  MDR  |  FWaaS  |  SWG  |  End point protection  |  File analysis  |  IoT security  |  Vulnerability assessment  |  Security and compliance  |  Mobile threat defence  |  SIEM  |  Security service edge  |  Cloud workload protection  |  Instant communications security  |  Managed security  |  Integrations  |  Analytics  |  Network firewalls  |  WAN Edge infrastructure  |  Reporting and statistics (SD WAN)  |  On-premises/Private cloud  |  SaaS  |  Compliance reporting

Check Point are a SASE security vendor with extensive experience in the industry. Their portfolio offers a wide range of security services which includes cloud security, SASE, endpoint protection, IoT security, CASB, ZTNA and more.

Summary

Check Point SASE Solution: Comparisons, Review, Benefits, Use Cases, Pros & Cons

Author: Netify Research Team

If you have questions about Check Point and how their capability is aligned to your needs, email the Netify research team. UK: uk@netify.co.uk North America: northamerica@netify.com

(Please use the UK email for ROW - Rest of the World - questions or inquiries)

Resources and Downloadable Content

Request the very latest Check Point SASE sales PDF directly from your local account team. Please check your junk folder if not received.

Complete your details to arrange a demo of Check Point. You will receive contact requesting available dates and times - please check your junk folder if not received.

Request your local in-country sales contact. You will receive details as soon as possible - please check your junk folder if not received.

Review

Netify Review

Check Point offer a wide array of security products, including cloud security, SASE, endpoint protection, IoT security, CASB, ZTNA and much more. They are most aligned with large multinational enterprises, who require a detailed security offering to secure on-premises and remote users. They also have strong security offerings for cloud integrations with providers such as AWS, Azure, GCP, IBM Cloud, Oracle Cloud and more (See, How does Check Point deliver cloud security?). 

However, some of Check Point’s solutions (such as NGFW) rely heavily on hardware appliances - technology that many vendors are moving away from. Further, remote users are still secured using VPN technology for some solutions - another technology that is becoming less popular.

Check Point is recommended for large multinational corporations who require a wide variety of security services to align with business needs.

Marketplace Assistance

Are you an IT decision maker building your own SASE Cybersecurity or SD WAN shortlist?

Take our 90 second assessment quiz to find out which top 3 vendors or managed providers are a match for your answers.

About

About Check Point

Check Point is an American-Israeli network, cloud, endpoint, data and mobile security company that was founded in 1993. Currently, they are headquartered in Tel Aviv-Yafo, Israel. Check Point are a Leader in G2.com, Inc. Grid Report for Firewall, Cloud, Endpoint and Mobile Data Security. Check Point are also a Leader in the Gartner Magic Quadrant for Network Firewalls (1999-2002 & 2004-2020) and Unified Threat Management (2010-2020). The company was also named as a Leader in the 2019 Forrester Wave for Endpoint Security Suites.

Vendors

Who does Check Point use for SASE?

Netify have listed the SD WAN and SASE security vendors used by Check Point.

Filter by tag, location, and service type:
(Select any number of tags)

EuropeAsiaAustraliaSouth AfricaIsraelUnited Arab EmiratesUKNorth AmericaSouth AmericaXDRCASBZTNADIY SD WAN servicesSASE CybersecurityMDRFWaaSSWGEnd point protectionFile analysisIoT securityVulnerability assessmentSecurity and complianceMobile threat defenceSIEMSecurity service edgeCloud workload protectionInstant communications securityManaged securityIntegrationsAnalyticsNetwork firewallsWAN Edge infrastructureReporting and statistics (SD WAN)On-premises/Private cloudSaaSCompliance reporting

There are no results matching your selection.

See all Check Point SASE Cybersecurity Solutions Partners

Pros & Cons

What are the pros and cons of Check Point SASE Cybersecurity?

List of the pros and cons associated with Check Point SASE security.

Pros

  • Offers secure SD WAN gateway with integration for VMware, Aruba, Cisco, Citrix, Aryaka and Versa Networks.
  • Check Point have extensive security knowledge, built through years of experience in the  security market.
  • Offers a wide number of products and services, with a strong SASE offering. Allows clients to build a comprehensive security solution to meet all needs without the use of multiple third-party vendors. 

Cons

  • Still heavily focused on hardware appliance technology rather than virtualisation.
  • Large number of associated service provider and integrator partners, meaning that clients may struggle to choose an appropriate service - the Netify comparison tool is designed to allow clients to compare vendors and service providers, making choosing a service that caters to business needs easier.
Comparison

Comparison: Check Point vs Fortinet SASE security

Consider the points below to compare Check Point vs Fortinet SASE security.

Check Point

  • Check Point's SASE solution is cloud-based, securing branch and remote Internet and cloud connections. 
  • Check Point do offer a number of hardware-based firewall devices to integrate with SD WAN solutions. 
  • Check Point offer MDR, NDR and XDR solutions.
  • Check Point offer granular cloud security for Azure, AWS and Google Cloud. 
  • Fully managed services are available from MSP partners, co-managed and DIY are available direct from the vendor. 

Fortinet

  • Fortinet's SASE solution can be deployed from the cloud -  Fortinet is more hardware-based. 
  • Fortinet have dedicated ASIC hardware for WAN acceleration.
  • Fortinet offer MDR, XDR and EDR but do not offer an NDR solution. 
  • Fortinet offer cloud security for a number of public cloud environments, such as AWS, Azure, Oracle Cloud, Alibaba Cloud and Google Cloud.
  • Fortinet offer Security Operations Center (SOC) services for Security as a Service (SaaS) solutions. 

Comparison

Comparison: Check Point vs Palo Alto SASE security

Consider the items below when creating your vendor shortlist.

Check Point

  • Check Point offer hardware-based firewall devices. 
  • Check Point offer cloud security for Azure, AWS and Google Cloud. 
  • Check Point's solution is available as a managed service via MSP partners, or as DIY and co-managed direct from the vendor. 
  • Check Point offer MDR, NDR and XDR services. 

Palo Alto

  • Palo Alto offer cloud-delivered FWaaS with NGFW. 
  • Palo Alto offer cloud security for AWS, Azure and Google Cloud. 
  • Palo Alto's solution is only available as a managed service via MSP partners. 
  • Palo Alto offer MDR and XDR via a partnership with Cortex XDR. 

Similar Vendors

Top 3 similar SASE Vendors

Click the vendor logo to find out more about each respective SASE solution.

Products & Services

What are Check Point's Solutions?

  • Remote Access VPN: Offers clients secure connectivity for their remote workers (See, How does Check Point support remote users?).
  • Quantum IoT Protect: Quantum IoT Protect is designed to identify any IoT devices on a network, and analyzes it’s risk levels. It uses zero-trust segmentation to prevent unauthorized access to and from IoT and OT devices, and uses threat prevention security services to block malware from IoT devices, such as smart elevators, IP cameras, industrial controllers and medical devices, using IoT Protect. The solution is able to protect against cyber-attacks such as ransomware, phishing and crypto mining. The solution also leverages IoT-specific Threat Intelligence, which allows it to predict new IoT threats, using threat intelligence which is shared between 100 million IoT devices, endpoints and gateways globally.
  • Quantum Smart-1 Security Management Platforms: Security management which is consolidated into a single scalable appliance, allowing clients to manage security gateways, and efficiently process and analyze all logs and events, and search through to create events. The solution uses R81 Threat Prevention security management software. The product is available on Smart-1 600-S, Smart-1 600-M, Smart-1 6000-L and Smart-1 6000-XL hardware devices
  • Quantum Smart-1 Cloud: A product designed to allow clients to manage threats across workloads and devices using a management console deployed from the cloud. Offered with Security Management as-a-Service which requires no installation or upgrades. Includes capabilities to manage on-premises networks, firewalls, mobile, cloud and IoT.
  • Smart Event: SmartEvent includes threat management, with integrated monitoring, logging, reporting and event correlation.
  • Autonomous Threat Prevention: Check Point offer Autonomous Threat Prevention which includes protection from zero-day attacks using AI-driven security policies and Security Gateways, with policies that are automatically updated.
  • CloudGuard Network Security: A component of the CloudGuard Cloud Native Security platform, CloudGuard Network Security offers clients advanced threat prevention and automated cloud network security, deployed from a virtual security gateway. The solution offers policies that manage security across multi-cloud (public, private and hybrid cloud) and on-premises environments, designed to protect North-South and East-West traffic. For private clouds, CloudGuard offers enforcement of advanced security protections and provides consistent policy management and is deployed in software-defined data center environments. The solution features Advanced Threat Protection, which features Data Loss Prevention (DLP), Application Control, Antivirus, IPsec VPN, Firewall, SSL/TLS traffic inspection with traffic forwarding, Anti-Bot and Intrusion Prevention System (IPS). Also includes SandBlast for Threat Emulation and Threat Extraction to prevent zero-day attacks. Automated Network Security allows for rapid deployment via public cloud marketplaces, using templates from public cloud vendors such as Azure Resource Manager and AWS CloudFormation. The solution also works with a Unified Security Management Console which offers clients visibility, logging, policy management, reporting and the ability to control access to all cloud environments, on-premises deployments and networks.
  • CloudGuard Posture Management: Another component of the CloudGuard Cloud Native Security platform, CloudGuard Posture Management is designed to automate governance across multi-cloud services and assets, such as misconfiguration detection, analysis of security posture and enforcement of best security practices. CloudGuard Posture Management is available for all cloud-native environments, which includes Google Cloud, AWS, Alibaba Cloud, Kubernetes and Azure. Posture management identifies and automatically remediates events in context, whilst ensuring compliance with regulatory requirements and best security practices. The service also offers Privileged Identity Protection, which enforces privilege escalation and includes out-of-band on mobile devices.
  • CloudGuard Workload: A cloud-native workload security solution, which offers threat prevention, unified visibility and compliance across applications, micro services and APIs. Leverages DevOps teams, which ensure that all code is automatically security centric, with end-to-end cloud workload protection from Continuous Integration (CI) and Continuous Deployment (CD) through runtime. The service includes container security for increased visibility into dynamic K8s environment and serverless security which leverages Check Point CloudGuard for automated serverless security with behavioral defense and least privilege. CloudGuard AppSec is also included (see below).
  • CloudGuard AppSec: Designed to automate API protection and application security using contextual AI, protecting web applications against attacks. Clients are able to manually edit rules and create exceptions when they update their web application or APIs. The product features web application security which is designed to offer protection from OWASP Top 10 attacks by analyzing all transactions, users and URLs to stop attacks and Bot Prevention which is designed to protect applications from automated attacks by filtering human and non-human traffic. Secure APIs allow DevOps to automatically update API schema files such as OpenAPI to ensure that all incoming requests are in line with predicted levels of application use.
  • CloudGuard Intelligence: Offers cloud intelligence and threat hunting, leveraging machine learning for real-time context of threats across multi-cloud networks. The solution will automatically remediate drift and misconfigurations, with threat prevention to detect abnormalities in user and network activity. This also features network traffic visualization, cloud intrusion detection, snd cloud security monitoring and analytics, combining cloud inventory and configuration information with real-time data monitoring from various sources from providers such as Azure, AWS and Google Cloud. This offers clients querying, deep event correlation, notifications of policy violation, simplified visualization, notifications of policy violation, intrusion alerts and an enhanced Security Operations Center (SOC). Cloud Threat Intelligence enhances policy violation alerts and real-time intrusion detection using a cloud native log with event data streamed via security intelligence database ThreatCloud and CloudBots, with advanced encryption for extended threat prevention. Forensics and Threat Hunting alerts account behaviors and network activity with network troubleshooting including ephemeral services and cloud native components from providers such as Azure, Google Cloud Platform and AWS. Integration with third party cloud Security Monitoring and Automation and Event Management (SIEM) solutions.
Service Providers

Which managed service providers offer Check Point?

Filter by tag, location, and service type:
(Select any number of tags)

EuropeAsiaAustraliaSouth AfricaIsraelUnited Arab EmiratesUKNorth AmericaSouth AmericaXDRCASBZTNADIY SD WAN servicesSASE CybersecurityMDRFWaaSSWGEnd point protectionFile analysisIoT securityVulnerability assessmentSecurity and complianceMobile threat defenceSIEMSecurity service edgeCloud workload protectionInstant communications securityManaged securityIntegrationsAnalyticsNetwork firewallsWAN Edge infrastructureReporting and statistics (SD WAN)On-premises/Private cloudSaaSCompliance reporting

There are no results matching your selection.

See all Check Point SASE Cybersecurity Solutions Service Providers

SASE

What is the Check Point SASE security solution?

Check Point’s SASE solution is Harmony Connect and features the following: Next Generation Firewall, Intrusion Prevention System, Advanced Threat Prevention, Secure Web Gateway, Data Loss Prevention and Zero Trust Network Access. The solution is cloud-based, which allows for quick deployment and the ability to secure both branch and remote Internet and cloud connections. It features a personalized user portal (See, What Reporting and Management is Available Via the Check Point Portal?), single sign-on integrated with identity providers, security for managed and unmanaged devices, zero trust access control, clienteless remote access, and full layer-3 VPN access (early availability).

What ZTNA (Zero Trust Network Access) Solution is Supported by Check Point?

Check Point offer ZTNA-as-a-Service through Harmony Connect Remote Access for fast deployment. The service can secure access to corporate networks and applications, if they are located in public and private clouds, IaaS and data centers. The solution also provides intuitive clienteless access to SSH, RDP, web and SQL-based resources with the capability to cater to the needs of employees, engineers, DevOps, third-party users, diverse personnel and administrators. The service also includes Security Gateways which allow clients to create network segmentation across LAN environments and public and private clouds. This offers visibility into the groups, applications, users, connection types and machines on a client’s network - with the capability to enforce a Least Privileged access policy, meaning that only authorized users can access protected assets. This is also capable of defending against Direct Denial of Service (DDoS) attacks. 

Zero Trust Workloads secures workloads such as the public cloud - the solution offers cloud security that integrates with all public and private cloud infrastructures with full visibility. Providers include Azure, Oracle Cloud, AWS, IBM Cloud, Google Cloud Platform, NSX, OpenStack, Alibaba Cloud, Cisco ISE and Cisco ACI. Zero Trust Devices allows clients to block any compromised devices from accessing sensitive data and assets. This includes users workstations and mobile devices, Industrial Control Systems and IoT devices. 

Check Point Identity Awareness is designed to ensure only authorized users can access sensitive data, by checking the authenticity of user identities with Single Sign-On, context-aware policies, anomaly detection and Multi-Factor Authentication. For remote users, Harmony Connect Remote offers least privileged access using identity providers and by integrating into directories and with Privileged Access Management (PAM) as-a-Service for DevOps, administrators and engineers. 

Zero Trust Data is Check Point’s data protection solution. It secures data that travels between mobile devices, databases, workstations, application servers, and SaaS applications. The solution features data encryption and data loss prevention, whilst classifying and categorizing data. 

What CASB (Cloud Access Security Broker) Solution is Supported by Check Point? 

Check Point’s CASB solution is included as part of the CloudGuard SaaS solution. This CASB 2.0 features an advanced threat protection policy as well as CASB services. For more about Check Point’s CloudGuard Solution please see, What NDR (Network Detection and Response) solution is supported by Check Point?

What SWG (Secure Web Gateway) Solution is Supported by Check Point?

Check Point’s Secure Web Gateway uses Application Control, URL Filtering, Identity Awareness and Analysis, Integrated Antivirus as well as Reporting with optional Intrusion Prevention System and Anti-bot. This solution provides granular reporting and forensic tools for event analysis as well as granular policies at both user and user group level. The Secure Web Gateway identifies malware using ThreatCloud global security intelligence and blocks access to phishing and malware websites through URL Filtering controls which include a database of over 200 million websites. Unified reporting, control and enforcement help to protect machines, applications, web and users. This solution can be deployed through cloud security gateways, security gateway appliances and CloudGuard Connect, Check Point’s cloud security service. 

What FWaaS (Firewall as a Service) Solution is Supported by Check Point?

Check Point offer a range of hardware-deployed Next Generation Firewalls (NGFW) as part of their Quantum Security Gateway solution. They provide zero-day protection using SandBlast Zero Day Protection, and each of their NGFW solutions come with a one-year license for SandBlast, and the updated range of appliances are based on Infinity Architecture. The solution offers R81 unified security management control across clouds, IoT and networks. Each appliance integrates consolidated management and advanced threat prevention to protect against cyber attacks. 

Hardware appliances:

  • Quantum Edge: A Branch Virtual Security Gateway designed to protect Check Point’s branch SD WAN Cloud Connector from security threats. Designed to create a secure connection between the branch office and the cloud, using Threat Prevention. This is deployed as either a virtual machine on SD WAN or as a universal Customer Premises Equipment (uCPE) device. The solution integrates with SD WAN from VMware, Cisco, Citrix, Aryaka and Versa Networks, featuring: cloud or enterprise management options, privacy and compliance maintenance, lightweight embedded VM with 1 core, 1GB RAM and 1GB disk, integration with an on-premise SD WAN Edge; and integration with VMware SD WAN Edge devices.
  • Quantum Maestro: Check Point offer clients Hyperscale cloud security, which allows them to simplify  data center workflow orchestration, whilst scaling up existing Check Point security gateways as required. Clients can stack multiple Check Point security gateways together, to create their own virtualised private cloud premise. The Maestro Orchestrator is a Hyperscale Security Solution designed to protect next generation data centers, with the capability to scale up existing Check Point security gateways as needed. The solution has the capability to expand from a single gateway up to a maximum capacity of 52 gateways. Newer models include a 1U form factor designed for hyperscale implementations.
  • Large Enterprises: Check Point offer large enterprises their 15000/16000 Series appliance which includes Quantum Security Gateways for easily managed comprehensive security protection.
  • Data Center and High End Enterprise: Offers Check Point’s 26000/28000 Series appliance for data center-grade hardware leveraging Quantum Security Gateways. 
  • Branch Office: Clients looking for branch office solutions can choose between 1600, 1800 and 3000 Series hardware appliances, which include Quantum Security Gateways in small form factor in order to fit branch and small offices.
  • Quantum Spark: A Next Generation Firewall (NGFW) for Small to Medium Enterprises (SMEs) offering threat protection as well as security gateways to provide security for up to 500 employees, leveraging WebUI for management and reporting. The solution can be managed from a mobile application or web portal. This is offered using 1500, 1600 and 1800 Series hardware appliances. This solution includes: IPsec VPN, SSL-VPN, intrusion prevention, anti-bot, sandblast threat emulation, NGFW, anti-spam, SandBlast Threat Emulation and application control and web filtering.
  • Midsize Enterprises: Leverages Quantum Security Gateways with Gen V in one security gateway, provided by a 6000 Series hardware appliance
  • Industrial Appliances: Check Point’s Quantum Rugged is designed to deliver Threat Prevention to protect Industrial Control Systems for industry verticals such as energy, utilities, transportation and manufacturing using 1570R Wired and Wireless Models.
  • Quantum Scalable Chassis: Designed for clients who’s networks are growing, leveraging the Quantum Scalable Chassis with chassis-based and multi-bladed systems for scalability. Uses the 44000 and 64000 Series hardware appliances which are suitable for large data center and telco environments.  

What MDR (Managed Detection and Response) Solution is Supported by Check Point?

Check Point’s Managed Security Service, ThreatCloud, offers 24/7 monitoring or fully managed service. The service offers monitoring, analysis and advanced tools to ensure the mitigation of threats. The MDR solution includes policy tuning and optimization, real time phone, web and email notifications, Global ThreatCloud intelligence feeds, access to web portal and periodic reports, 24/7 security event monitoring all year round and support for URL Filtering, Threat Emulation blades, Anti-Bot, Application Control, IPS and Antivirus. This solution supports existing IT teams by automating analysis of customer events, and providing 24/7 access to Check Point’s Security Operations Centers to monitor and diminish threats. 

What NDR (Network Detection and Response) Solution is Supported by Check Point?

Check Point offer CloudGuard as their NDR solution. CloudGuard is a unified, cloud native solution that offers Cloud Security Posture Management, Cloud Workload Protection, Cloud Application Security, Cloud Intelligence & Threat Hunting as well as Cloud Network Security & Threat Prevention. From a single platform solution organizations are able to secure their multi-cloud environments and prevent threats by gaining visibility into cloud traffic as well as leveraging a centralized platform for assets, security alerts and auto-remediation. Security and posture management helps to prevent threats and Automated DevSecOp helps to resolve vulnerabilities whilst also reducing false positives enabling IT security teams to focus on the threats that matter. CloudGuard provides cloud security across multiple platforms such as: Alibaba Cloud, AWS, Azure, Google Cloud, IBM Cloud, Kubernetes, Oracle Cloud and VMware etc. 

What XDR (Extended Detection and Response) Solution is Supported by Check Point?

Check Point offer XDR solutions, the details of which are available on application. Typically, XDR solutions collect and automatically correlate data across cloud workloads, the network, emails, endpoints and servers. XDR aims to improve the speed of detection of threats, and more efficiently investigate security risks.

Funding

Funding Rounds

2009£2112
2010£1160
2011£2372
2012£2706
2013£2990
2014£3158
2015£3898
2016£4281
2017£2064
2018£5070
2019£5258
2020£5314
Cloud Security

How does Check Point deliver cloud security?

Check Point delivers cloud security through its CloudGuard solution. The CloudGuard solution can be applied to: Container Security, Serverless Security Private Cloud Security and Public Cloud Compliance and Governance use cases (See, Check Point Products and Services: CloudGuard Network Security). 

  • AWS Security: Check Point offer security solutions designed for AWS, which include features such as advanced threat prevention, posture management, threat hunting and visibility. This is available via the AWS CPPO program, through AWS Consulting Partners. The solution is natively integrated with AWS Lambda functions, Amazon GuardDuty, AWS Security Hub, Amazon CloudWatch, Amazon VPC Flow Logs and 50 AWS services and security solutions. 
  • Azure Security: Check Point offers cloud-native security solutions designed for Azure, with cloud network security, advanced security intelligence, threat hunting and high fidelity cloud posture. Offers integrations with Azure Security Center, Azure Sentinel, Web Application Firewall and other Azure services. CloudGuard is designed to augment Azure security, by protecting sensitive workloads, preventing data loss and ensuring compliance with regulations, with advanced threat protection, visibility, network and workload security, and compliance across multi-cloud platforms.  Check Point is one of Azure’s top security ISVs, offering security for: Microsoft Windows, Azure Logic Apps, Azure Functions, Azure Sentinel, Azure Security Center, Azure vWAN, Azure Stack, Azure Kubernetes Service, Microsoft 365 and Microsoft Endpoint Manager.
  • Google Cloud Platform (GCP) Security: Check Point offer cloud-native and agent-less security for GCP. Clients can manage security whilst automating compliance across public and multi-cloud infrastructures. Leverages CloudGuard Clarity for visibility into the network security posture of GCP environments, whilst analyzing network firewalls and network-based assets such as load balancers, database services and Google Compute Engine virtual machines. The CloudGuard Compliance Engine manages compliance and security hardening.
Cloud Access

Cloud Access

Amazon Web Services30
Microsoft Azure35
Google Cloud35
Remote Users

How does Check Point support remote users?

Check Point offer security for remote users with their Quantum Remote Access VPN, designed to support users whilst they are traveling and/or working remotely. The product features multi-factor authentication, encryption of all transmitted data and endpoint system compliance scanning. All of Check Point’s firewall products offer integrated remote access solutions, giving clients the ability to either set up an SSL VPN Portal or configure a client-to-site VPN to allow connections from any browser. The Remote Access VPN connects mobile and remote devices into the corporate network securely from any location. The solution protects sensitive data using multi-factor authentication, encryption of all transmitted data and endpoint system compliance scanning. 

There are two main product offerings for remote users from Check Point. The first is an IPsec VPN, which uses a VPN client to provide remote users with full access to the corporate network. The SSL VPN Portal does not require a VPN client to provide web-based access. These services can be implemented for various operating systems:

  • Remote Access Client for Windows and Mac: Includes VPN Auto-Connect, Secure Hotspot Registration, VPN Client, Multi-factor Authentication Support, Central Management and Compliance Scanning. This is available as Remote Access for Windows (Windows 7, 8.1, 10 and 11) and Remote Access for macOS (macOS 10.14, 10.15 and Big Sur 11). 
  • Capsule Connect: Designed for mobile phone devices, the solution offers secure access to corporate resources, IPsec/SSL VPN and efficient battery consumption, with Connect for Android (supports Android 4+) and Connect for iOS (supports iOS 5.0 and later). 
  • Capsule Workspace: Includes MDM cooperative enforcement, secure container, provides secure access to business applications, segregates business and personal data, and prevents data loss. Comes as Workspace for Android (Android 4+) and Workspace for iOS (iOS 5.0 and later). 
  • Mobile Access (SSL VPN Portal): Includes compliance scanning, secure hotspot registration, VPN auto-connect, central management, IPsec VPN and multi-factor authentication support. 
Managed, co-managed & DIY services

What is the Check Point managed, co-managed and DIY services solution? 

The Check Point solution can be managed through third party Managed Service Providers. The solution is also able to be co-managed through their Collaborative Enterprise service that uses Certified Collaborative Support Partners as well as through an appliance only DIY deployment.

Services

Services

Managed10
Co-managed45
DIY45
Portal

What Reporting and Management is available via the Check Point Portal?

The Check Point single pane Infinity Portal provides unified management across all Check Point security products including: Harmony, Quantum and Cloud Guard Solutions. The Infinity portal can be leveraged with the Smart-1 cloud through Check Point’s SmartConsole to provide shared management, policies, logs, visibility and insights across Check Point products. This approach helps ensure consistent security architecture all along the corporate IT infrastructure. Cloud, IoT, Mobile, Networks and Endpoints are secured from zero-day and known threats through the use of shared threat intelligence as well as 64 threat prevention engines to provide an automated and unified security management solution.

Years Active

Number of years active

Check Point28
Fortinet 21
Palo Alto16
Service Level Agreement

What is the Check Point SLA?

Below is a table displaying the main focus points of the Check Point Service Level Agreement (SLA). 

Severity Level

Response Time 

(in accordance with Support Plan)

Commitment 

Co-Standard

Co-Premium

Co-Elite 

Severity 1

30 Minutes (Indirect - 30 minute response to the CCSP*)

30 Minutes (direct-Customer can contact TAC directly)

30 Minutes (direct-Customer can contact TAC directly)

Check Point and CCSP* (and clients as required) will commit the necessary resources at any time for problem resolution to obtain workaround or reduce the severity of the issue.

Severity 2

4 Hours 

2 Hours 

30 Minutes (direct-Customer can contact TAC directly)

Check Point and CCSP (and clients as required) will commit full-time resources during business hours for problem resolution to obtain workaround or reduce the severity of the issue and use alternative resources during non-standard business hours. 

Severity 3

4 Hours 

4 Hours 

4 Hours 

Check Point and CCSP will commit full-time resources during business hours for problem resolution, to obtain workaround or reduce the severity of the issue. 

Severity 4

4 Hours 

4 Hours 

4 Hours 

Check Point and CCSP will provide resources during business hours for problem resolution. 

*Certified Collaborative Support Partner (CCSP)

(Check Point Software Technologies Ltd, 2021) See more at: https://www.checkpoint.com/downloads/support-services/collaborative-enterprise-support-sla.pdf 

Check Point Direct Support Program Service Level Agreement: 

Severity

Level

Response Time 

(in accordance with Support Plan)

Commitment

Standard 

Premium 

Elite

Severity 1

30 Minutes 

30 Minutes 

30 Minutes 

Check Point and the client will commit the necessary resources around the clock for problem resolution to obtain workaround or reduce the severity of the issue.

Severity 2 

4 Hours 

2 Hours

30 Minutes 

Check Point and the client will commit full-time resources during normal business hours for problem resolution to obtain workaround or reduce the severity of the issue and alternative resources during non-Standard business hours. 

Severity 3 

4 Hours

4 Hours 

4 Hours

Check Point and the client will commit full time resources during normal business hours for problem resolution, to obtain workaround or reduce the severity of the issue. 

Severity 4 

4 Hours 

4 Hours 

4 Hours

Check Point and the client will provide resources during normal business hours for problem resolution. 

(Check Point Software Technologies Ltd, 2021) See more at: https://www.checkpoint.com/downloads/service_level_agreement/support-sla.pdf

Check Point IAS D-Series Appliance Support Service Level Agreement:

Service 

Level

Response Objective 

Availability 

Commitment

Premium / 

Co-Premium* 

4 Hour 

Same Day 

24/7

 

Premium 

On-site / 

Co-Premium On-site*

6 Hour  

Call-to-Repair 

24/7, 365 days a year.

 

(Check Point Software Technologies Ltd, 2011) See more at: https://www.checkpoint.com/downloads/service_level_agreement/D-series_SLA.pdf 

Service Level Agreements (SLA)

The following table summarizes ThreatCloud Managed Security Services SLAs

 

Standard 

Premium 

Description 

Threat Prevention Monitoring and Alerting Service 

Expert Assisted Threat Prevention and Alerting Service 

Blades supported 

IPS, Anti-Bot, Antivirus, URL Filtering, Application Control, & Threat Emulation 

IPS, Anti-Bot, Antivirus, URL Filtering, Application Control, & Threat Emulation 

24x7x365 security alerts 

Automated 

Expert reviewed 

Response time: 

  • Critical, high severity
  • Medium, low severity 
  • Customer inquiries 

6 hours 

30 minutes 

Quarterly digest 

1 hour

Gateway ownership and management 

By customer 

By customer 

Managed Service portal access

Yes

Yes

Incident tracking and escalation

No

Yes

Local and global reports

Standard 

Enhanced

Protection policy tuning 

Half Yearly 

Quarterly

(Check Point Software Technologies Ltd, 2018) See more at: https://www.checkpoint.com/downloads/products/threatcloud-managed-security-service-datasheet.pdf

Frequently Asked Questions
Which industries do Check Point deliver solutions for?
Check Point Featured Technology Partners
Check Point Technology Partners
Ask a question

Send your local contact from Check Point a message, this form will reach Check Point directly.

Contact Check Point
Complete the form to get in touch with a representative from Check Point.
Report

Download the the complete guide to 10 SD WAN solutions.

The most comprehensive top 10 guide we have ever created.

Similar Companies

There are no results matching your selection.

Deployments

Deployment Region

North America38%
Europe, Middle East and Africa35%
Asia/Pacific29%
Latin America9%
Proposition Focus

Proposition Focus

Features3.5
SASE/Security4
Cloud4
SD WAN2
Industries

Industry Coverage

Finance 250
Manufacturing143
Services391
Government84
Education41
Communications100
Energy and Utilities65
Healthcare57
Retail45
Other44
Transportation30
Media12
Construction11
Focus

Other Focus

Remote users5
ZTNA6
CASB5
MDR4
List your business

List your business with Netify Learn More →

Geographic

Geographic Focus

EMEA35
APAC35
Americas30

Please complete the form to ask a question or send a message directly to Check Point. Netify have carefully curated global sales contacts based on your IP location. If you do not receive contact, please check your junk folder.

Book a demo of the Check Point SD WAN and SASE security capability over Zoom or Teams. Learn about their management portal, deployment, SLA and support. You will receive an email asking for times/dates, please check your junk folder if not received.

A Netify Vendor Briefing is a 30 minute Zoom research session for IT decision makers, and an opportunity to learn about the vendors products, services and business strategies specifically or a related technology or market. We'll also discuss their competitors and which other solutions your business should consider. If you do not receive contact, please check your junk folder.

Netify is the first dedicated global SD WAN & SASE comparison marketplace.

List Your Business

Netify Forbes member logo

For Global IT Decision Makers

The Global SD WAN & Cybersecurity Playbook

Download our vendor and managed service provider guide to the top 10 SD WAN & top 10 SASE cybersecurity solutions for Global companies.