Check Point are a SASE security vendor with extensive experience in the industry. Their portfolio offers a wide range of security services which includes cloud security, SASE, endpoint protection, IoT security, CASB, ZTNA and more.
Author: Netify Research Team
If you have questions about Check Point and how their capability is aligned to your needs, email the Netify research team. UK: uk@netify.co.uk North America: northamerica@netify.com
(Please use the UK email for ROW - Rest of the World - questions or inquiries)
Request the very latest Check Point SASE sales PDF directly from your local account team. Please check your junk folder if not received.
Complete your details to arrange a demo of Check Point. You will receive contact requesting available dates and times - please check your junk folder if not received.
Request your local in-country sales contact. You will receive details as soon as possible - please check your junk folder if not received.
Check Point offer a wide array of security products, including cloud security, SASE, endpoint protection, IoT security, CASB, ZTNA and much more. They are most aligned with large multinational enterprises, requiring detailed security offerings to secure on-premises and remote users. They also have robust security offerings for cloud integrations with providers such as AWS, Azure, GCP, IBM Cloud, Oracle Cloud and more (see, How does Check Point deliver cloud security?).
However, some of Check Point’s solutions (such as NGFW) rely heavily on hardware appliances - technology that many vendors are steadily winding down. Further, remote users are still secured using VPN technology for some solutions - another technology that is becoming less popular.
Check Point is suitable for large multinational corporations that require a wide variety of security services to align with business needs.
Take our 90 second assessment quiz to find out which top 3 vendors or managed providers are a match for your answers.
Check Point is an American-Israeli network, cloud, endpoint, data and mobile security company founded in 1993. Currently, their headquarters is in Tel Aviv-Yafo, Israel. Check Point are a Leader in G2.com, Inc. Grid Report for Firewall, Cloud, Endpoint and Mobile Data Security. Check Point is also a Leader in the Gartner Magic Quadrant for Network Firewalls (1999-2002 & 2004-2020) and Unified Threat Management (2010-2020). The company was named a Leader in the 2019 Forrester Wave for Endpoint Security Suites.
Netify have listed the SD WAN and SASE security vendors used by Check Point.
Filter by tag, location, and service type:
(Select any number of tags)
List of the pros and cons associated with Check Point SASE security.
Consider the points below to compare Check Point vs Fortinet SASE security.
Consider the items below when creating your vendor shortlist.
Click the vendor logo to find out more about each respective SASE solution.
Filter by tag, location, and service type:
(Select any number of tags)
Check Point’s SASE solution is Harmony Connect. It features the following: Next Generation Firewall, Intrusion Prevention System, Advanced Threat Prevention, Secure Web Gateway, Data Loss Prevention and Zero Trust Network Access. The cloud-based solution allows for quick deployment and the ability to secure both branch and remote Internet and cloud connections. It features a personalized user portal (see, What Reporting and Management is Available Via the Check Point Portal?), single sign-on integration with identity providers, security for managed and unmanaged devices, zero trust access control, clientless remote access, and full layer-3 VPN access (early availability).
Check Point offer ZTNA-as-a-Service through Harmony Connect Remote Access for fast deployment. The service can secure access to corporate networks and applications when present in public and private clouds, IaaS and data centres. The solution also provides intuitive clientless access to SSH, RDP, web and SQL-based resources with the capability to cater to the needs of employees, engineers, DevOps, third-party users, diverse personnel and administrators. The service also includes Security Gateways, which allow clients to create network segmentation across LAN environments and public and private clouds. The service offers visibility into the groups, applications, users, connection types and machines on a client’s network - with the capability to enforce a Least Privileged access policy, meaning that only authorized users can access protected assets. The solution can also help defend against Direct Denial of Service (DDoS) attacks.
Zero Trust Workloads secures workloads such as the public cloud - the solution offers cloud security that integrates with all public and private cloud infrastructures with complete visibility. Providers include Azure, Oracle Cloud, AWS, IBM Cloud, Google Cloud Platform, NSX, OpenStack, Alibaba Cloud, Cisco ISE and Cisco ACI. Zero Trust Devices allows clients to block any compromised devices from accessing sensitive data and assets. Assets include users’ workstations, mobile devices, Industrial Control Systems, and IoT devices.
Check Point Identity Awareness ensures that only authorized users can access sensitive data by checking the authenticity of user identities with Single Sign-On, context-aware policies, anomaly detection and Multi-Factor Authentication. For remote users, Harmony Connect Remote offers least privileged access using identity providers, integrating into directories, and with Privileged Access Management (PAM) as-a-Service for DevOps, administrators and engineers.
Zero Trust Data is Check Point’s data protection solution. It secures data between mobile devices, databases, workstations, servers, and SaaS applications. The solution features data encryption and data loss prevention whilst classifying and categorizing data.
Check Point’s CASB solution is part of the CloudGuard SaaS solution. This CASB 2.0 features an advanced threat protection policy and CASB services. For more about Check Point’s CloudGuard Solution, please see, What NDR (Network Detection and Response) solution is supported by Check Point?
Check Point’s Secure Web Gateway uses Application Control, URL Filtering, Identity Awareness and Analysis, Integrated Antivirus, and Reporting with an optional Intrusion Prevention System and Anti-bot. This solution provides granular reporting and forensic tools for event analysis and granular policies at both the user and user group levels. The Secure Web Gateway identifies malware using ThreatCloud global security intelligence. It blocks access to phishing and malware websites through URL Filtering controls which include a database of over 200 million websites. Unified reporting, control and enforcement help to protect machines, applications, the web and users. Clients can deploy this solution through cloud security gateways, security gateway appliances and CloudGuard Connect, Check Point’s cloud security service.
Check Point offers a range of hardware-deployed Next Generation Firewalls (NGFW) as part of their Quantum Security Gateway solution. They provide zero-day protection using SandBlast Zero-Day Protection, and each of their NGFW solutions comes with a one-year license for SandBlast. The updated range of appliances leverages Infinity Architecture. The solution offers R81 unified security management control across clouds, IoT and networks. Each device integrates consolidated management and advanced threat prevention to protect against cyber attacks.
Hardware appliances:
Check Point’s Managed Security Service, Horizon MDR offers 24/7 monitoring or fully managed service and leverages Check Point's ThreatCloud threat intelligence platform. The service provides monitoring, analysis and advanced tools to mitigate threats. The MDR solution includes policy tuning and optimization, real-time phone, web and email notifications, and Global ThreatCloud intelligence feeds. As well as access to a web portal and periodic reports, 24/7 security event monitoring all year round and support for URL Filtering, Threat Emulation blades, Anti-Bot, Application Control, IPS and Antivirus. This solution supports existing IT teams by automating the analysis of customer events and providing 24/7 access to Check Point’s Security Operations Centers to monitor and diminish threats.
Check Point offer CloudGuard as their NDR solution. CloudGuard is a unified, cloud-native solution that offers Cloud Security Posture Management, Cloud Workload Protection, Cloud Application Security, Cloud Intelligence & Threat Hunting, and Cloud Network Security & Threat Prevention. From a single platform solution, organizations can secure their multi-cloud environments and prevent threats by gaining visibility into cloud traffic and leveraging a centralized platform for assets, security alerts and auto-remediation. Security and posture management helps to prevent threats, and Automated DevSecOp helps to resolve vulnerabilities whilst also reducing false positives enabling IT security teams to focus on the threats that matter. CloudGuard provides cloud security across multiple platforms, such as Alibaba Cloud, AWS, Azure, Google Cloud, IBM Cloud, Kubernetes, Oracle Cloud, and VMware.
Check Point's Horizon XDR solution is currently running an early availability program. As such, the details of which are available upon application. Typically, XDR solutions collect and automatically correlate data across cloud workloads, networks, emails, endpoints and servers. XDR aims to improve the speed of detection of threats and more efficiently investigate security risks.
Check Point delivers cloud security through its CloudGuard solution. Users can apply the CloudGuard solution to Container Security, Serverless Security, Private Cloud Security and Public Cloud Compliance and Governance use cases (See, Check Point Products and Services: CloudGuard Network Security).
Check Point offers security for remote users with their Quantum Remote Access VPN, designed to support users while travelling or working remotely. The product features multi-factor authentication, encryption of all transmitted data and endpoint system compliance scanning. Check Point’s firewall products offer integrated remote access solutions, allowing clients to either set up an SSL VPN Portal or configure a client-to-site VPN to allow connections from any browser. The Remote Access VPN securely connects mobile and remote devices to the corporate network from any location. The solution protects sensitive data using multi-factor authentication, encryption of all transmitted data and endpoint system compliance scanning.
There are two main product offerings for remote users from Check Point. The first is an IPsec VPN, which uses a VPN client to provide remote users full access to the corporate network. The SSL VPN Portal does not require a VPN client to provide web-based access. Clients can implement these services for various operating systems:
Clients can manage the Check Point solution through third-party Managed Service Providers. The solution can be co-managed through their Collaborative Enterprise service that uses Certified Collaborative Support Partners or via an appliance-only DIY deployment.
The Check Point single-pane Infinity Portal provides unified management across all Check Point security products, including Harmony, Quantum and Cloud Guard Solutions. The Infinity portal can be leveraged with the Smart-1 cloud through Check Point’s SmartConsole to provide shared management, policies, logs, visibility and insights across Check Point products. This approach helps ensure consistent security architecture all along the corporate IT infrastructure. Cloud, IoT, Mobile, Networks and Endpoints are secured from zero-day and known threats through the use of shared threat intelligence and 64 threat prevention engines to provide an automated and unified security management solution.
Below is a table displaying the main focus points of the Check Point Service Level Agreement (SLA).
Severity Level | Response Time (in accordance with Support Plan) | Commitment | ||
Co-Standard | Co-Premium | Co-Elite | ||
Severity 1 | 30 Minutes (Indirect - 30 minute response to the CCSP*) | 30 Minutes (direct-Customer can contact TAC directly) | 30 Minutes (direct-Customer can contact TAC directly) | Check Point and CCSP* (and clients as required) will commit the necessary resources at any time for problem resolution to obtain workaround or reduce the severity of the issue. |
Severity 2 | 4 Hours | 2 Hours | 30 Minutes (direct-Customer can contact TAC directly) | Check Point and CCSP (and clients as required) will commit full-time resources during business hours for problem resolution to obtain workaround or reduce the severity of the issue and use alternative resources during non-standard business hours. |
Severity 3 | 4 Hours | 4 Hours | 4 Hours | Check Point and CCSP will commit full-time resources during business hours for problem resolution, to obtain workaround or reduce the severity of the issue. |
Severity 4 | 4 Hours | 4 Hours | 4 Hours | Check Point and CCSP will provide resources during business hours for problem resolution. |
*Certified Collaborative Support Partner (CCSP)
(Check Point Software Technologies Ltd, 2021) See more at: https://www.checkpoint.com/downloads/support-services/collaborative-enterprise-support-sla.pdf
Check Point Direct Support Program Service Level Agreement:
Severity Level | Response Time (in accordance with Support Plan) | Commitment | ||
Standard | Premium | Elite | ||
Severity 1 | 30 Minutes | 30 Minutes | 30 Minutes | Check Point and the client will commit the necessary resources around the clock for problem resolution to obtain workaround or reduce the severity of the issue. |
Severity 2 | 4 Hours | 2 Hours | 30 Minutes | Check Point and the client will commit full-time resources during normal business hours for problem resolution to obtain workaround or reduce the severity of the issue and alternative resources during non-Standard business hours. |
Severity 3 | 4 Hours | 4 Hours | 4 Hours | Check Point and the client will commit full time resources during normal business hours for problem resolution, to obtain workaround or reduce the severity of the issue. |
Severity 4 | 4 Hours | 4 Hours | 4 Hours | Check Point and the client will provide resources during normal business hours for problem resolution. |
(Check Point Software Technologies Ltd, 2021) See more at: https://www.checkpoint.com/downloads/service_level_agreement/support-sla.pdf
Check Point IAS D-Series Appliance Support Service Level Agreement:
Service Level | Response Objective | Availability | Commitment |
Premium / Co-Premium* | 4 Hour Same Day | 24/7 | |
Premium On-site / Co-Premium On-site* | 6 Hour Call-to-Repair | 24/7, 365 days a year. |
(Check Point Software Technologies Ltd, 2011) See more at: https://www.checkpoint.com/downloads/service_level_agreement/D-series_SLA.pdf
Service Level Agreements (SLA) The following table summarizes ThreatCloud Managed Security Services SLAs | ||
Standard | Premium | |
Description | Threat Prevention Monitoring and Alerting Service | Expert Assisted Threat Prevention and Alerting Service |
Blades supported | IPS, Anti-Bot, Antivirus, URL Filtering, Application Control, & Threat Emulation | IPS, Anti-Bot, Antivirus, URL Filtering, Application Control, & Threat Emulation |
24x7x365 security alerts | Automated | Expert reviewed |
Response time:
| 6 hours | 30 minutes Quarterly digest 1 hour |
Gateway ownership and management | By customer | By customer |
Managed Service portal access | Yes | Yes |
Incident tracking and escalation | No | Yes |
Local and global reports | Standard | Enhanced |
Protection policy tuning | Half Yearly | Quarterly |
(Check Point Software Technologies Ltd, 2018) See more at: https://www.checkpoint.com/downloads/products/threatcloud-managed-security-service-datasheet.pdf
The most comprehensive top 10 guide we have ever created.
List your business with Netify Learn More →
Please complete the form to ask a question or send a message directly to Check Point. Netify have carefully curated global sales contacts based on your IP location. If you do not receive contact, please check your junk folder.
Book a demo of the Check Point SD WAN and SASE security capability over Zoom or Teams. Learn about their management portal, deployment, SLA and support. You will receive an email asking for times/dates, please check your junk folder if not received.
A Netify Vendor Briefing is a 30 minute Zoom research session for IT decision makers, and an opportunity to learn about the vendors products, services and business strategies specifically or a related technology or market. We'll also discuss their competitors and which other solutions your business should consider. If you do not receive contact, please check your junk folder.