387 Check Point Software Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "The security solution provided by Check Point and Portola Systems supports our whole operation. We can focus on our work, and on helping the community, without worrying about the technology or the security details."

  • “Our users are now shielded from relentless phishing emails hitting their inbox. We have seen a reduction in the amount of time our now combined Cyber & TechOps teams are spending on email sourced threats and vulnerabilities allowing us to further enhance education and awareness. OpsSec have very quickly embraced the Harmony platform."

  • "I could tell right away the other departments were really appreciative of their inboxes being cleared up and not having to sift through good and bad emails. Now, they can focus on their work, instead of contacting the security department about what may or may not have happened."

  • "When we were hit with malware in the past, our business and guest services were sometimes unavailable for days. That’s absolutely unacceptable for a world-class hotel that requires 24×7 operations every day of the year. Check Point has enabled us to eliminate that downtime, and it has had a huge impact."

  • "Since we deployed SandBlast Agent, we have not had a single advanced malware or ransomware incident in almost a year."

  • "We wanted to create a new business model to gain competitive advantage and to reach tangible business benefits. Check Point helped us to reach this goal."

  • "Our Check Point Threat Emulation solution gives us immediate visibility and insight into threats. If an attack takes place, I can trace it down, determine its origin, and view the traffic of all the network elements it tried to reach before it was discovered. The discovery work is easy because we have access to all the logging information we need. We don’t have to guess."

  • "With Check Point I can run a variety of different reports that allow SFPCU to create a single robust monthly security management report. In addition, Check Point has all the necessary tools I need for audit trails during compliance audits."

  • "The Check Point Compliance Software Blade makes it easy for us to apply the best practices we need to meet our HIPAA requirements. It not only provides great protection, but it also demonstrates our commitment to security, which can make a huge difference if our organization is audited."

  • "Check Point allows all security blades to be managed from one appliance, which simplifies management, maintenance and cost. The performance of Check Point has exceeded everything required, and we couldn’t speak more highly of its reliability."

  • "From a network operations standpoint, we are spending less than 2 percent of our expenses to run and manage all of our cloud infrastructure, as well as our internal network and user support. With cloud computing, secured by Check Point solutions, we can leverage world class infrastructure that we would never be able to build on our own as a startup."

  • “We are advocates of focusing on core competencies and partnering with industry leaders that can more effectively manage a segment of our business. Check Point is an ideal partner because their platform allows us to leverage the cloud to its fullest capabilities. In addition, it gives us the security, speed and agility, and savings to efficiently grow our business.”

  • "The Check Point 4800 and 4200 appliances have been a great platform upon which to build out our security architecture. Check Point gives us the ability to consolidate and run more efficiently without the time and money it would take to run all these technologies as independent appliances."

  • "The Check Point Software Compliance Blade has made all of our audits an order of magnitude easier. It not only makes the auditing process faster, but instills confidence in our clients that we truly know what we are doing. In the compliance world, confidence is everything."

  • "We can openly say that CRIF security, including LANs, servers, hardware and software systems, depends on Check Point solutions, and that these solutions have never failed to meet our expectations."