387 Check Point Software Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “Security is a prime mission for us. Customers trust us with their security only if we maintain the highest standards for our own enterprise.”

  • "We tested 30 endpoint servers by injecting malware to test the level of protection. SandBlast Agent detected and blocked every single one."

  • "The Check Point Application Control and URL Filtering solutions have effectively enabled us to increase employee productivity and network security while significantly decreasing bandwidth consumption and our exposure to Web 2.0 threats. Additionally because it ties in with Active Directory, we have the granular ability to easily block access to …

  • "When we were hit with malware in the past, our business and guest services were sometimes unavailable for days. That’s absolutely unacceptable for a world-class hotel that requires 24×7 operations every day of the year. Check Point has enabled us to eliminate that downtime, and it has had a huge …

  • "Since we deployed SandBlast Agent, we have not had a single advanced malware or ransomware incident in almost a year."

  • "We wanted to create a new business model to gain competitive advantage and to reach tangible business benefits. Check Point helped us to reach this goal."

  • "Our Check Point Threat Emulation solution gives us immediate visibility and insight into threats. If an attack takes place, I can trace it down, determine its origin, and view the traffic of all the network elements it tried to reach before it was discovered. The discovery work is easy because …

  • "With Check Point I can run a variety of different reports that allow SFPCU to create a single robust monthly security management report. In addition, Check Point has all the necessary tools I need for audit trails during compliance audits."

  • "The Check Point Compliance Software Blade makes it easy for us to apply the best practices we need to meet our HIPAA requirements. It not only provides great protection, but it also demonstrates our commitment to security, which can make a huge difference if our organization is audited."

  • "Check Point allows all security blades to be managed from one appliance, which simplifies management, maintenance and cost. The performance of Check Point has exceeded everything required, and we couldn’t speak more highly of its reliability."

  • "From a network operations standpoint, we are spending less than 2 percent of our expenses to run and manage all of our cloud infrastructure, as well as our internal network and user support. With cloud computing, secured by Check Point solutions, we can leverage world class infrastructure that we would …

  • “We are advocates of focusing on core competencies and partnering with industry leaders that can more effectively manage a segment of our business. Check Point is an ideal partner because their platform allows us to leverage the cloud to its fullest capabilities. In addition, it gives us the security, speed …

  • "The Check Point 4800 and 4200 appliances have been a great platform upon which to build out our security architecture. Check Point gives us the ability to consolidate and run more efficiently without the time and money it would take to run all these technologies as independent appliances."

  • "The Check Point Software Compliance Blade has made all of our audits an order of magnitude easier. It not only makes the auditing process faster, but instills confidence in our clients that we truly know what we are doing. In the compliance world, confidence is everything."

  • "We can openly say that CRIF security, including LANs, servers, hardware and software systems, depends on Check Point solutions, and that these solutions have never failed to meet our expectations."