387 Check Point Software Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “Before the project [with BNC and Check Point], with products from different managers and this has led to a fragmented view of potential care options and limited capability to respond to security incidents the biggest challenge for us was to create a central overview across all of our endpoints, especially for employees who are frequently on the road. We retained BNC’s pragmatic and goal-oriented approach, which we highly-value together with Check Point.”

  • "Client satisfaction has gone up significantly with a number of customers and our support ticket volume has gone down. Clients are happier with the performance and their overall technology, while strengthening their overall security. Not much wrong with that picture."

  • "Check Point stopped a ransomware attack on our network that disabled a major courier services delivery company."

  • "Check Point CloudGuard™ IaaS automates protection across our dynamic cloud environments while Check Point R80 unifies visibility into threats across the network, enabling us to efficiently address security incidents with less effort.”

  • "We researched the market and found Check Point to be the best overall solution. It convinced us it had the most effective unified approach to cybersecurity.”

  • "We cut the time we spend on managing security by 80% and, thanks to the simplicity of the Check Point solution, 90% of our daily IT security activities are now automated.”

  • "We’ve reduced the number of firewall rules in our Italian data centers by more than half thanks to the new Check Point solutions. Overall, we succeeded in reducing the time and effort spent on security problems by 40%.”

  • "We’re able to review and monitor our entire threat landscape on a daily basis, creating new rules and removing old rules. We’re always looking for greater protection."

  • "Undoubtedly the biggest benefit has been visibility. This translates into greater confidence in the security of mobile devices, and the assurance that important corporate information is accessible, yet protected. Check Point SandBlast Mobile has very user-friendly protection."

  • "It’s an escalating arms race between the hackers and those trying to keep them out. Most firms can’t keep up with the pace of change. We rely on Check Point and SJG Digital to keep us secure and advise us on best practices."

  • "Our entire perimeter is secured with Check Point. From a single interface we’re able to control all devices, easily and effectively. The simplification of our security management is a very real benefit."

  • "The Check Point 1200R delivered ruggedization, comprehensive security, centralized visibility, and compliance best practices in one product. Its footprint is so small that it easily fit in every environment we needed to place it."

  • “Our SCADA system is our bread and butter. We wanted to make sure that it delivers power safely, securely, and without interruption in the face of increasingly malicious cyberattacks. We began looking for a better way to secure it and be alerted to any communication issues that might compromise service.”

  • “SandBlast Mobile prevents malicious apps and has excellent accuracy by using advanced static code analysis and machine learning. It also offers the kind of flexibility we need for fast deployment, easy scaling, and efficient operation. It really is a perfect fit for our business.”

  • “The rapid expansion of mobile devices means they are now a natural part of the business. One advantage SMBs have is agility, and mobile technology is a powerful business tool for them. Unfortunately, there are few companies which have adequate security measures in place. In Japan, everyone was so focused on the convenience of mobile technology, that security was put on the back burner for a while.”