387 Check Point Software Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "From a network operations standpoint, we are spending less than 2 percent of our expenses to run and manage all of our cloud infrastructure, as well as our internal network and user support. With cloud computing, secured by Check Point solutions, we can leverage world class infrastructure that we would …

  • “The technology is first and foremost, but it’s really about the people and the relationship. That’s where the rubber meets the road for our team.”

  • "Leveraging Check Point vSEC both on premise and in Microsoft Azure gave us a 100 percent increase in visibility into the threats that were impacting our environment. Check Point was able not only to prevent threats, but also detect and alert us every time they occurred."

  • “We selected CloudGuard for Serverless to provide additional security, as it seamlessly integrated into our ever expanding use of AWS Lambda functions, and helped automate security into our serverless infrastructure.”

  • “Check Point R80 SmartMove enabled us to achieve a successful, extremely fast security deployment for a customer across their sites worldwide. Check Point APIs are the star of the solution, enabling us to orchestrate complex migration processes and move the customer to their new solution faster. These functionalities allowed us …

  • “In the new SD-WAN environment with CloudGuard Connect, we can deploy a site in five minutes or less—including getting a cup of coffee in the middle of the process. It is a phenomenal solution that is quick to deploy, built on a very secure platform that we’re comfortable with.”

  • "Check Point R80 means we have a single interface from which to manage VPN, firewall rules, application-level security, navigation control, and integration with Active Directory. Before, such simplicity was impossible. It’s taking us half the time to do what we need to do. It is a salvation."

  • "We tested 30 endpoint servers by injecting malware to test the level of protection. SandBlast Agent detected and blocked every single one."

  • "We’re thrilled with Check Point Infinity Architecture. It delivers a single solution that protects our entire attack surface—from endpoint and mobile device to cloud—today and into the future."

  • “Check Point’s R80 displays what’s happening in our network live, right from the console. It saves us time in dozens of ways, enabling us to better protect our network.”

  • “Check Point R80 was instrumental in enabling us to prevent an attack in real time. An attacker was trying to compromise a server, and Smart Log immediately gave us the information we needed to stop the attack and strengthen our defenses going forward.”

  • “Check Point gives us the tools we need to protect our company and our users. Check Point is easy to manage and provides insights into what’s happening in the network.”

  • "Check Point gives us peace of mind, knowing that our members’ information stays safe and secure. That peace of mind is invaluable."

  • “Check Point SandBlast Mobile is incredibly easy to administer. We wanted a solution that didn’t overwhelm us or require too much resource to manage.”

  • "The Check Point Infinity Total Protection model covers all current threats. I don’t have to choose different vendors for specific tasks or challenges. Everything is included."