374 Check Point Software Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "The use of Pointsec Protector has significantly reduced the burden on the IT department at Shepherd and Wedderburn."

  • "The granular control of Endpoint Security’s port protection function enables us to keep information flow fully traceable and secure, while allowing users to work efficiently."

  • “Our SCADA system is our bread and butter. We wanted to make sure that it delivers power safely, securely, and without interruption in the face of increasingly malicious cyberattacks. We began looking for a better way to secure it and be alerted to any communication issues that might compromise service.”

  • "Since installing Pointsec we haven’t looked back and we certainly wouldn’t be without it."

  • "Check Point VPN solutions have resulted in a 25- to 30-percent cost savings on network operations."

  • "By deploying a VPN-1 Power solution we are more effectively securing the communication between our employees and the Internet, as well as enabling secure Internet services access for our mobile users."

  • "The new Check Point Software Blade architecture allows for expandability, allowing us to adapt to future needs."

  • "Communication service is vital for sales and ensuring loyalty throughout the supply chain. Thanks to Check Point, we have never dropped a connection because of our VPN."

  • "The Check Point IPS Software Blade is delivering better security than our previous solution and at a lower cost."

  • "SmartWorkflow gives us the ability to manage, document, track and report on security policies changes. It is an integral part of the advantage we bring to customers who use our software."

  • "We had to make sure we could deliver the high levels of security that Dutch citizens expect. We realized there was only one security supplier that met our needs – Check Point."

  • "Safe@Office 500W gave our customers peace of mind and 100 percent confidence that our electronic transaction environment is safe and secure."

  • “By using Check Point products and Safe@Office 500W, we obtained a competitive advantage when it comes to the management of clients’ sensitive information, providing us a lead over other players in the securities industry.”

  • "The solutions from Check Point fully integrate into our existing network system, providing full protection and centralized management."

  • "We input our security data and performed some basic system tests during regular business hours on a weekday, and active deployment only took 15 minutes. All we had to do was connect a couple of cables, and we were up and running."