387 Check Point Software Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "In the POV we realized that Infinity ERM was much more than an EASM solution, it delivered much value with highly relevant intelligence from the deep and dark web."

  • "We look at Check Point Express as a long term security solution, one that can grow with us as we meet new business challenges and take advantage of new opportunities."

  • "Once DSL is at the branch, it’s just a matter of asking somebody to connect to the port on the UTM-1 Edge box. I can’t recall having an issue where the service desk couldn’t walk somebody through things."

  • "Since installing Pointsec we haven’t looked back and we certainly wouldn’t be without it."

  • "Check Point VPN solutions have resulted in a 25- to 30-percent cost savings on network operations."

  • "By deploying a VPN-1 Power solution we are more effectively securing the communication between our employees and the Internet, as well as enabling secure Internet services access for our mobile users."

  • "The new Check Point Software Blade architecture allows for expandability, allowing us to adapt to future needs."

  • "Communication service is vital for sales and ensuring loyalty throughout the supply chain. Thanks to Check Point, we have never dropped a connection because of our VPN."

  • "The Check Point IPS Software Blade is delivering better security than our previous solution and at a lower cost."

  • "SmartWorkflow gives us the ability to manage, document, track and report on security policies changes. It is an integral part of the advantage we bring to customers who use our software."

  • "We had to make sure we could deliver the high levels of security that Dutch citizens expect. We realized there was only one security supplier that met our needs – Check Point."

  • "Safe@Office 500W gave our customers peace of mind and 100 percent confidence that our electronic transaction environment is safe and secure."

  • “By using Check Point products and Safe@Office 500W, we obtained a competitive advantage when it comes to the management of clients’ sensitive information, providing us a lead over other players in the securities industry.”

  • "The solutions from Check Point fully integrate into our existing network system, providing full protection and centralized management."

  • "We input our security data and performed some basic system tests during regular business hours on a weekday, and active deployment only took 15 minutes. All we had to do was connect a couple of cables, and we were up and running."