Log In
vendor-logo

Check Point SASE Comparison, Review, Use Cases, News, Pros & Cons

Schedule a Zoom demo
Local sales contact
Request contact

All the tools you need to compare SD WAN vendors. Here's how to start using them now.

  • Use the quick assessment tool and find your perfect SD WAN match
  • View the Marketplace and read extensive research across 30+ solutions
  • Book a Zoom call with an advisor

Learn more about the SD WAN Marketplace, quick assessment and free advisory.

Get everything you need →

Focus

Proposition Focus

30%
30%
20%
20%
SASE Security
Cloud Security
Management Portal
Managed Services

Cloud Focus

30%
40%
30%
AWS
Azure
Google Cloud

Other Focus

25%
30%
25%
20%
Remote Users
ZTNA
CASB
MDR

Summary

Analyst: Thomas Stroude Contact: tstroude@netify.co.uk 

If you have questions about Check Point and how their capability is aligned to your needs, email the Netify research team. UK: uk@netify.co.uk North America: northamerica@netify.com 

(Please use the UK email for ROW - Rest of the World - questions or enquiries)

 

Categories: 

  • SASE

Sub-categories:

  • SASE Security Vendor 
  • Managed Security Service 
  • SD WAN security

 

Pros:

  • Offers secure SD WAN gateway with integration for VMware, Aruba, Cisco, Citrix, Aryaka and Versa Networks (see, What FWaaS (Firewall as a Service) solution is supported by Check Point? - Quantum Edge).

  • Check Point have extensive security knowledge, built through years of experience in the  security market.
     
  • Offers a wide number of products and services, with a strong SASE offering. Allows clients to build a comprehensive security solution to meet all needs without the use of multiple third-party vendors. 

Cons:

  • Still heavily focused on hardware appliance technology rather than virtualisation.

  • Large number of associated service provider and integrator partners, meaning that clients may struggle to choose an appropriate service - the Netify comparison tool is designed to allow clients to compare vendors and service providers, making choosing a service that caters to business needs easier - try it here.
     

Netify Review:

Check Point offer a wide array of security products, including cloud security, SASE, endpoint protection, IoT security, CASB, ZTNA and much more. They are most aligned with large multinational enterprises, who require a detailed security offering to secure on-premises and remote users. They also have strong security offerings for cloud integrations with providers such as AWS, Azure, GCP, IBM Cloud, Oracle Cloud and more (see, How does Check Point deliver cloud security?). 

However, some of Check Point’s solutions (such as NGFW) rely heavily on hardware appliances - technology that many vendors are moving away from. Further, remote users are still secured using VPN technology for some solutions - another technology that is becoming less popular.

Check Point is recommended for large multinational corporations who require a wide variety of security services to align with business needs. 

 

Contents:

  • About Check Point
  • Check Point Products and Services
  • Check Point SASE
  • What ZTNA (Zero Trust Network Access) Solution is Supported by Check Point? 
  • What CASB (Cloud Access Security Broker) Solution is Supported by Check Point?
  • What SWG (Secure Web Gateway) Solution is Supported by Check Point?
  • What FWaaS (Firewall as a Service) Solution is Supported by Check Point?
  • What MDR (Managed Detection and Response) Solution is Supported by Check Point? 
  • What NDR (Network Detection and Response) Solution is Supported by Check Point?
  • What XDR (Extended Detection and Response) Solution is Supported by Check Point?
  • How does Check Point deliver Cloud Security? 
  • What is the Check Point Managed, Co-managed and DIY Services Solution?
  • What Reporting and Management is Available via the Check Point Portal?
  • How Does Check Point Support Remote Users?
  • What is the Check Point SLA?
  • Which Service Providers and Partners do Check Point Support?
  • Additional Notes

 

About Check Point: 

Check Point is an American-Israeli network, cloud, endpoint, data and mobile security company that was founded in 1993. Currently, they are headquartered in Tel Aviv-Yafo, Israel. Check Point are a Leader in G2.com, Inc. Grid Report for Firewall, Cloud, Endpoint and Mobile Data Security. Check Point are also a Leader in the Gartner Magic Quadrant for Network Firewalls (1999-2002 & 2004-2020) and Unified Threat Management (2010-2020). The company was also named as a Leader in the 2019 Forrester Wave for Endpoint Security Suites. 

Check Point Products and Services: 

  • Quantum IoT Protect: Quantum IoT Protect is designed to identify any IoT devices on a network, and analyses it’s risk levels. It uses zero-trust segmentation to prevent unauthorised access to and from IoT and OT devices, and uses threat prevention security services to block malware from IoT devices, such as smart elevators, IP cameras, industrial controllers and medical devices, using IoT Protect. The solution is able to protect against cyber-attacks such as ransomware, phishing and crypto mining. The solution also leverages IoT-specific Threat Intelligence, which allows it to predict new IoT threats, using threat intelligence which is shared between 100 million IoT devices, endpoints and gateways globally.
  • Quantum Smart-1 Security Management Platforms: Security management which is consolidated into a single scalable appliance, allowing clients to manage security gateways, and efficiently process and analyse all logs and events, and search through to create events. The solution uses R81 Threat Prevention security management software. The product is available on Smart-1 600-S, Smart-1 600-M, Smart-1 6000-L and Smart-1 6000-XL hardware devices.
     
  • Quantum Smart-1 Cloud: A product designed to allow clients to manage threats across workloads and devices using a management console deployed from the cloud. Offered with Security Management as-a-Service which requires no installation or upgrades. Includes capabilities to manage on-premises networks, firewalls, mobile, cloud and IoT.
     
  • Smart Event: SmartEvent includes threat management, with integrated monitoring, logging, reporting and event correlation.
     
  • Autonomous Threat Prevention: Check Point offer Autonomous Threat Prevention which includes protection from zero-day attacks using AI-driven security policies and Security Gateways, with policies that are automatically updated.
     
  • CloudGuard Network Security: A component of the CloudGuard Cloud Native Security platform, CloudGuard Network Security offers clients advanced threat prevention and automated cloud network security, deployed from a virtual security gateway. The solution offers policies that manage security across multi-cloud (public, private and hybrid cloud) and on-premises environments, designed to protect North-South and East-West traffic. For private clouds, CloudGuard offers enforcement of advanced security protections and provides consistent policy management and is deployed in software-defined data centre environments. The solution features Advanced Threat Protection, which features Data Loss Prevention (DLP), Application Control, Antivirus, IPsec VPN, Firewall, SSL/TLS traffic inspection with traffic forwarding, Anti-Bot and Intrusion Prevention System (IPS). Also includes SandBlast for Threat Emulation and Threat Extraction to prevent zero-day attacks. Automated Network Security allows for rapid deployment via public cloud marketplaces, using templates from public cloud vendors such as Azure Resource Manager and AWS CloudFormation. The solution also works with a Unified Security Management Console which offers clients visibility, logging, policy management, reporting and the ability to control access to all cloud environments, on-premises deployments and networks.
     
  • CloudGuard Posture Management: Another component of the CloudGuard Cloud Native Security platform, CloudGuard Posture Management is designed to automate governance across multi-cloud services and assets, such as misconfiguration detection, analysis of security posture and enforcement of best security practices. CloudGuard Posture Management is available for all cloud-native environments, which includes Google Cloud, AWS, Alibaba Cloud, Kubernetes and Azure. Posture management identifies and automatically remediates events in context, whilst ensuring compliance with regulatory requirements and best security practices. The service also offers Privileged Identity Protection, which enforces privilege escalation and includes out-of-band on mobile devices.
     
  • CloudGuard Workload: A cloud-native workload security solution, which offers threat prevention, unified visibility and compliance across applications, micro services and APIs. Leverages DevOps teams, which ensure that all code is automatically security centric, with end-to-end cloud workload protection from Continuous Integration (CI) and Continuous Deployment (CD) through runtime. The service includes container security for increased visibility into dynamic K8s environment and serverless security which leverages Check Point CloudGuard for automated serverless security with behavioural defence and least privilege. CloudGuard AppSec is also included (see below).
     
  • CloudGuard AppSec: Designed to automate API protection and application security using contextual AI, protecting web applications against attacks. Clients are able to manually edit rules and create exceptions when they update their web application or APIs. The product features web application security which is designed to offer protection from OWASP Top 10 attacks by analysing all transactions, users and URLs to stop attacks and Bot Prevention which is designed to protect applications from automated attacks by filtering human and non-human traffic. Secure APIs allow DevOps to automatically update API schema files such as OpenAPI to ensure that all incoming requests are in line with predicted levels of application use.
     
  • CloudGuard Intelligence: Offers cloud intelligence and threat hunting, leveraging machine learning for real-time context of threats across multi-cloud networks. The solution will automatically remediate drift and misconfigurations, with threat prevention to detect abnormalities in user and network activity. This also features network traffic visualisation, cloud intrusion detection, snd cloud security monitoring and analytics, combining cloud inventory and configuration information with real-time data monitoring from various sources from providers such as Azure, AWS and Google Cloud. This offers clients querying, deep event correlation, notifications of policy violation, simplified visualisation, notifications of policy violation, intrusion alerts and an enhanced Security Operations Centre (SOC). Cloud Threat Intelligence enhances policy violation alerts and real-time intrusion detection using a cloud native log with event data streamed via security intelligence database ThreatCloud and CloudBots, with advanced encryption for extended threat prevention. Forensics and Threat Hunting alerts account behaviours and network activity with network troubleshooting including ephemeral services and cloud native components from providers such as Azure, Google Cloud Platform and AWS. Integration with third party cloud Security Monitoring and Automation and Event Management (SIEM) solutions. 

Check Point SASE:

Check Point’s SASE solution is Harmony Connect and features the following: Next Generation Firewall, Intrusion Prevention System, Advanced Threat Prevention, Secure Web Gateway, Data Loss Prevention and Zero Trust Network Access. The solution is cloud-based, which allows for quick deployment and the ability to secure both branch and remote Internet and cloud connections. It features a personalised user portal (see, What Reporting and Management is Available Via the Check Point Portal?), single sign-on integrated with identity providers, security for managed and unmanaged devices, zero trust access control, clienteless remote access, and full layer-3 VPN access (early availability).

What ZTNA (Zero Trust Network Access) Solution is Supported by Check Point?

Check Point offer ZTNA-as-a-Service through Harmony Connect Remote Access for fast deployment. The service can secure access to corporate networks and applications, if they are located in public and private clouds, IaaS and data centres. The solution also provides intuitive clienteless access to SSH, RDP, web and SQL-based resources with the capability to cater to the needs of employees, engineers, DevOps, third-party users, diverse personnel and administrators. The service also includes Security Gateways which allow clients to create network segmentation across LAN environments and public and private clouds. This offers visibility into the groups, applications, users, connection types and machines on a client’s network - with the capability to enforce a Least Privileged access policy, meaning that only authorised users can access protected assets. This is also capable of defending against Direct Denial of Service (DDoS) attacks. 

Zero Trust Workloads secures workloads such as the public cloud - the solution offers cloud security that integrates with all public and private cloud infrastructures with full visibility. Providers include Azure, Oracle Cloud, AWS, IBM Cloud, Google Cloud Platform, NSX, OpenStack, Alibaba Cloud, Cisco ISE and Cisco ACI. Zero Trust Devices allows clients to block any compromised devices from accessing sensitive data and assets. This includes users workstations and mobile devices, Industrial Control Systems and IoT devices. 

Check Point Identity Awareness is designed to ensure only authorised users can access sensitive data, by checking the authenticity of user identities with Single Sign-On, context-aware policies, anomaly detection and Multi-Factor Authentication. For remote users, Harmony Connect Remote offers least privileged access using identity providers and by integrating into directories and with Privileged Access Management (PAM) as-a-Service for DevOps, administrators and engineers. 

Zero Trust Data is Check Point’s data protection solution. It secures data that travels between mobile devices, databases, workstations, application servers, and SaaS applications. The solution features data encryption and data loss prevention, whilst classifying and categorising data. 

What CASB (Cloud Access Security Broker) Solution is Supported by Check Point? 

Check Point’s CASB solution is included as part of the CloudGuard SaaS solution. This CASB 2.0 features an advanced threat protection policy as well as CASB services. For more about Check Point’s CloudGuard Solution please see, What NDR (Network Detection and Response) solution is supported by Check Point?

What SWG (Secure Web Gateway) Solution is Supported by Check Point?

Check Point’s Secure Web Gateway uses Application Control, URL Filtering, Identity Awareness and Analysis, Integrated Antivirus as well as Reporting with optional Intrusion Prevention System and Anti-bot. This solution provides granular reporting and forensic tools for event analysis as well as granular policies at both user and user group level. The Secure Web Gateway identifies malware using ThreatCloud global security intelligence and blocks access to phishing and malware websites through URL Filtering controls which include a database of over 200 million websites. Unified reporting, control and enforcement help to protect machines, applications, web and users. This solution can be deployed through cloud security gateways, security gateway appliances and CloudGuard Connect, Check Point’s cloud security service. 

What FWaaS (Firewall as a Service) Solution is Supported by Check Point?

Check Point offer a range of hardware-deployed Next Generation Firewalls (NGFW) as part of their Quantum Security Gateway solution. They provide zero-day protection using SandBlast Zero Day Protection, and each of their NGFW solutions come with a one-year licence for SandBlast, and the updated range of appliances are based on Infinity Architecture. The solution offers R81 unified security management control across clouds, IoT and networks. Each appliance integrates consolidated management and advanced threat prevention to protect against cyber attacks. 

Hardware appliances:

  • Quantum Edge: A Branch Virtual Security Gateway designed to protect Check Point’s branch SD WAN Cloud Connector from security threats. Designed to create a secure connection between the branch office and the cloud, using Threat Prevention. This is deployed as either a virtual machine on SD WAN or as a universal Customer Premises Equipment (uCPE) device. The solution integrates with SD WAN from VMware, Cisco, Citrix, Aryaka and Versa Networks, featuring: cloud or enterprise management options, privacy and compliance maintenance, lightweight embedded VM with 1 core, 1GB RAM and 1GB disk, integration with an on-premise SD WAN Edge; and integration with VMware SD WAN Edge devices.
  • Quantum Maestro: Check Point offer clients Hyperscale cloud security, which allows them to simplify  data centre workflow orchestration, whilst scaling up existing Check Point security gateways as required. Clients can stack multiple Check Point security gateways together, to create their own virtualised private cloud premise. The Maestro Orchestrator is a Hyperscale Security Solution designed to protect next generation data centres, with the capability to scale up existing Check Point security gateways as needed. The solution has the capability to expand from a single gateway up to a maximum capacity of 52 gateways. Newer models include a 1U form factor designed for hyperscale implementations.
  • Large Enterprises: Check Point offer large enterprises their 15000/16000 Series appliance which includes Quantum Security Gateways for easily managed comprehensive security protection.
  • Data Centre and High End Enterprise: Offers Check Point’s 26000/28000 Series appliance for data centre-grade hardware leveraging Quantum Security Gateways. 
  • Branch Office: Clients looking for branch office solutions can choose between 1600, 1800 and 3000 Series hardware appliances, which include Quantum Security Gateways in small form factor in order to fit branch and small offices.
  • Quantum Spark: A Next Generation Firewall (NGFW) for Small to Medium Enterprises (SMEs) offering threat protection as well as security gateways to provide security for up to 500 employees, leveraging WebUI for management and reporting. The solution can be managed from a mobile application or web portal. This is offered using 1500, 1600 and 1800 Series hardware appliances. This solution includes: IPsec VPN, SSL-VPN, intrusion prevention, anti-bot, sandblast threat emulation, NGFW, anti-spam, SandBlast Threat Emulation and application control and web filtering.
  • Midsize Enterprises: Leverages Quantum Security Gateways with Gen V in one security gateway, provided by a 6000 Series hardware appliance
  • Industrial Appliances: Check Point’s Quantum Rugged is designed to deliver Threat Prevention to protect Industrial Control Systems for industry verticals such as energy, utilities, transportation and manufacturing using 1570R Wired and Wireless Models.
  • Quantum Scalable Chassis: Designed for clients who’s networks are growing, leveraging the Quantum Scalable Chassis with chassis-based and multi-bladed systems for scalability. Uses the 44000 and 64000 Series hardware appliances which are suitable for large data centre and telco environments. 

What MDR (Managed Detection and Response) Solution is Supported by Check Point?

Check Point’s Managed Security Service, ThreatCloud, offers 24/7 monitoring or fully managed service. The service offers monitoring, analysis and advanced tools to ensure the mitigation of threats. The MDR solution includes policy tuning and optimisation, real time phone, web and email notifications, Global ThreatCloud intelligence feeds, access to web portal and periodic reports, 24/7 security event monitoring all year round and support for URL Filtering, Threat Emulation blades, Anti-Bot, Application Control, IPS and Antivirus. This solution supports existing IT teams by automating analysis of customer events, and providing 24/7 access to Check Point’s Security Operations Centres to monitor and diminish threats. 

What NDR (Network Detection and Response) Solution is Supported by Check Point?

Check Point offer CloudGuard as their NDR solution. CloudGuard is a unified, cloud native solution that offers Cloud Security Posture Management, Cloud Workload Protection, Cloud Application Security, Cloud Intelligence & Threat Hunting as well as Cloud Network Security & Threat Prevention. From a single platform solution organisations are able to secure their multi-cloud environments and prevent threats by gaining visibility into cloud traffic as well as leveraging a centralised platform for assets, security alerts and auto-remediation. Security and posture management helps to prevent threats and Automated DevSecOp helps to resolve vulnerabilities whilst also reducing false positives enabling IT security teams to focus on the threats that matter. CloudGuard provides cloud security across multiple platforms such as: Alibaba Cloud, AWS, Azure, Google Cloud, IBM Cloud, Kubernetes, Oracle Cloud and VMware etc. 

What XDR (Extended Detection and Response) Solution is Supported by Check Point?

Check Point offer XDR solutions, the details of which are available on application. Typically, XDR solutions collect and automatically correlate data across cloud workloads, the network, emails, endpoints and servers. XDR aims to improve the speed of detection of threats, and more efficiently investigate security risks. 

How does Check Point Deliver Cloud Security?

Check Point delivers cloud security through its CloudGuard solution. The CloudGuard solution can be applied to: Container Security, Serverless Security Private Cloud Security and Public Cloud Compliance and Governance use cases (see, Check Point Products and Services: CloudGuard Network Security). 

  • AWS Security: Check Point offer security solutions designed for AWS, which include features such as advanced threat prevention, posture management, threat hunting and visibility. This is available via the AWS CPPO programme, through AWS Consulting Partners. The solution is natively integrated with AWS Lambda functions, Amazon GuardDuty, AWS Security Hub, Amazon CloudWatch, Amazon VPC Flow Logs and 50 AWS services and security solutions. 
  • Azure Security: Check Point offers cloud-native security solutions designed for Azure, with cloud network security, advanced security intelligence, threat hunting and high fidelity cloud posture. Offers integrations with Azure Security Centre, Azure Sentinel, Web Application Firewall and other Azure services. CloudGuard is designed to augment Azure security, by protecting sensitive workloads, preventing data loss and ensuring compliance with regulations, with advanced threat protection, visibility, network and workload security, and compliance across multi-cloud platforms.  Check Point is one of Azure’s top security ISVs, offering security for: Microsoft Windows, Azure Logic Apps, Azure Functions, Azure Sentinel, Azure Security Centre, Azure vWAN, Azure Stack, Azure Kubernetes Service, Microsoft 365 and Microsoft Endpoint Manager.
  • Google Cloud Platform (GCP) Security: Check Point offer cloud-native and agent-less security for GCP. Clients can manage security whilst automating compliance across public and multi-cloud infrastructures. Leverages CloudGuard Clarity for visibility into the network security posture of GCP environments, whilst analysing network firewalls and network-based assets such as load balancers, database services and Google Compute Engine virtual machines. The CloudGuard Compliance Engine manages compliance and security hardening. 

What is the Check Point Managed, Co-managed and DIY Services Solution?

The Check Point solution can be managed through third party Managed Service Providers. The solution is also able to be co-managed through their Collaborative Enterprise service that uses Certified Collaborative Support Partners as well as through an appliance only DIY deployment. 

What Reporting and Management is Available Via the Check Point Portal?

The Check Point single pane Infinity Portal provides unified management across all Check Point security products including: Harmony, Quantum and Cloud Guard Solutions. The Infinity portal can be leveraged with the Smart-1 cloud through Check Point’s SmartConsole to provide shared management, policies, logs, visibility and insights across Check Point products. This approach helps ensure consistent security architecture all along the corporate IT infrastructure. Cloud, IoT, Mobile, Networks and Endpoints are secured from zero-day and known threats through the use of shared threat intelligence as well as 64 threat prevention engines to provide an automated and unified security management solution. 

How does Check Point Support Remote Users?

Check Point offer security for remote users with their Quantum Remote Access VPN, designed to support users whilst they are travelling and/or working remotely. The product features multi-factor authentication, encryption of all transmitted data and endpoint system compliance scanning. All of Check Point’s firewall products offer integrated remote access solutions, giving clients the ability to either set up an SSL VPN Portal or configure a client-to-site VPN to allow connections from any browser. The Remote Access VPN connects mobile and remote devices into the corporate network securely from any location. The solution protects sensitive data using multi-factor authentication, encryption of all transmitted data and endpoint system compliance scanning. 

There are two main product offerings for remote users from Check Point. The first is an IPsec VPN, which uses a VPN client to provide remote users with full access to the corporate network. The SSL VPN Portal does not require a VPN client to provide web-based access. These services can be implemented for various operating systems:

  • Remote Access Client for Windows and Mac: Includes VPN Auto-Connect, Secure Hotspot Registration, VPN Client, Multi-factor Authentication Support, Central Management and Compliance Scanning. This is available as Remote Access for Windows (Windows 7, 8.1, 10 and 11) and Remote Access for macOS (macOS 10.14, 10.15 and Big Sur 11). 
  • Capsule Connect: Designed for mobile phone devices, the solution offers secure access to corporate resources, IPsec/SSL VPN and efficient battery consumption, with Connect for Android (supports Android 4+) and Connect for iOS (supports iOS 5.0 and later). 
  • Capsule Workspace: Includes MDM cooperative enforcement, secure container, provides secure access to business applications, segregates business and personal data, and prevents data loss. Comes as Workspace for Android (Android 4+) and Workspace for iOS (iOS 5.0 and later). 
  • Mobile Access (SSL VPN Portal): Includes compliance scanning, secure hotspot registration, VPN auto-connect, central management, IPsec VPN and multi-factor authentication support. 

What is the Check Point SLA?

Below is a table displaying the main focus points of the Check Point Service Level Agreement (SLA). 

Severity Level

Response Time 

(in accordance with Support Plan)

Commitment 

Co-Standard

Co-Premium

Co-Elite 

Severity 1

30 Minutes (Indirect - 30 minute response to the CCSP*)

30 Minutes (direct-Customer can contact TAC directly)

30 Minutes (direct-Customer can contact TAC directly)

Check Point and CCSP* (and clients as required) will commit the necessary resources at any time for problem resolution to obtain workaround or reduce the severity of the issue.

Severity 2

4 Hours 

2 Hours 

30 Minutes (direct-Customer can contact TAC directly)

Check Point and CCSP (and clients as required) will commit full-time resources during business hours for problem resolution to obtain workaround or reduce the severity of the issue and use alternative resources during non-standard business hours. 

Severity 3

4 Hours 

4 Hours 

4 Hours 

Check Point and CCSP will commit full-time resources during business hours for problem resolution, to obtain workaround or reduce the severity of the issue. 

Severity 4

4 Hours 

4 Hours 

4 Hours 

Check Point and CCSP will provide resources during business hours for problem resolution. 

*Certified Collaborative Support Partner (CCSP)

(Check Point Software Technologies Ltd, 2021) See more at: https://www.checkpoint.com/downloads/support-services/collaborative-enterprise-support-sla.pdf 

Check Point Direct Support Programme Service Level Agreement: 

Severity

Level

Response Time 

(in accordance with Support Plan)

Commitment

Standard 

Premium 

Elite

Severity 1

30 Minutes 

30 Minutes 

30 Minutes 

Check Point and the client will commit the necessary resources around the clock for problem resolution to obtain workaround or reduce the severity of the issue.

Severity 2 

4 Hours 

2 Hours

30 Minutes 

Check Point and the client will commit full-time resources during normal business hours for problem resolution to obtain workaround or reduce the severity of the issue and alternative resources during non-Standard business hours. 

Severity 3 

4 Hours

4 Hours 

4 Hours

Check Point and the client will commit full time resources during normal business hours for problem resolution, to obtain workaround or reduce the severity of the issue. 

Severity 4 

4 Hours 

4 Hours 

4 Hours

Check Point and the client will provide resources during normal business hours for problem resolution. 

(Check Point Software Technologies Ltd, 2021) See more at: https://www.checkpoint.com/downloads/service_level_agreement/support-sla.pdf

 

Check Point IAS D-Series Appliance Support Service Level Agreement:

Service 

Level

Response Objective 

Availability 

Commitment

Premium / 

Co-Premium* 

4 Hour 

Same Day 

24/7

 

Premium 

On-site / 

Co-Premium On-site*

6 Hour  

Call-to-Repair 

24/7, 365 days a year.

 

(Check Point Software Technologies Ltd, 2011) See more at: https://www.checkpoint.com/downloads/service_level_agreement/D-series_SLA.pdf 

Service Level Agreements (SLA)

The following table summarizes ThreatCloud Managed Security Services SLAs

 

Standard 

Premium 

Description 

Threat Prevention Monitoring and Alerting Service 

Expert Assisted Threat Prevention and Alerting Service 

Blades supported 

IPS, Anti-Bot, Antivirus, URL Filtering, Application Control, & Threat Emulation 

IPS, Anti-Bot, Antivirus, URL Filtering, Application Control, & Threat Emulation 

24x7x365 security alerts 

Automated 

Expert reviewed 

Response time: 

  • Critical, high severity
  • Medium, low severity 
  • Customer inquiries 

6 hours 

30 minutes 

Quarterly digest 

1 hour

Gateway ownership and management 

By customer 

By customer 

Managed Service portal access

Yes

Yes

Incident tracking and escalation

No

Yes

Local and global reports

Standard 

Enhanced

Protection policy tuning 

Half Yearly 

Quarterly

(Check Point Software Technologies Ltd, 2018) See more at: https://www.checkpoint.com/downloads/products/threatcloud-managed-security-service-datasheet.pdf

Which Service Providers and Partners do Check Point Support?

Featured Technology Partners:

  • Amazon Web Services 
  • Google Cloud Premier Partner
  • Microsoft Azure 
  • Okta
  • ServiceNow
  • Silver Peak
  • Splunk
  • Velocloud by VMware

Technology Partners:

  • A10 Networks 
  • Accellion
  • Acronis 
  • ADLINK Technology
  • Adva Optical 
  • Alcatel-Lucent
  • AlgoSec
  • Alibaba Cloud
  • Alkira
  • Altair Semiconductor 
  • AltiPeak 
  • Amazon Web Services 
  • Anomali
  • Ansible
  • Appdome
  • ArcSight
  • Arista
  • Armis
  • Aruba Network Access Control
  • Aruba SD-WAN
  • Aryaka
  • AT&T Cybersecurity 
  • AttackIQ
  • Attivo Networks 
  • AudioCodes 
  • Avaya
  • Aviatrix
  • BackBox
  • BlackBerry
  • BlackStratus
  • Blueliv
  • Carbon Black 
  • Cisco 
  • Citrix Endpoint Management 
  • Citrix SD-WAN 
  • Claroty 
  • Cognyte
  • CommuniTake Technologies
  • Cradlepoint
  • CrowdStrike
  • Cyber Threat Alliance 
  • CyberArk
  • CyberInt
  • Cyber MDX
  • CyberObserver Ltd.
  • CyberX
  • Cygilant
  • Cynerio
  • CySight
  • D3 Security 
  • Datablink
  • DFLabs
  • Ecessa
  • ElevenPaths
  • Equinix
  • Ericom
  • ERPScan
  • Extreme Networks 
  • FancyFon
  • FEITIAN
  • FireMon
  • Flashpoint Intelligence
  • Flowmon Networks 
  • ForeScout Technologies
  • Fujitsu Technology Solutions 
  • Futurex
  • Garland Technology 
  • Gemalto
  • GeoEdge
  • Gigamon 
  • GlobalSign 
  • Google Cloud
  • Google Workspace
  • GuardiCore
  • HashiCorp Consul
  • Hexadite 
  • HID Global
  • HPE (Hewlett Packard Enterprise)
  • Huntsman Security 
  • IBM
  • IBM MaaS360 with Watson 
  • ICS 2
  • IgniteTech
  • imVision Technologies 
  • Indeni
  • InfoBay
  • Infoblox
  • Infovista 
  • InsiderSecurity 
  • Intel
  • IntSights 
  • iPass Inc.
  • IRONSCALES 
  • Karmasis
  • Keyless
  • L7 Defense 
  • LiveAction
  • LogRhythm
  • Logz.io
  • Malware Patrol 
  • ManagedMethods 
  • ManageEngine 
  • Matrix42
  • McAfee
  • Medigate 
  • Menlo Security 
  • Microsoft Azure 
  • Microsoft Intune 
  • Minerva
  • Mnemonic
  • MobileIron 
  • Napatech
  • Netformx
  • Netskope
  • Nozomi Networks 
  • Nuage Networks 
  • Nutanix
  • NXLog
  • Okta
  • OneSpan
  • OpenStack 
  • OPSWAT
  • Oracle 
  • Oracle Communications
  • Ordr
  • Paessler
  • PagerDuty 
  • Passlogy
  • PhishLabs
  • Picus Security 
  • Portnox
  • Pulse Secure 
  • RAD
  • Radware
  • RedSeal
  • Restorepoint 
  • Ribbon 
  • Riverbed
  • RSA
  • SAASPASS
  • Safe-T
  • Safenet and Cryptocard
  • SAP
  • SCADAfence
  • Secret Double Octopus 
  • SecurePush 
  • SecurityMatters
  • SentryBay 
  • ServiceNow
  • Siemens Enterprise Communications 
  • Siemplify 
  • Silver Peak 
  • Silverfort
  • SixGill
  • Skybox Security, Inc.
  • Skyhigh
  • SolarWinds 
  • Sonpo
  • Splunk
  • Stellar Cyber
  • Swimlane
  • Telco Systems
  • Tenable
  • ThreatConnect
  • ThreatQuotient
  • TrapX
  • Tripwire
  • Trustwave
  • Tufin Technologies
  • UBiqube
  • Vectra
  • VeloCloud from VMware 
  • Venafi
  • Versa Networks 
  • VMware
  • VMware Workspace ONE
  • Wavecrest Computing 
  • Wind River 
  • Xabyss
  • ZeroFOX

Additional Notes:

Check Point offers security solutions for the following industries: 

  • Education 
  • Financial Services 
  • Government 
  • Healthcare
  • Industrial Control Systems ICS & SCADA
  • Retail
  • Service Provider

 

Comparisons

Current Vendor
Check Point

Add to Compare

Additional Vendors

Add to Compare

VeloCloud

Add to Compare

Aryaka

Add to Compare

Check Point

Once you have submitted, Netify will use your IP location to put you in touch with your local Check Point contact.

Once you have submitted, Check Point will be in contact to provide availability. Your data will not be shared outside of Check Point and you will not be added to any mailing lists.

Please provide the following details:

Compare Vendors
Compare
Remove All