Check Point UTM Management and Gateway Bundle - license - 100 users, 3 site

Mfg.Part: CPUTM-CKP-3-100 | CDW Part: 982208 | UNSPSC: 43233203
Availability: In Stock
Warranties
$5,242.85 Advertised Price
Advertised Price
Lease Option ($147.27/month) Lease Price Information
Note: Leasing is available to organizations only. Leasing is not available to individuals.
Product Details
  • License
  • 100 users
  • 3 sites
View Full Product Details
Better Together
Check Point UTM Management and Gateway Bundle - license - 100 users, 3 site
Quick View
Total Price:

Product Overview

Main Features
  • License
  • 100 users
  • 3 sites
Check Point Software Technologies is the worldwide leader in securing the Internet. It is the confirmed market leader of both the worldwide VPN and firewall markets.

Check Point UTM Management and Gateway Bundle - license - 100 users, 3 site is rated 4.0 out of 5 by 9.
Rated 3 out of 5 by from Good filtering features but has terrible technical support What is our primary use case?We were developing something called a remote monitoring center and we wanted to have many plans logging into and having a VPN connection to their networks.What is most valuable?The filtering was very good.What needs improvement?The licensing could be improved. It restricted us to maybe 55 connections per license, so anything less than 55 VPN connections. But when you grow and have 100 clients coming in, you have to upgrade. I'd prefer to get something which is a one case scenario.I think in the future they should also overhaul how all the functionalities work. I tried to gauge what I expected it to do after the setup, but as much as I tried to use it, I still had issues, still had problems with it. And OEM wasn't very supportive. Maybe it works for some setups, but not for what I set it up for.For how long have I used the solution?I've been using the solution for two years.What do I think about the stability of the solution?I would give the stability a six out of 10.What do I think about the scalability of the solution?I would give the scalability 6 out of 10.How are customer service and technical support?Technical support was very bad because the supplier who sold it to us, wasn't very supportive, and he wouldn't giving us direct links to the OEM. Then the OEM wasn't quite supportive and that's when we decided if we're going to have that kind of a relationship, we'd rather pull out.If you previously used a different solution, which one did you use and why did you switch?We were using Cyberoam, and then we changed to Sophos. We had an appliance for Sophos, and then because we were moving to a bigger setup, we moved to Check Point. We've since moved to FortiGate. That's the solution we have now.How was the initial setup?The initial setup was easy. Because it was a new deployment, it took four hours. The good thing about it was is that it was a retrofit. It wasn't something they had to move out and bring in.What's my experience with pricing, setup cost, and licensing?I started with 46 users, and clients were growing to 59 and heading on to 60. That's when I suffered limitations with their licensing. We had to go back and forth with the supplier in this area. It didn't work out well for me or the clients. It wasn't favorable.The licensing was sold to me as yearly, but at the beginning, I assumed if I was getting the license, that it would be a one-time thing. I didn't like that I had to renew yearly.What other advice do I have?We've actually stopped using it. We switched to FortiGate because we had side to side VPNs that were are actually bringing issues with the UTM itself, so we had to swap it over.I would rate the overall solution a six out of 10. There's room for improvement. I think it has the potential to do so much, but it is limited to some features. Or maybe it didn't serve my purpose as I expected it to. That's why I now think there is a bit of reservation on my end for using the product.In terms of advice, I'd say that anyone going with the solution should really know the product before they purchase it, otherwise it will be a waste of money. If they really know it or have someone who actually knows the product 100 percent, they might be okay.For our company, it didn't work, but what really captured the market at this end for many was the 4G and because there's just one price, and the setup is easy.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2019-08-05
Rated 4 out of 5 by from We can create a domain to separate and segregate functions and services What is our primary use case?We use it as a perimeter firewall. We need to put all the security inside of our data center and Check Point was the first option to use it as the firewall in order to offer all of our services via the internet.How has it helped my organization?This solution improved our email service, with less presence on the internet blacklist.What is most valuable?The policies that you can use with this equipment are valuable. This is very nice for us; it responded to our requirements for the application to go to the internet. So, we can create a VPN for all the companies that want our service. We can create a domain to separate and segregate some functions, some services. These are the features that we are currently using right now.What needs improvement?The solution could be improved by creating or including in the product enforcement of some kind to deal with cybersecurity and all the new kinds of attacks we are dealing with right now.One thing that we are facing also is the PKI, the public key infrastructure. We don't know how to use this solution to get the visitor certification from the PKI. We did some searching on the internet looking for cases on how we can have this solution integrated with the PKI and we didn't find anything about this.I would like it if the vendors could pay special attention to integration. It must be easy to do with other kinds of solutions. For example, now to authenticate Cisco routers to the Check Point. So this is one thing that the vendors must think about, how can you make this solution easier to integrate with the others, to be able to collaborate.For how long have I used the solution?I've been using the solutions for 1.5 years.What do I think about the stability of the solution?It's a stable and good community. You can use it, plus you have all the information that you need from the vendors. You need updates sometimes, but not frequently. It's good to use.What do I think about the scalability of the solution?At the moment, we are using two devices, but according to workloads, you can add more devices as you need to. It's scalable. We have 1001 branches/sites right now. And each branch has at least four users. Our application spread all over the country and we are in all the provinces and districts. Right now we have not less than 3,000 users that must access all our environments through this device.Also, right now, I only have one Institution, included in this solution. Currently, I'm going to the other government institutions and each one has is own concurrent users/branches.How are customer service and technical support?As we don't have a representative of Check Point supplier in our country, this makes it very difficult when we have some issues to resolve. I can say for the VPN implementation, we had some trouble and some support from the local Check Point technical team (Supplier).With the Supplier as a bridge between the vendors and the clients, we can solve this quickly. So I think this kind of solution must have strong suppliers or representation, in Africa especially in Southern Africa, they need to have close representatives for the kind of situations that we cannot solve by ourselves.Southern Africa is facing cybersecurity concerns because of a lack of expertise.If you previously used a different solution, which one did you use and why did you switch?We started with the Cisco PIX. The equipment was at the end of its life.How was the initial setup?The setup was not so complex, but of course, you need to have some skill to implement it. I would say, from one to five, the complexity is three or four. It's not complex.For deployment, we had two phases. One was to implement the equipment to respond to our needs. And the second was to implement the VPN in our branch offices. The first phase took only one month. The second phase we're doing slowly because when we have a new branch we add it. We're doing this continuously.The acquiring must be done through a reseller/supplier based in our country, by the law. The reseller worked with us in the first implementation phase.The administration is normal and I am doing with a team composed by four people, which two are dedicated day by day work watching into this equipment alerts, logs, etc, and two others as a backup which I believe is enough for deployment and maintenance.What was our ROI?I'm using this solution to provide my services and applications over the internet, and according to what we are doing, the workload is huge and we have presence all over the country. If you do the calculations between the investment and the usage of the solution, I can tell you, in less than three years we will have all the investments paid off.What's my experience with pricing, setup cost, and licensing?I cannot tell you the pricing, but we paid for three years. There aren't any other costs above the standard licensing and fess. We bought it, we use it.Which other solutions did I evaluate?We evaluated Cisco ASA and FortiGate.What other advice do I have?If we're talking about value, in my opinion, the financial institutions are the companies that I see that can use this most. I like it because it's user-friendly. You can use it without a lot of complexity. Of course, I sent my staff for training but only to guarantee that they are certified to use it.I would suggest you first go for training before you implement the solution.I would rate this solution 9 out of 10. It was very easy for us to implement this solution. And this has all the features that we need to use it. Of course, people say that FortiGate, in comparison, is easier than this one. When we were evaluating services, we knew we needed something robust and easy to implement with the old equipment and something that was safe. We looked at three options: Cisco, Check Point, and FortiGate, we talked about these three products. My team of four invited another four people to evaluate these three products. All of them know that Check Point is quite difficult but it's the best. All of them choose to use Check Point. We are all Cisco aware, but Check Point, it's good.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2019-07-10
Rated 4 out of 5 by from We were able to secure our GPS, email, and Internet settings What is our primary use case?The primary use case is for the security gateway.How has it helped my organization?We were able to secure our GPS, email, and Internet settings.What is most valuable?The databases and its signatures are its most important features.What needs improvement?Some improvement is required to addition feature to set data and concurrent session limit of each user. Currently, there is no option .Check Point should include a DNS server as a feature as additional advantage.For how long have I used the solution?One to three years.What do I think about the stability of the solution?It is stable.We have two staff maintaining the solution.What do I think about the scalability of the solution?It is scalable. We can increase users.Currently, we have around 2000 users. If we increase our students, then we will increase our usage.How are customer service and technical support?Technical support is goodHow was the initial setup?The initial setup is not complicated. It required some implementation initially, but after that, it is easy.The deployment required one or two days.What was our ROI?This product is very good for the investment.What's my experience with pricing, setup cost, and licensing?The pricing is too high.Which other solutions did I evaluate?We also evaluated Fortinet.What other advice do I have?I would recommend this product. The database is very good. Check Point is a worldwide product.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2019-04-16
Rated 4 out of 5 by from The most important features are performance and easy management. Valuable Features:The most important features are performance and easy management.Improvements to My Organization:The solution helped in the identification and categorization of access and provided a high index of traffic analysis.Room for Improvement:I would like to see improvements in the report area. Some features should be integrated and not licensed separately.Use of Solution:We have been using this solution for seven years.Stability Issues:I did not encounter any issues with stability.Scalability Issues:I did not encounter any issues with scalability.Technical Support:I would give technical support a rating of 7/10.Previous Solutions:We used other solutions before this one. We switched because we needed to increase our level of analysis, as well as improve our solution management.Initial Setup:The initial setup was straightforward. We did not find it complex, as we narrowed it down in advance and chose to reformulate rules that we did not identify as pertinent.Cost and Licensing Advice:Carefully evaluate the predominant type of traffic, SSL or other, as this reflects on CPU and memory usage. It will directly reflect the value of the investment.Other Solutions Considered:We evaluated Palo Alto, Cisco, and Fortinet.Other Advice:I would focus on training. A team that has difficulty operating the product will certainly not be able to enjoy the features and differentials that the product offers.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2017-07-10
Rated 4 out of 5 by from Mobile access is valuable to us, but the GUI needs to be worked on. Valuable Features:* Application Filtering* URL Filtering* IPS* Mobile accessImprovements to My Organization:Browsing speed has picked up considerably as users now have to do their official work and cannot browse social sites instead. Additionally, remote connections are now more secure and controlled.Room for Improvement:The entire GUI, look and feel of the application.Use of Solution:I've been using it for two years.Deployment Issues:No, it was deployed by the local support company here in Nigeria.Stability Issues:No issues encountered.Scalability Issues:No issues encountered.Customer Service:9/10.Technical Support:9/10.Previous Solutions:We used Checkpoint 1075 UTM1. We switched as we needed a bigger box that can handle more traffic without slowing down browsing speed.Initial Setup:The setup was done by their support reps here in Nigeria. It was straightforward, you just have to Install it and then configure your rules.Implementation Team:We used a vendor who I would rate 6/10.Other Solutions Considered:We also looked at Cyberoam, Cisco ASA and Fortinet.Other Advice:Get a sound Check Point specialist to implement it , do a proper handover, and training for the product.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2015-09-17
Rated 5 out of 5 by from It presents information clearly and doesn't require command code, but VPN and IPS have room for improvement. Valuable Features:* Firewalls* IPSImprovements to My Organization:As a security information analyst, it helps me to see information in a very clear way. You don’t have to use command code. The platform is very simple, and you don’t need to be an expert to understand the reports.Room for Improvement:* VPN - It's not that good, so I moved to Juniper.* IPS - It has room for improvement, as sometimes hackers are able to get through.Use of Solution:I've used it for two years.Deployment Issues:My web infrastructure is different than in other places, therefore the version provided by CheckPoint did not fit a first. I needed to report the bugs to CheckPoint for them to fix them and update the version.Stability Issues:I have two clusters, so even in the rare situation that I have a problem with the stability, it will switch to the cluster. The end users would not notice a switch.Customer Service:Customer service is not their strong suite. It takes a lot of time until they fix anything, and it can be better to try and fix the issue without them. They have many clients, most of them are large companies, so it’s hard for small-medium companies.Technical Support:Technical support is not their strong suite. It takes a lot of time until they fix anything, and it can be better to try and fix the issue without them. They have many clients, most of them are large companies, so it’s hard for small-medium companies.Previous Solutions:I am using both CheckPoint and Fortigate as result of my complex web infrastructure. Every ISP exits through a different firewall.Initial Setup:It was complex. I initially received two different firewalls from CheckPoint due to my web infrastructure. Every firewall got configured with different rules, and at the point when we wanted to merge them, problems occurred.Implementation Team:Our integrator did great work, integrating 1500 rules.ROI:It's the best of breed with a good return.Cost and Licensing Advice:You don’t have to buy the cluster immediately. I waited for a year before buying it. By doing that, I’ve split the budget, and was able to convince my managers to buy the solution.Other Solutions Considered:I bought only the hardware, and used an open server license for the rest. CheckPoint would not suggest it, but it works for me.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2015-07-26
Rated 5 out of 5 by from It performs reliably and you can watch it block hacks, but it needs more customization options for network threat management. Valuable Features:* Reliability* Performance* SecurityImprovements to My Organization:It keeps the bad guys out.Room for Improvement:They should provide better customization options for network threat management.Use of Solution:I've used it from 2003 to date.Deployment Issues:At first, we tried to implement it not as a cluster, but when we decided to implement as a cluster, it required us to change our entire network infrastructure.Stability Issues:Since I was a beta tester, it had a lot of bugs, which I helped fix.Scalability Issues:It depends if you buy the hardware from Check Point or not. I didn’t, so I didn’t have any issues with scalability.Customer Service:Horrible. It takes them days, sometimes weeks, until they try to help, and then they don't help enough. I have a limited support help. Generally speaking, though, they don’t have problems, and I’m really satisfied.Technical Support:Not good. They have one of the top engineers, who told me to change something and now I’m buying something else from them.Previous Solutions:I’ve just bought FortiGate, and am trying to compare the two to determine which has better features.Initial Setup:It's straightforward, as I did a course for a year with Check Point.ROI:Excellent. Best in their market.Cost and Licensing Advice:Price is 170,000 Shekels/year. Day-to-day is one and a half people for licensing.Other Advice:This is my favorite product that I use, and I think it's one of the best in the world. Watching it block hacks is very interesting. It's a great product and fun to work with. Keep innovating, Check Point.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2015-07-20
Rated 4 out of 5 by from It's not cheap when compared to other solutions, but it has some valuable features, such as SSL VPN, and IPS. Valuable Features:* Threat prevention* IPS* Application Control and URL filtering* SSL VPN* Mobile Access* Anti Spam* MailImprovements to My Organization:IPS prevents many unwanted, malicious objects from our web sites. It provides high level security for our network, and by using AppWiki, thousands of application can be controlled over the network. Also, the anti-spam engine provides effective solutions for spam mails.Room for Improvement:The physical memory is insufficient for installing policies and some other operations. It would be better to put 4GB RAM into the appliance.Use of Solution:We have been using Check Point solutions for 15 years, and this appliance since 2014.Deployment Issues:There were some memory bottleneck problems.Stability Issues:No issues encountered.Scalability Issues:No issues encountered.Customer Service:It's satisfactory.Technical Support:It's satisfactory.Previous Solutions:No previous solution used.Initial Setup:We have upgraded from a UTM-1 appliance to a Next Generation one. This process has taken some time.Implementation Team:We implemented our solution through an official vendor in our country. They helped us through every stage of our purchase and installation. The service was satisfactory.Cost and Licensing Advice:Check Point is not cheap when compared to other solutions, but it provides high level security. As an organization we are fully satisfied with this product.Other Solutions Considered:No other options were evaluated.Other Advice:I would highly recommend others to implement or try Check Point products for their security solutions.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2015-07-08
  • y_2019, m_8, d_22, h_15
  • bvseo_bulk, prod_bvrr, vn_bulk_2.0.13
  • cp_1, bvpage1
  • co_hasreviews, tv_0, tr_9
  • loc_en_US, sid_982208, prod, sort_[SortEntry(order=SUBMISSION_TIME, direction=DESCENDING), SortEntry(order=FEATURED, direction=DESCENDING)]
  • clientName_cdwg