Check Point VSX-1 9090 - security appliance

Mfg.Part: CPPWR-VSX-APP-M909 | CDW Part: 2240199 | UNSPSC: 43222501
Availability: 11-13 days
$106,824.26 Advertised Price
Advertised Price
Lease Option ($2835.12/month) Lease Price Information
Note: Leasing is available to organizations only. Leasing is not available to individuals.
Product Details
  • 1 9090
  • Security appliance
  • rack-mountable
View Full Product Details
Better Together
Check Point VSX-1 9090 - security appliance
Quick View
Total Price:

Product Overview

Main Features
  • 1 9090
  • Security appliance
  • rack-mountable
Marketing description is not available.
Check Point VSX-1 9090 - security appliance is rated 4.3 out of 5 by 3.
Rated 4 out of 5 by from Enables us to monitor what comes over to our network and we can then check the dashboard and work accordingly What is our primary use case?We use this solution to secure networks. We block unwanted malware.How has it helped my organization?We have a development team who asked us to open reports. We asked that they initiate traffic to see what is blocking them. We then give them reports and after that, they ask to open the report for the traffic application and we work accordingly.What is most valuable?The most valuable feature is the monitoring. We can easily monitor what kind of stuff comes over to our network and we can then check the dashboard and work accordingly.What needs improvement?I would like for them to develop guides. If you compare it with Cisco, you can just type out any problem you're having regarding Cisco and you will easily get a solution. With Check Point, it's not easy to get a solution.For how long have I used the solution?Three to five years.What do I think about the scalability of the solution?We maxed out scalability.How was the initial setup?The initial setup was a bit complex. Is take two or three months to implement and we have to continuously work on it. We needed two to three engineers for deployment.Which other solutions did I evaluate?We researched the top firewall solutions and settled on Check Point and Palo Alto. Comparatively, both are good.What other advice do I have?Ultimately Palo Alto is a very advanced firewall. This firewall can easily identify what application is running behind the network.I would rate this solution an eight out of ten.Disclaimer: My company has a business relationship with this vendor other than being a customer:Partner.
Date published: 2019-02-25
Rated 4 out of 5 by from The product is stable but we had issues when we had really old hardware that had a less than stable OS. Valuable Features:The ability to host multiple virtual systems, categorize them based on their function and importance and the ease of use with which these can be deployed.Improvements to My Organization:We do not need to keep provisioning hardware each time there is a requirement for a new firewall. Having a physical server capable of hosting many virtuals and also provide performance and redundancy is a big benefit and hence our preference for VSX.Room for Improvement:Each new version does offer a new set of features plus also incorporates bug fixes identified during the life cycle of the previous product. Hence, this product keeps on maturing as newer versions are released.Use of Solution:More than 15 years.Deployment Issues:Not from a product point of view. The critical aspect here is proper planning, performing several dry runs and identifying potential issues to the best possible extent. It's really about planning and testing prior to implementing.Stability Issues:No, because we keep on top of our installations. We maintain them by performing routine maintenance, and hot-fix applications. Stability wise the product is stable but we had issues when we had really old hardware that had a less than stable OS.Scalability Issues:No issues encountered.Customer Service:Excellent – the vendor always supports us and is very proactive. We have excellent relations with the vendor.Technical Support:Definitely excellent. It’s a pleasure to talk with the tech support people and know they fully understand the issues – this gives us a sense of comfort.Previous Solutions:No previous solution used.Initial Setup:It was simple. That is because the solution is architectured and designed from the ground up and the relevant teams were involved from the beginning.Implementation Team:We did an in-house implementation.ROI:Cannot give exact figures but we have made a lot of saving by implementing this product in our organization.Other Solutions Considered:We were clear on our options – no we did not choose any other options save for the most important ones.Other Advice:Think of VSX as similar to VMware ESX solution. It will, in the longrun, save a lot of money with the return it gives to the company. It iseasy to maintain by a capable support team and can easily fit within thenetwork where there is a requirement.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2015-03-23
Rated 5 out of 5 by from Very intuitive ACL menu and design. A powerhouse firewall appliacnce Valuable Features:Easy to setup and use as its based off RedhatIntuitive ACL menu for writing rulesPre-populated common portsCustomizable portsSuite of tools to report and troubleshoot network conditionsRoom for Improvement:At the beginning the design can be overwhelming, where to startGetting used to the CLI syntax but do-ableOther Advice:This enterprise class firewall appliance is great and very intuitive menu. Great for inline firewall access control to work with Cisco or any vendor switch. It has a suite of applications to help you setup virtual firewalls and provide redundancy or bandwidth to whatever application or service you are providing.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2014-09-15
  • y_2019, m_4, d_19, h_15
  • bvseo_bulk, prod_bvrr, vn_bulk_2.0.12
  • cp_1, bvpage1
  • co_hasreviews, tv_0, tr_3
  • loc_en_US, sid_2240199, prod, sort_[SortEntry(order=SUBMISSION_TIME, direction=DESCENDING), SortEntry(order=FEATURED, direction=DESCENDING)]
  • clientName_cdwg