Notifications
Notifications
CDW Logo

CHECKPOINT-VSX-1 APPLIANCE MOD 9090

Mfg # CPPWR-VSX-APP-M909 CDW # 2240199

Know your gear

This item was discontinued on October 06, 2022

Enhance your purchase

Check Point VSX-1 9090 - security appliance is rated4.50 out of5 by6.
Rated 5 out of 5 by from Completely closes the potential vulnerability channel and has excellent scanning and reportingWhat is our primary use case?We are able to use the solution for cloud protection and in parallel with or just for network protection. In our scenario, we use it as a border network firewall, which is based on a virtual environment and we're using it for the border protection of our network.What is most valuable?We find Check Point valuable because they are 100% focused on security. It totally closes the potential vulnerability channel. We can check our mail and our attachments and we can scan everything easily. We get an immediate report about the situation of the attachments. We can discover if the target's security attack was started from phishing, etc. We also enjoy using the additional features that protect our internal customer from targeted attacks.What needs improvement?The stability of the solution could be improved, but this is the problem of all the solutions in the market. This isn't just a problem specific to Check Point.For how long have I used the solution?I've been using the solution for four years.What do I think about the stability of the solution?The stability is good. It's really good compared with Palo Alto, Fortinet, and Cisco, most of all. But it definitely can be better.What do I think about the scalability of the solution?The scalability of the solution is good. Right now, the solution protects about 400 customers.How are customer service and technical support?The solution's technical support is good. If we have problems, we can speak directly to Check Point, or we can speak to one of their partners or a local partner. The solution has a great community that surrounds it.How was the initial setup?The initial setup was complex because we were using a complex networking architecture. It took us about two days to implement the solution. For administration of all of this infrastructure, we need two people. For deployment and maintenance, we need just one person.What about the implementation team?We used the implementation guide provided by the company to assist with deployment.What's my experience with pricing, setup cost, and licensing?Our licensing is yearly at a fixed cost.The solution has a very flexible pricing model. It can provide the same level of security and performance, but in parallel, can be subscription-based.What other advice do I have?The solution is the on-premises deployment model which we use in our server environment.We are an integration company, and although we deal with other solutions, we mainly focus on Check Point.The solution is a great mix of user experience, flexibility, security features, and cost. After five years, I believe the total cost ownership will be much cheaper than any competitor.The advice I would give to others interested in implementing is that this solution does have security problems. Not Check Point, per se, but in the network environment. The security recommendation from the Check Point and from us is to use the VSX in the internal network. It should not protect your border because there are some issues around bugs, etc. It could cause vulnerabilities if it's used this way.I would rate this solution eight out of ten.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2019-08-27T00:00:00-04:00
Rated 5 out of 5 by from An expandable solution that can be upgraded on-demand and as requiredWhat is our primary use case?We are a solution reseller, and we also assist our clients with support. This is one of the solutions that we provide to our customers.This solution can be deployed in many ways. It is available in the cloud on AWS and Azure. You can install it in a virtual machine, you can have it as a hybrid, and you can have it on-premises.What is most valuable?The most valuable feature of this solution is that you can start off with a simple firewall and expand it to UTM. You don't have to buy a UTM to start off with, but rather, you can buy a simple firewall and upgrade it. The simple firewall comes with many of the UTM features, in any case.What needs improvement?The management console can be simplified because at the moment, it is a bit of a challenge to use.I would like to see support for software-defined wirings in the next release of this solution.For how long have I used the solution?I have been working with this solution for eighteen years.What do I think about the stability of the solution?I've got Check Point systems that have not been rebooted in two years, so it is quite stable.What do I think about the scalability of the solution?This solution is quite scalable, but it requires hardware upgrades from time to time. Or, if you go with a virtual environment then it is very scalable because you start with one CPU and can increase to twenty-four CPUs.How are customer service and technical support?Technical support for this solution is fairly good. We have got enough skill in our business to do most of it, but once you raise a call with support, they give you quite the fast and effective answer.How was the initial setup?The initial setup of this solution is in-between, but more on the complex side. It's not the most complex product that I've worked with, but definitely not the simplest product that I've worked with.What's my experience with pricing, setup cost, and licensing?The price of this solution varies from small to extremely expensive. On average, it is normally on the lower end, being less expensive than Palo Alto or Cisco.What other advice do I have?The biggest lesson that I have learned from this solution is to never assume that something is simple, because there's always a hidden snag that we run into.I would rate this solution a nine out of ten.Disclaimer: My company has a business relationship with this vendor other than being a customer:Reseller.
Date published: 2019-08-18T00:00:00-04:00
Rated 5 out of 5 by from The product is stable but we had issues when we had really old hardware that had a less than stable OS.Valuable FeaturesThe ability to host multiple virtual systems, categorize them based on their function and importance and the ease of use with which these can be deployed.Improvements to My OrganizationWe do not need to keep provisioning hardware each time there is a requirement for a new firewall. Having a physical server capable of hosting many virtuals and also provide performance and redundancy is a big benefit and hence our preference for VSX.Room for ImprovementEach new version does offer a new set of features plus also incorporates bug fixes identified during the life cycle of the previous product. Hence, this product keeps on maturing as newer versions are released.Use of SolutionMore than 15 years.Deployment IssuesNot from a product point of view. The critical aspect here is proper planning, performing several dry runs and identifying potential issues to the best possible extent. It's really about planning and testing prior to implementing.Stability IssuesNo, because we keep on top of our installations. We maintain them by performing routine maintenance, and hot-fix applications. Stability wise the product is stable but we had issues when we had really old hardware that had a less than stable OS.Scalability IssuesNo issues encountered.Customer Service and Technical SupportCustomer Service: Excellent – the vendor always supports us and is very proactive. We have excellent relations with the vendor.Technical Support: Definitely excellent. It’s a pleasure to talk with the tech support people and know they fully understand the issues – this gives us a sense of comfort.Previous SolutionsNo previous solution used.Initial SetupIt was simple. That is because the solution is architectured and designed from the ground up and the relevant teams were involved from the beginning.Implementation TeamWe did an in-house implementation.ROICannot give exact figures but we have made a lot of saving by implementing this product in our organization.Other Solutions ConsideredWe were clear on our options – no we did not choose any other options save for the most important ones.Other AdviceThink of VSX as similar to VMware ESX solution. It will, in the long run, save a lot of money with the return it gives to the company. It is easy to maintain by a capable support team and can easily fit within the network where there is a requirement.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2015-03-23T00:00:00-04:00
Rated 5 out of 5 by from Excellent technical support but the zero-day threat detection needs improvementWhat is our primary use case?Our primary use case of this solution is for security.What is most valuable?The IPs and the VPN are the most valuable features of this solution.What needs improvement?I would like to see an improvement on the zero-day threat detection. It is also not very user-friendly, so it would be great if it could be less complicated and easier to operate. The dashboard needs to be easier to use.Also, if the solution could be cheaper, it would really help, because it is very expensive.I would like to see sand boxing added to the new version.For how long have I used the solution?I have been using Check Point Virtual Systems for ten years now.What do I think about the stability of the solution?The program is very stable.How are customer service and technical support?The technical support is excellent and they always responded when we had an issue.How was the initial setup?The initial setup wasn't too complicated, but it wasn't very easy and straightforward. Deployment took us about a week.What's my experience with pricing, setup cost, and licensing?It is a very expensive program and there are additional costs despite the standard licensing fees. So I would like to see it being more affordable in the future.What other advice do I have?I will recommend this program to others and my rating is seven out of ten. I do recommend that users should always use the checkpoints and backup as often as they can.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2019-08-26T00:00:00-04:00
Rated 5 out of 5 by from Multiple virtual firewalls on one box are extremely usefulHow has it helped my organization?Monitoring using SmartConsole and all its features is extremely easy, and I find SmartEvent an excellent monitoring tool for spotting threats and user behaviour.What is most valuable?The multiple virtual firewalls on one box are extremely useful and the interconnection with virtual switches is simple and easy to understand.We need a product that is logical and for which we can find people skilled who are interested in learning it. Check Point is always a winner, as its an industry standard.What needs improvement?We have Microsoft CASB cloud app security and it's one of the least compatible firewalls. They really need to look at this, as both Check Point and Microsoft are major players. Why aren't they compatible? If we had Palo Alto then we wouldn't have this problem.For how long have I used the solution?Three to five years.What do I think about the stability of the solution?No stability issues, not even once. The firewall is set up and and the various parts are interconnected. It works just fine. R80.1 is also a major improvement.What do I think about the scalability of the solution?No scalability issues but I don't think we are utilizing the device to its maximum capability.How is customer service and technical support?Good. We go with a distributor but they work okay. It is a lot more reliable with the latest OS than it used to be.Which solutions did we use previously?No previous solution. It's always been Check Point, though before the virtual firewall we used to have a Juniper fw. Now we are just Check Point because for the threats we face now, I don't think we need different firewalls at different layers.How was the initial setup?The issue normally is getting SIC working between the gws and the management server. Actually it's reasonably straightforward, though you have to get it right. It used to be you had to have a certain type of disk drive but this is a better solution.What's my experience with pricing, setup cost, and licensing?Look into this carefully and be sure you use all you buy. We haven't bought SandBlast or the bot solution but they look effective.Which other solutions did I evaluate?No, it was decided to stay with Check Point.What other advice do I have?Make sure you can make use of the virtual firewalls and read up on the device or take a course before you implement. Or, if you get it installed, make sure you have the right devices in the right virtual firewalls.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2018-01-23T00:00:00-05:00
Rated 5 out of 5 by from Valuable features include centralized management using the MDM solution and the log management module.What is most valuable?Valuable features include centralized management using the MDM solution of Check Point and the Log Management module. The latest version of VSX supports all blades of Check Point's security suite.I get maximum flexibility as I can use a standard management server to manage all virtual gateways along with a dedicated log server for each virtual gateway. Sometimes I can use a single server to manage all virtual gateways.How has it helped my organization?Earlier versions only supported the Firewall and VPN feature. Now I can run Anti-Bot/Anti-Virus, URL and App Filtering, Threat Emulation, and other blades.I can assign weights to each virtual gateway depending on how critical each virtual gateway is.The VSLS feature provides linear scalability so I can keep adding hardware (maximum of eight) to meet my performance expectations.What needs improvement?It is somewhat difficult to upgrade the entire hardware without downtime.For how long have I used the solution?We have been implementing this solution to many customers in India and the SAARC region for seven years now. This is one of the most popular virtual firewall products in the industry.What do I think about the stability of the solution?We have not encountered any problems with stability.What do I think about the scalability of the solution?A sufficient amount of planning is required to deploy a solution that is scalable. However, as Check Point allows an Open Server to deploy its VSX solution, scalability is not a problem once the base hardware is chosen appropriately.How is customer service and technical support?Support is one area where efforts should be required from Check Point. Customers having multiple, more than ten, gateways are encouraged to consider Diamond Support services.Which solutions did we use previously?We did not use any other solution previously.How was the initial setup?Engineers having less than three years of hands-on experience on Check Point products may find this product somewhat challenging. However, the best part is, once the product is deployed, there is no difference between virtual gateway and physical gateway from the operational perspective.What's my experience with pricing, setup cost, and licensing?Check Point pioneered this product, so don't look anywhere else if you are looking for a stable and scalable product with top-notch security blades.Which other solutions did I evaluate?We did not evaluate any alternative products.What other advice do I have?Choose your implementation partner very carefully. Choose someone who has done multiple, large-scale implementations and can show proof of the same in terms of customer references through emails or phone calls.Disclaimer: My company has a business relationship with this vendor other than being a customer:We are a value added partner of Check Point in India.
Date published: 2017-06-08T00:00:00-04:00
Rated 5 out of 5 by from Reliable solution with a unique architecture that creates flexibility in the deploymentWhat is our primary use case?We install the solution for our customers and Check Point is our preferred solution in any firewall deployment. The two-layer architecture with the administration and security makes a difference and in every instance, we know who the user is.The touch features are very different than other brands. From the feedback I get from my customers, Check Point is the best.How has it helped my organization?Check Point gives us a strong solution that we can depend on when deploying it for clients.What is most valuable?The most valuable features are within the unique architecture that creates flexibility in the deployment.What needs improvement?The knowledge base that is available is limited and it is on a closed network where only a customer or certified engineer will know about it. A beginner who wants to learn about the product actually has to enroll in training or get certified and have a valid license or certification to access information. That is something I find strange as most users would like to know about it. The new users would like to be able to see those areas and what type of concerns or any configuration issues they may have before deciding to work with the product. To me, that is a simple open-mindedness. In terms of the availability of the system and functionality of the product, there's no concern. But the problem is that efficient VSX (Virtual System Extension) deployment is complicated. Most of our customers are afraid to deploy any configuration changes because they are afraid something will happen.It's not the same situation as with other products. I guess the reason behind it is the kind of architecture which they are using. There are more possibilities to crash than other products. That is the feedback I normally get from end-users, but even so, for us, I would say it's one of the best product.For how long have I used the solution?We've been using this product for over two years.What do I think about the stability of the solution?Check Point is very stable. I would say that initially there were a couple of issues we had during deployments. But now we have climbed the learning curve of the product and all installations are very stable. We have most clients running on version 7.3 and didn't upgrade most further from there because we know that 7.3 is stable and it is what we are running most of the customers now.What do I think about the scalability of the solution?Scalability is fine. In fact, we are demonstrating the hyper scale with most of the customer now. There is no doubt about the scalability and it is not a problem.How are customer service and technical support?Up until now, we have not had to register with technical support from Check Point. If we needed help we got support with the presale technical support team from our region. He was able to help us internally. The team helps us to get products stable. Up until now, we did not contact them. It is not very transparent. They approach resolutions through a partner and the partner solves the case. They seem to mostly depend on partners for the resolution of issues.If you previously used a different solution, which one did you use and why did you switch?We deploy a variety of products for our clients depending on their needs. Check Point is one of the most reliable.How was the initial setup?I would say that the installation is straightforward when you have learned about the architecture. Before that, the installations may be a little confusing.What about the implementation team?We are partners with Check Point so we handle the installations and deployment. In the beginning, we did have some engineers from Check Point assist us in the initial installations, but after that it was fine and we were able to manage it by ourselves.What's my experience with pricing, setup cost, and licensing?Check Point pricing is high. It is a sector where there is heavy competition so it does not help when trying to sell the product. But one thing is that the sales chain is fantastic. The price is usually the most difficult thing when we discuss Check Point with customers, their feedback is that it is not a competitively inexpensive product. Clients want to know why that is and if we could scale the price. Check Point can have more presence in the market, but if they want it to compete, they have to come down in price a little more. I would say 20 to 30% lower. The product is fine.What other advice do I have?The web application firewall is commonly used in most firewalls now. If they can add that as a feature, it would be a very strong scenario. When we use Check Point on a perimeter or a DMZ zone, the first thing that clients ask is if there is wireless protection. Check Point has IPS (Intrusion Prevention System) but it does not have wireless protection. So if production is using the cloud if they can integrate mobile app protection, mobile shielding, there's more value for Check Point, but if they include that, Check Point could be the very best firewall option.On a scale from one to ten, when one is the worst and ten is the best, I would rate Check Point as an eight. It needs to do better in pricing and with broader features for mobile.One thing that I learned from multiple installations of Check Point is that you have to train the customer before implementing. Unless the customer is already a highly skilled security engineer so that they know what they can get out of the product, they will not be as satisfied. Otherwise, just before the deployment, we have them go for training so they understand the product and what it can do.They will be happier and they won't choose to go with another product in the future. Even with my engineers who understand many other products, I trained them properly before I send them out for deployments. Check Point is not a product that if you don't know you can just install without knowing anything about it. You have to know the architecture first. You have to know each and every option than work on the product. Then it will be far better and say no to certain features which are not important to use. On the other hand, knowing it is available is fantastic and becomes an option in the right situations.Disclaimer: My company has a business relationship with this vendor other than being a customer:Partner.
Date published: 2019-09-08T00:00:00-04:00
Rated 5 out of 5 by from A good firewall solution that's extremely stable and can scale easilyWhat is our primary use case?We primarily use the solution as firewall security for our clients.What is most valuable?The IPS, application and URL filtering, as well as Identity Awareness, are all very valuable features.What needs improvement?Reporting needs improvement. It's difficult to utilize properly. Currently, I'm in a situation whereby a client of ours is looking for reporting on their organizational unit. Check Point has failed to do that. We've been trying to do it for the past month and we haven't been able to. We've also gotten techs from Check Point to call us to help and we just can't get the solution to do what we need it to do.Sometimes, if you aren't familiar with the solution, it can be a bit complex, but it does become easier to use with time. However, every time they launch a new version, it becomes more complex and you need to take time to get familiar with all the changes. For every version that they upgrade, you need to upskill yourself.For how long have I used the solution?I've been using the solution for three years.What do I think about the stability of the solution?The stability of the solution is fantastic.What do I think about the scalability of the solution?The scalability potential of the solution is great. We use the solution quite extensively. We do plan to increase usage in the future.How are customer service and technical support?If I were rating technical support out of ten, I would give it a seven. They're inconsistent. Sometimes you do get guys from Check Point to help you out and then sometimes you don't. Sometimes it's hard getting a hold of them.If you previously used a different solution, which one did you use and why did you switch?We didn't previously use a different solution.How was the initial setup?The initial setup is straightforward. The time it takes to deploy depends on the organization.What about the implementation team?We handled the implementation ourselves.Which other solutions did I evaluate?I am familiar with Fortinet, although I didn't do a direct comparison. I did compare other solutions as well.What other advice do I have?For those who want to implement the solution, they should make sure they have a very strong networking background.I would rate the solution eight out of ten.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2019-08-28T00:00:00-04:00
Rated 5 out of 5 by from All-in-one-box solution with easy configuration and great routingWhat is most valuable?As per the solution's blade design, there are many options. For example, you have to buy a UTM blade and an advanced malware blade, etc. If the blade license is there, we can configure from the firewall GUI.The net policy and routing are also great features.What needs improvement?If you compare the GUI with the Palo Alto and Cisco, they're very easy. Check Point, due to its design, is a little bit complex. They should make the GUI easy to use so that anyone can understand it, like Fortinet's GUI. Many companies end up using Fortinet because the GUI is very easy, and there's no need for training. They just deploy the box and do the configuration.Also, we have to inform customers that with Check Point there's no need to purchase any routing device. Check Point can do that routing as well as the Firewall and the IPS. The marketing should be stronger, to show that customers only need one box to handle all the features. It will be cost-effective and enhance the performance and value, but because of their poor marketing, customers don't realize this.In the future, a color string would be powerful. Sandboxing should also be offered. Many people want the Trend Sandbox but not on the cloud. In the Middle East, there is a policy for Sandboxing that states it should be on Trend as per the government law. They have Sandboxing solutions on the cloud, but they have to bring the solution onto Trend also. Palo Alto has Wildfire, Cisco has Talos, and Forcepoint has one available as well.In the future, routing protocols should be more supported like OSPF and BGP. There needs to be integration with the SDN. I don't know if SDN is there or not in Check Point, but SDN is one of the major requirements nowadays.For how long have I used the solution?I've been using the solution for one month.What do I think about the stability of the solution?The solution is very stable.What do I think about the scalability of the solution?We just deployed the solution, so scalability I cannot speak to right now. But, as per Gartner and NSS Lab, they're allegedly very good. I don't think there will be an issue with scalability.If you previously used a different solution, which one did you use and why did you switch?I am currently also working on Cisco ASA, Fortinet, and Palo Alto.What about the implementation team?I'm an Operation Engineer; I handle the deployments myself.What's my experience with pricing, setup cost, and licensing?Compared to Cisco Firepower Threat Defense, the solution is cheap. However, not as cheap as Fortinet or Palo Alto. If clients have smaller budgets, we would have to advise one of those instead.What other advice do I have?There are two deployment model modes in Check Point. One is a gateway level and one is a no gateway all-in-one box solution. With the gateway level, only hardware will be there, all operating systems are stored in a VMware and if there are any issues in the hardware, you just replace the box; all of your policies will be saved into VMware.The all-in-one box you have the GUI policies and also the gateway so it's secure. If there is an issue in the box - like failure or downtime - all of the networks will be affected.I would rate the solution eight out of ten. We haven't been using it too long, so we haven't had a chance to look at all aspects of the solution. I would recommend Check Point to customers because it is an affordable option.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2019-09-11T00:00:00-04:00
Rated 5 out of 5 by from Secure, reliable, and has good technical supportWhat is our primary use case?We use this solution as our perimeter firewall.What is most valuable?The most valuable feature for us is the cluster support. We have been using this for a long time, so it is not a feature from the latest version.What needs improvement?We would like to be able to scale out such that we can increase performance within a cluster with more active nodes.Our biggest complaint concerns the high resource usage for IDS/IPS, as we cannot turn on all of the features even with a recent hardware upgrade.A great enhancement for this solution would be an active-active or multi-active scalability.As we need to fulfill higher bandwidth demands due to increased cloud usage and research-driven data exchange, we might need to look for other vendors with more competitive pricing.For how long have I used the solution?I have been using this solution for two years.What do I think about the stability of the solution?This is a stable solution.Six months ago, we updated our version to the most recent one.What do I think about the scalability of the solution?The scalability of this solution is limited, which is why we have started looking for alternatives. Currently, we have about twenty-thousand users.How are customer service and technical support?Technical support for this solution is good. They have a quick response and the solution was available within a short period.If you previously used a different solution, which one did you use and why did you switch?We did not use another solution prior to this one.How was the initial setup?This initial setup of this solution is complex.The preparation for deployment took two days, and the deployment itself took about two hours.We have three staff who are responsible for maintaining the firewall, although there are more tasks that they handle, in addition to it.What about the implementation team?We enlisted the help of a service provider to assist us with the implementation.What's my experience with pricing, setup cost, and licensing?The price of this solution could be improved. We pay approximately ?€150,000 ($166,000 USD) per year. We receive four days of support every year from our service provider before we have to contact Check Point.Which other solutions did I evaluate?We did not evaluate other options before choosing this solution, although we are currently considering alternative solutions from Forcepoint and Fortinet.What other advice do I have?My advice for anybody who is considering this solution is to start by identifying high-bandwidth use cases. If you have any, and you have a high-security requirement, then I suggest considering other options.This is a secure and reliable solution for us, although we are a bit disappointed with the limited scalability and resource consumption.I would rate this solution an eight out of ten.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2019-09-12T00:00:00-04:00