What do you like best?
The management console is easy to navigate. Ever since we have deployed Check Point, we have yet to report any major incidents. We use the R77.30.03 management console, aka "SmartEndpoint."
It's nice to have everything laid out in tabs and the UI is fairly interconnected, for the most part. You can make changes as general or as granular as you want.
Installation and implementation is fairly seamless for workstations and devices that don't require encryption. The user facing side is self-explanatory and logs are incredibly easy to pull if/when they're needed.
The anti-malware and threat emulation services are by far the best bang for your buck. The forensics reports that come from the events that transpire are generally very informative.
The logging is nice, but can be buggy from within the console.
What do you dislike?
Often, we experience installation issues with laptops. More often than not, our devices that have full disk encryption tend to have the most problems. Sometimes, partial installs are pushed out and, often, we're given only an option to re-image the machine from support.
Their helpdesk level support is severely lacking. Occasionally, you'll encounter a good egg, and the higher up the rungs you go, the more technical they are, BUT most of their immediate contacts do not really have a clue what they're doing. They just throw ideas at the wall to see if they stick which isn't conducive to a business environment.
Elements of the console don't work or won't populate sometimes. Often, it freezes and gets stuck in a "not responding" mode on each of our administrative machines.
Recommendations to others considering the product
Have a representative that you can speak to directly.
Take the necessary training courses for their product. It can be a lot to absorb and their documentation isn't always easy to follow if you're just starting out or have a basic level of knowledge about endpoint protection.
What business problems are you solving with the product? What benefits have you realized?
Endpoint protection, logging, VPN access, compliance enforcement, media encryption and port protection, full disk encryption, and anti-bot.
The benefits are the well-rounded security and zero-day coverage.