How Customers Use Check Point Firewalls Around the Globe

Ever wanted to know how Check Point firewallls are being used around the World? With indeni Insights, you can get a glimpse into that data 24/7. See how.

Notice: This blog post was originally published on Indeni before its acquisition by BlueCat.

The content reflects the expertise and perspectives of the Indeni team at the time of writing. While some references may be outdated, the insights remain valuable. For the latest updates and solutions, explore the rest of our blog

To keep your business online and ensure critical devices, such as Check Point firewalls, meet operational excellence standards it is helpful to compare your environment to a third party data set. As part of the Indeni Automation Platform, customers have access to Indeni Insight which benchmarks adoption of the Check Point capabilities and user behavior to adhere to ITIL best practices. Having a third party data set is extremely helpful for network and security engineers to answer questions such as:

  • Should I consider upgrading to the latest version?
  • Is this a common issue in other environments, or am I alone?
  • Input into future appliance and software purchases

We recently published a report around the Palo Alto Networks Automation Trends, and the data is coming in for Check Point as well. See below for a few of the early takeaways. Please comment below with the questions you have around Check Point such as, should I upgrade to R80.10? Your feedback will help shape the final report!

Sneak Peak: 2018 Check Point Trends


Top Software Platforms used by Indeni Check Point Customers:

  • Gaia – 76.47%
  • Ipso – 11.76%
  • Secureplatform – 11.76%

Top issues found from a performance and configuration standpoint:

Performance-related and ongoing issues:

  • High CPU usage per core(s)
  • Interface nearing maximum Tx throughput
  • Firewall kernel table limit approaching
  • DNS server response time slow
  • VPN tunnel(s) down
  • Aggressive Aging enabled
  • Required interface(s) down
  • Next hop (router) inaccessible
  • Repeated failed login attempts by a user
  • Core dump files found

Configuration related issues:

  • Some VSes have high CPU usage
  • In CoreXL a single core shouldn’t handle both interface interrupts and fw worker
  • Critical configuration files mismatch across cluster members
  • Software end of support nearing
  • Static routing table does not match across cluster members
  • License expiration nearing
  • Network interface duplex does not match across cluster members
  • Configuration changed but not saved
  • Certificate authority not accessible
  • Certificate(s) has expired

Check out the potential issues that could appear in Check Point GAiA, GAiA Embedded, IPSO and Secure Platform environments on the Indeni Check Point Solution Page.

Ready to benchmark your network ? Try Indeni today and enable Indeni Insight at set up.


Published in:

Related content

Route traffic intelligently with DNS-based GSLB for BlueCat Edge

Discover how DNS-based GSLB with BlueCat Edge empowers networking teams to control traffic steering, reduce costs, and improve resilience.

Read more
Webinar

Making APIs Work for You (Part 5)

Welcome to Part 5 of Making APIs Work for You. Our community specialist, Vivek Mistry, is your guide, and today, Vivek will focus on user security…

Read more

BlueCat Networks unveils channel-first strategy with launch of BlueCatalyst Partner Program

The BlueCatalyst Partner Program provides the support, resources, and incentives to solve your customers’ critical network challenges.

Read more
Image shows BlueCat cathead image in the background with the text "Introducing Integrity X" appear over it. Integrity X is the newest version of BlueCat's DDI management solution.

Exciting product update: Introducing BlueCat Integrity X

Introducing BlueCat Integrity X, a single platform for complete visibility and control over critical network services.

Read more