We changed our name from IT Central Station: Here's why

What is your primary use case for Check Point Web Gateway?

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
33 Answers

author avatar
Top 10Real User

It is primarily used for highlighting the threats that are coming from various locations. We are using its latest version.

author avatar
Top 5LeaderboardReal User

We have the Check Point Firewall as a perimeter gateway and we are using it across seven geolocations. Each location has a cluster. We use it to block high-risk and malicious websites and applications. It enforces compliance policies and regulations at each of the sites. With this Web gateway, we are secure and it protects our applications or URL with multi-layer architecture security. We are using web security, URL filtering, and antivirus, and we will enable the HTTPS inspection shorty.

author avatar
Real User

Our primary use case for this solution is as firewall and, because I'm a student, when I work on my studies.

Find out what your peers are saying about Check Point, Cisco, iboss and others in Secure Web Gateways (SWG). Updated: January 2022.
564,599 professionals have used our research since 2012.