What is Check Point?

Check Point’s Secure Knowledge is a safe knowledge base solution to solve technical problems for Check Point products. It is a customizable software with intuitive interface. It is maintained by a group of qualified technicians and contains all the common question and answers that are submitted to Check Point Tac.

Pricing

Check Point Starting Price

Awards
Check Point Award

Our Awards and Recognition

More Awards
Need a Little Help?

Talk with a software expert for free. Get a list of software that's great for you in less than 10 minutes.

Check Point Screenshots

Key Features of Check Point

Here are the powerful features that make Check Point stand out from the competition. Packed with innovative tools and advanced functionalities, this software offers a range of benefits.

  • Activity / News Feed
  • Adaptive Learning
  • Alerts / Escalation
  • Analytics/ROI Tracking
  • Approval Process Control
  • Archiving & Retention
  • Artwork Management
  • Asset Management
  • Asynchronous Learning
  • Audit Trail
  • Automated Review & Approval
  • Benchmarking
  • Blended Learning
  • Blogs
  • Brainstorming
  • Built-In Course Authoring
  • Business Rules Management
  • Calendar Management
  • Case Management
  • Cataloging / Categorization
  • Chat / Messaging
  • Chatbot
  • Collaboration
  • Comment Moderation
  • Content Library
  • Content Management
  • Content Moderation
  • Corporate/Business
  • Creator Tracking
  • Customer Service Analytics
  • Customer Support Tracking
  • Dashboard
  • Data Management
  • Decision Tree
  • Discussion Boards
  • Discussion Threads
  • Discussions / Forums
  • Dispatching
  • Docket Management
  • Document Indexing
  • Document Management
  • Drag & Drop
  • Email Management
  • Email Response Control
  • Employee Alignment
  • Employee Directory
  • Employee Guides
  • Engagement Monitoring
  • Evaluation Management
  • Evaluation Workflow
  • Facility Pre-planning Data
  • FAQ
  • Feedback Collection
  • Feedback Management
  • Field Reporting
  • File Sharing
  • For Healthcare
  • For Sales
  • Gamification
  • Group Management
  • Group Posting
  • Guided Problem Solving
  • Idea Management
  • Idea Ranking
  • Ideation / Crowdsourcing
  • Incident Mapping
  • Incident Response Checklists
  • Information Disclosure Management
  • Internal Affairs Administration
  • Investigation Management
  • IP Portfolio Management
  • Knowledge Base Management
  • Knowledge Capture
  • Live Chat
  • Maintenance Management
  • Member Directory
  • Membership Management
  • Multi-Channel Collection
  • Multi-Language
  • Newsletter Management
  • Patent / Trademark Management
  • Performance Management
  • Performance Metrics
  • Policy Creation Wizard
  • Policy Management
  • Policy Training
  • Post Management
  • Predictive Analytics
  • Presentation Management
  • Process Change Tracking
  • Process Mapping
  • Process Modeling & Designing
  • Process/Workflow Automation
  • Progress Tracking
  • Project Tracking
  • Proposal Management
  • Queue Management
  • Read & Acknowledge
  • Remote Document Access
  • Requirements Management
  • Rules-Based Workflow
  • Safety Management
  • Segmentation
  • Self Service Portal
  • Self-Learning
  • Social Marketing
  • Social media management
  • Social Sharing
  • Status Tracking
  • Survey Management
  • Task Management
  • Text Editing
  • Training Management
  • Trend Analysis
  • Trend Tracking
  • User Journeys
  • User Research
  • Version Control
  • Workflow Management
  • WYSIWYG Rich Text Editing
Show More
  • Access control
  • Activity Log
  • Activity Monitoring
  • Advanced Firewall
  • AI / Machine Learning
  • Anonymous Browsing
  • Anti Spam
  • Anti Virus
  • Application Access Control
  • Application Security
  • Archiving
  • Asset Discovery
  • Asset Tagging
  • Audit Trail
  • Audit Trails
  • Availability Testing
  • Backup Management
  • Bandwidth Monitoring
  • Baseline Manager
  • Basic Firewall
  • Behavioral Analytics
  • Billing & Invoicing
  • Biometric
  • Compliance Management
  • Compliance Reporting
  • Configuration Management
  • Connectivity Management
  • Consolidation
  • Content Routing
  • Credential Management
  • Customer Management
  • Dashboard
  • Data Export
  • Data Visualization
  • Database Security Audit
  • Defect Tracking
  • Deployment Management
  • Diagnostic Tools
  • DNS Leak Protection
  • Document Imaging
  • eDiscovery
  • Email Attachment Protection
  • Encryption
  • Endpoint Management
  • Event Logs
  • Event Tracking
  • Event-Based Notifications
  • File Access Control
  • File Integrity Monitoring
  • Financial Data Protection
  • Firewall
  • Forensic Analysis
  • FTP Monitoring
  • Full Transaction Diagnostics
  • Granular Access Controls
  • Health Monitoring
  • Incident Management
  • Internet Security
  • Internet Usage Monitoring
  • Intrusion Detection System
  • Inventory Management
  • IP Address Monitoring
  • IP Protection
  • Job Costing
  • Kill Switch
  • Lead management
  • Least Privilege
  • Log Management
  • Maintenance Scheduling
  • Mobile Access
  • Mobile Authentication
  • Multi-Language
  • Multi-Protocol
  • Multifactor Authentication
  • Network Diagnosis
  • Network Logs
  • Network Monitoring
  • Network Scanning
  • Password Management
  • Password Protection
  • Patch Management
  • PCI Assessment
  • Peer-to-Peer
  • Performance Control
  • Performance Metrics
  • Policy Management
  • Predefined Protocols
  • Prioritization
  • Quarantine
  • Quotes / Estimates
  • Real Time Monitoring
  • Real-Time Reporting & Dashboards
  • Real-time Scheduling
  • Redundancy Checking
  • Release Management
  • Remediation
  • Remote Access
  • Reporting/Analytics
  • Reverse Proxy
  • Risk Assessment
  • Risk Management
  • Role based management
  • Root-Cause Diagnosis
  • Schedulers
  • Scheduling
  • Security Event Log
  • Sensitive Data Identification
  • Server Performance
  • Signature Matching
  • Single Sign On
  • SLA Monitoring
  • Spyware Removal
  • SSL Offload
  • Subscriber Management
  • Syslogs
  • Threat Intelligence
  • Threat Protection
  • Thresholds
  • Trace individual transactions
  • Transaction Monitoring
  • Two-Factor Authentication
  • Uptime Reporting
  • User Activity Monitoring
  • User Friendly Webportal
  • User Management
  • Version Control
  • Virtual Machine Monitoring
  • Virus Definition Update
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Inspection
  • Web Logs
  • Web Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting / Blacklisting
  • Work Order Management
Show More
  • Audit Trails
  • Automated Review & Approval
  • Best Practices Library
  • Billing & Invoicing
  • Broker / Agent Portal
  • Cancellation Tracking
  • Claims Management
  • Claims Tracking
  • Collaboration
  • Compliance Management
  • Consent Management
  • Content Management
  • Dashboard
  • Document Management
  • Higher Education
  • Insurance Rating
  • Knowledge Capture
  • Policy Creation Wizard
  • Policy Generation
  • Policy Issuance
  • Policy Management
  • Policy Processing
  • Policy Training
  • Quote Management
  • Quotes / Estimates
  • Rating Engine
  • Read & Acknowledge
  • Reinstatement Tracking
  • Reinsurance Administration
  • Renewal Management
  • Requirements Management
  • Reviewer Portal
  • Self Assessment
  • Underwriting Management
  • User Access Permissions
  • Version Control
  • Workflow Management
Show More
  • Activity Log
  • AI / Machine Learning
  • AI Security
  • Anti Virus
  • Anti-Spyware
  • Antivirus
  • Application Security
  • Asset Discovery
  • Asset Tagging
  • Audit Trail
  • Behavioral Analytics
  • Biometric
  • Blue Team Tools
  • Compliance Management
  • Compliance Reporting
  • Content Caching
  • Content Disarm & Reconstruction (CDR)
  • Content Routing
  • Credential Management
  • Cyber Insurance
  • Cyber Risk Management
  • Cybersecurity
  • Dark Web Monitoring
  • Data Classification
  • Data Compression
  • Data Discovery
  • Data Governance
  • Data Security
  • Data Security Posture Management (DSPM)
  • Database Security Audit
  • Device management
  • Employee Identity Theft Protection
  • Encryption
  • Endpoint Management
  • Endpoint protection
  • Event Logs
  • Event-Based Notifications
  • Extended Detection and Response (XDR)
  • File Access Control
  • Financial Data Protection
  • Forensic Analysis
  • Health Monitoring
  • Incident Management
  • Incident Response
  • Insider Threat Management
  • Intrusion detection and prevention
  • Intrusion Detection System
  • IOC Verification
  • IoT Security
  • Log Management
  • Malware Analysis
  • Mobile Authentication
  • Mobile Data Security
  • Multifactor Authentication
  • Network Detection and Response (NDR)
  • Network Scanning
  • Network security
  • Network Traffic Analysis (NTA)
  • Out-of-Band Authentication
  • Password Management
  • Patch Management
  • Policy Management
  • Prioritization
  • Real Time Monitoring
  • Redundancy Checking
  • Reverse Proxy
  • Risk Management
  • Security Event Log
  • Security Orchestration
  • Automation and Response (SOAR)
  • Self Service Portal
  • Sensitive Data Identification
  • SIEM
  • Signature Matching
  • Threat Intelligence
  • Threat Modeling
  • Tokenization
  • Transaction Monitoring
  • User Activity Monitoring
  • User and Entity Behavior Analytics (UEBA)
  • VPN
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Scanning
  • Web Threat Management
  • Whitelisting / Blacklisting
Show More
  • Cloud Protection
  • Compliance Reporting
  • Cybersecurity
  • Dashboard
  • Data Classification
  • Data Containerization
  • Data Discovery
  • Data loss prevention
  • Device Control
  • Device management
  • Email Security
  • Endpoint Detection and Response (EDR)
  • Endpoint protection
  • False Positive Remediation
  • Incident Management
  • Insider Threat Management
  • Insider Threats
  • Intuitive Reports
  • Reporting/Analytics
  • Sensitive Data Identification
  • Vulnerability Management
  • Web Threat Management
Show More

Check Point Specifications

Get a closer look at the technical specifications and system requirements for Check Point. Find out if it's compatible with your operating system and other software.

Deployment :
Cloud Based
Subscription Plan :
Monthly
Accessibility :
Customization
Mobile Support
Desktop Platforms :
Web app
Mobile Platforms :
Language Support :
Chinese
English
Japanese
Russian
Business :
StartUps
SMBs
Agencies
Available Support :
Email
Company Details :
Company Name : Check Point Software Technologies Ltd
Headquarter : San Carlos
Website : Visit Website

Check Point Comparisons

Compare Check Point with other similar options available in Knowledge Management System. Explore the key differences to see why it's the top choice for businesses and individuals.

 Check Point Software Technologies Ltd logo
Do you work for Check Point Software Technologies Ltd?
Claim This Profile

Check Point Slideshare

preload slideshare View Slideshare

Check Point Videos

Check Point Reviews (0)

Ask a question

No reviews yet. Rate this app or be the first to review.

Write a Review

Alternatives of Check Point

Explore alternative software options that can fulfill similar requirements as Check Point. Evaluate their features, pricing, and user feedback to find the perfect fit for your needs.

Check Point FAQs

What are the top 5 features for Check Point?

The top 5 features for Check Point are:

  • Collaboration
  • Data Management
  • Discussion Boards
  • Self Service Portal
  • Document Management

What type of customer support is available from Check Point?

The available support which Check Point provides is:

  • Email

Where is the headquarters/company of Check Point located?

The headquarters/company of Check Point is located at San Carlos.

Free Demo Get Pricing
Free Demo