Check Point 1470 Next Generation Threat Prevention Appliance

By : Check Point

4.3 ( 4 reviews )
Get Free Demo Write a Review
  • All Ratings

  • User Reviews

  • Alternatives

Check Point 1470 Next Generation Threat Prevention Appliance Reviews & Ratings

Check out Check Point 1470 Next Generation Threat Prevention Appliance reviews by verified users. Discover what businesses are saying about Check Point 1470 Next Generation Threat Prevention Appliance on Techjockey.


75%

Have recommended this product

Overall Score

4.3/5
Based on 4 Reviews

We love to hear from our buyers!

If you have used the solution already, why not share your thoughts and help others make the right purchase.

Check Point 1470 Next Generation Threat Prevention Appliance User Reviews ( 4 )

D

Dhwani

User

4.6/5

4.5/5

4.5/5

5/5

4.5/5

“Pleasent Experience”

Pros :

Cons :

Posted - Sep 15, 2018

RS

Rajat Singh

User

4.5/5

4.5/5

4.5/5

4.5/5

4.5/5

“Strong and supportive”

Pros :

Cons :

Posted - Feb 4, 2019

VR

Vijaya Raj

User

4.2/5

4/5

4/5

4.5/5

4.5/5

“Configuration is easy”

Pros :

Cons :

Posted - Feb 26, 2019

SK

Sunil Kumar

User

4.2/5

4.7/5

5/5

4.5/5

5/5

“Very happy with my product”

Pros :

Cons :

Posted - Aug 20, 2018

Similar Products

See All
Sponsored
NeuShield Data Sentinel

Cyber Security Software

NeuShield Data Sentinel

Price On Request

Key Features

  • Disk Mirroring
  • One-Click Export
  • Boot Time Scan
  • Data Storage
  • Data Theft Protection
View 3 more

Price On Request

Key Features

  • Real-World Production Conditions
  • Ideal Testing Conditions
  • Connectivity
  • Hardware
  • High availability assurance
View 5 more

Price On Request

Key Features

  • Access Control
  • Data Security
  • Integration
  • Ransomware Protection
  • Phishing Protection
View 4 more

Price On Request

Key Features

  • Ideal Testing Conditions
  • Real-World Production Conditions
  • Software
  • Hardware
  • Physical Dimension
View 3 more
Check point 1430 Next Gen TPA

Cyber Security Software

Check point 1430 Next Gen TPA

(4 reviews )

Price On Request

Key Features

  • Ideal Testing Conditions
  • Real-World Production Conditions
  • Software
  • Physical Dimension
  • Environment
View 2 more
Check Point Sandblast Agent

Cyber Security Software

Check Point Sandblast Agent

(1 reviews )

Price On Request

Key Features

  • Advanced Threat Protection
  • Automatic Detection
  • Call Blocking
  • Data Theft Protection
  • Endpoint Protection
View 6 more
Singularity complete

Cyber Security Software

Singularity complete

(2 reviews )

Price On Request

Key Features

  • In-Depth Visibility
  • Lightens Analyst Load
  • Automated Threat Resolution
  • Storyline Automates Visibility
  • ActiveEDR Automates Response
ThreatCop

Cyber Security Software

ThreatCop

(11 reviews )

Price On Request

Key Features

  • LMS (Automated Training Campaigns)
  • Unlimited Security Attack
  • Periodic Assessment
  • Phishing Protection
  • Dashboard
View 9 more
Rapid Recovery

Cyber Security Software

Rapid Recovery

(4 reviews )

Price On Request

Key Features

  • Backup
  • Data Theft Protection
  • Device Protection
  • Security
  • Integration
View 10 more
Singularity Control

Cyber Security Software

Singularity Control

(2 reviews )

Price On Request

Key Features

  • Control Network Flows
  • Control USB & Bluetooth
  • Ensure 100% Deployment
  • Network Control
  • Advanced Device Control
View 1 more
  • Secure Payments 15000+
    Software
  • Secure Payments Best Price
    Guaranteed
  • Secure Payments Free Expert
    Consultation
  • Secure Payments 20 Lacs+
    Happy Customers