SlideShare a Scribd company logo
©2016 Check Point Software Technologies Ltd. All rights reserved. [Restricted] ONLY for designated groups and
individuals
Q3, 2016 | 1
ITEM 1: THIRD-PARTY FINDINGS
CISCO CLAIM
CHECK POINT FACTS, UNDERSTANDING & DETAILS:
 Efficacy : Cisco quotes NSS-BDS 2016 results where it indeed scored 100% and Check Point Scored 99.4% (both great
results) , what is not mentioned that Cisco used 2 products to achieve that score (Firepower and AMP endpoint) where Check
Point used 1
 If comparing apples-to-apples NGFW solutions which is the scope of THEIR COMPARISON , if we take the latest NSS NGFW
test, check point scored 99.8% security efficacy where cisco missed 2900% more exploits than check point (see more here)
 Time to Detection: not clear why they represent it like this , in fact Check Point average response was ~50% faster than Cisco
(see more here)
WHAT
 CISCO PUBLISHED A COMPETITIVE COMPARISON OF ITS NGFW SOLUTION VS. OTHER VENDORS (PAN,
FORTINET, CHECK POINT) : http://www.cisco.com/c/m/en_us/products/security/firewalls/competitive-comparison.html
 THE COMPARISON CONTAINS SOME INACCURACIES ABOUT CHECK POINT
 THE BELOW CONTAINS FUD – FACTS, UNDERSTANDING AND DETAILS ABOUT CISCO COMPARISON IN
REGARDS TO CHECK POINT
CHECK POINT RESPONSE TO CISCO NGFW COMPETITIVE
©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and
individuals
Q3, 2016 | 2
Competitive Cheat Sheet
ITEM 2: SECURITY FEATURES
CISCO CLAIM
CHECK POINT FACTS, UNDERSTANDING & DETAILS
Cisco claims are inaccurate:
1. Continuous analysis and retrospective detection – supported (in Early Availability )
2. Network file trajectory – supported (SandBlast Agent)
3. Impact assessment – supported (SmartEvent, Sandblast)
4. Security automation – supported (R80)
5. Behavioral IOC – supported (Anti-bot)
6. User, network, endpoint awareness – supported (across all products)
7. NGIPS – supported , with the highest security effectiveness in the industry (according to NSS LABS)
8. Integrated ATP – supported (Sandblast suite)
9. Malware remediation – supported (SandBlast Agent)
©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and
individuals
Q3, 2016 | 2
Competitive Cheat Sheet
ITEM 3: OPERATIONAL CAPABILITIES
CISCO CLAIM
CHECK POINT FACTS, UNDERSTANDING & DETAILS
Cisco claims are inaccurate (except the claim that our management is excellent):
1. Scanning architecture: Check Point supports parallel processing (more info here 1:19)
2. Software-based segmentation : supported (actually with Cisco TrustSec & ACI , but also NSX, Azure, Aws,OpenStack and
more)
3. Automatic threat containment : supported (actually with the same Cisco ISE , but also with cooperative enforcement )
4. Operations and management : we agree it is indeed excellent
5. Different API’s : supported (REST API ,SANDBLAST API, similar to their proprietary ones)
©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and
individuals
Q3, 2016 | 2
Competitive Cheat Sheet
ITEM 4: ICS/SCADA
CISCO CLAIM
CHECK POINT FACTS, UNDERSTANDING & DETAILS
Cisco claims are inaccurate (except the first and last statement):
1. Base feature set : Check Point includes all relevant protections for SCADA
2. SCADA rules : rules meaning numbers of signatures and AVC , check point supports over 1,000 “rules” (more than 800
SCADA detectors , more than 300 IPS signatures)
For a more accurate comparison, read the “zero tolerance” report here) below a recap
©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and
individuals
Q3, 2016 | 2
Competitive Cheat Sheet
ITEM 6: THREAT INTELLIGENCE
CISCO CLAIM
CHECK POINT FACTS, UNDERSTANDING & DETAILS
Cisco claims are inaccurate:
Check Point ThreatCloud holds over 30M of IOC’s (files, hashes, domains, URL), with more than half a million unique samples per day
ITEM 7: SERVICE PROVIDER
CISCO CLAIM
CHECK POINT FACTS, UNDERSTANDING & DETAILS
Cisco claims are mostly accurate, though shows their weakness:
Cisco uses third-part stitching (mostly as a concept except Radware), where check point can provide best of breed in house solution
©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and
individuals
Q3, 2016 | 2
Competitive Cheat Sheet
THE CHECK POINT ADVANTAGE
Unbeatable security & best management efficiency with predictable performance in the real world
Strongest Protection with Multi-Layer Security
 Industry-leading security award winning Next Generation Firewall
- Leader in Gartner's 2016 Magic Quadrant of Enterprise Network Firewall (NGFW), since 1997
- Recommended rating in NSS Labs 2016 Breach Detection System test (BDS)
- Recommended in NSS Labs 2016 Next-Gen Firewall test (NGFW)
Best management and visibility
 Easily control over 7,270 apps, 264,256 internet widgets and 200M websites by user, group, or OU
 Protect clear and encrypted traffic against data breaches with strong DLP
 Provide simple and secure corporate access from all mobile and fixed endpoints
Most efficient security consolidation while keeping predictable real world performance
 Predictable real-world performance with Security Power (SPU)
 Lowest management labor time according to NSS
 Industry’s only true unified management and reporting solution covering all aspects of security
CISCO FACTS
Security: with its integrated Sourcefire solution, Cisco provides partial security solution
 Cisco ASA equipment affected by severe vulnerability – (Read more: http://goo.gl/B6IVKR)
 Vulnerable to a full inspection bypass, allowing an attacker to bypass malware detection mechanisms (https://goo.gl/VwCELc)
 Cisco Botnet filter lacks core components to detect network behavioral anomalies
 Cisco has limited visibility of risk with 68 P2P/File sharing types vs. Check Points 342+
 The APP Gap: Cisco has limited application awareness with ~4,366 apps vs. Check Point over 7,270
 Cisco management has multiple vulnerabilities (CSRF - http://goo.gl/I9ukZP) and (Cross-Site Scripting http://goo.gl/cRXw0n)
 Cisco new unified image Firepower Threat Defense (FTD) has many limitations and missing features such as High
Availability, remote access VPN, multiple context, QoS, PBR, etc.
 Cisco has 3 separate images (ASA, FirePOWER and FTD) for different appliances lines and different managements which adds
to deployment complexity and increase admin labor time
Management: with its Sourcefire integrations, Cisco solution requires two separate management Interfaces
 Cisco needs 3 separate management consoles to properly manage Threat Prevention, Content Security, and 3
rd
party event
analysis (Splunk, Logrythm) (vs. 1 from Checkpoint). In some cases with cisco CSM (core FW) is also needed
 Cisco needs an added Security Administrator headcount compared to Check Point due to cumbersome management
interface (according to 3rd party analysts)
 Cisco lacks an Event Analysis solution—no correlation of security events leads to lack of visibility & added management time
 Cisco troubleshooting with FirePOWER management, requires an admin to look at seven different categories for threat
prevention and Next-Gen logs
 Cisco central management lacks some basic multi-domain tasks such as Global IPS, Global services, Global VPN
Performance: Cisco very high price performance makes it a less attractive solution
 Cisco is limited in regards to VPN setup rate with 95% less tunnels comparing Check Point
 Cisco fastest appliance performs only 225Gbps of Firewall throughput (Check Point’s is 400Gbps)
 Cisco shows very high cost performance (x3 times more than Check Point )
 Cisco-FirePOWER SSP20,40,60 with FirePOWER services and 4000 series show very low performance throughputs
compared to Check Point parallel appliances
FOR MORE FACTS SEE “WINNING AGAINST“SLIDE DECK IN
COMPETITIVE WIKI OR PARTNERMAP

More Related Content

PDF
CPX 2016 Moti Sagey Security Vendor Landscape
PDF
Check Point mission statement
PDF
How to expose shortcuts in competitive poc
PDF
Moti Sagey CPX keynote _Are All security products created equal
PDF
How to Choose a SandBox - Gartner
PPTX
Check Point Solutions Portfolio- Detailed
PDF
Check Point SandBlast and SandBlast Agent
CPX 2016 Moti Sagey Security Vendor Landscape
Check Point mission statement
How to expose shortcuts in competitive poc
Moti Sagey CPX keynote _Are All security products created equal
How to Choose a SandBox - Gartner
Check Point Solutions Portfolio- Detailed
Check Point SandBlast and SandBlast Agent

What's hot (20)

PPT
Panda Security2008
PPTX
Check Point NGFW
PPTX
Cyber intro 2017_hebrew
PDF
Cisco Security Architecture
PDF
Next Generation Security
PDF
Cisco umbrella overview
PDF
Check Point vSEC for Microsoft Azure Webinar
PDF
Advanced threat security - Cyber Security For The Real World
PPTX
Sourcefire Webinar - NEW GENERATION IPS
PDF
Are You Prepared for the Next Mobile Attack?
PPTX
Building Up Network Security: Intrusion Prevention and Sourcefire
PPTX
Check Point vs competition security effectiveness
PPTX
Talos Insight: Threat Innovation Emerging from the Noise
PPTX
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
PDF
Check Point and Cisco: Securing the Private Cloud
PDF
Complete Endpoint protection
PPTX
WannaCry: How to Protect Yourself
PDF
Cyber Security Coverage heat map
PPTX
Check point sandblast threat-emulation-customer-success-presentation
PPTX
IPS Best Practices
Panda Security2008
Check Point NGFW
Cyber intro 2017_hebrew
Cisco Security Architecture
Next Generation Security
Cisco umbrella overview
Check Point vSEC for Microsoft Azure Webinar
Advanced threat security - Cyber Security For The Real World
Sourcefire Webinar - NEW GENERATION IPS
Are You Prepared for the Next Mobile Attack?
Building Up Network Security: Intrusion Prevention and Sourcefire
Check Point vs competition security effectiveness
Talos Insight: Threat Innovation Emerging from the Noise
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
Check Point and Cisco: Securing the Private Cloud
Complete Endpoint protection
WannaCry: How to Protect Yourself
Cyber Security Coverage heat map
Check point sandblast threat-emulation-customer-success-presentation
IPS Best Practices
Ad

Similar to Check point response to Cisco NGFW competitive (20)

PDF
Log Analytics for Distributed Microservices
PDF
Slide Griffin - Practical Attacks and Mitigations
PDF
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
PPTX
Splunk for Enterprise Security featuring UBA Breakout Session
PPTX
TechWiseTV Workshop: Cisco TrustSec
PDF
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
PPTX
Splunk for Enterprise Security Featuring User Behavior Analytics
PDF
Juniper competitive cheatsheet
PDF
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
PDF
Firepower ngfw internet
PDF
DumpsCafe CompTIA CASP CAS-005 Exam Dumps PDF
PPTX
.conf Go Zurich 2022 - Security Session
PPTX
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
PPTX
A Tale of Software-Defined & Adaptive Security
PDF
SplunkLive! Zurich 2018: Splunk for Security at Swisscom CSIRT
PDF
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
PPTX
Removing Security Roadblocks to IoT Deployment Success
PDF
Cisco Malware analystic documentation file
PPTX
IoT and M2M Safety and Security
PDF
CiscoACI-BRKACI-3004presentationUploaded.pdf
Log Analytics for Distributed Microservices
Slide Griffin - Practical Attacks and Mitigations
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Splunk for Enterprise Security featuring UBA Breakout Session
TechWiseTV Workshop: Cisco TrustSec
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
Splunk for Enterprise Security Featuring User Behavior Analytics
Juniper competitive cheatsheet
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Firepower ngfw internet
DumpsCafe CompTIA CASP CAS-005 Exam Dumps PDF
.conf Go Zurich 2022 - Security Session
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
A Tale of Software-Defined & Adaptive Security
SplunkLive! Zurich 2018: Splunk for Security at Swisscom CSIRT
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
Removing Security Roadblocks to IoT Deployment Success
Cisco Malware analystic documentation file
IoT and M2M Safety and Security
CiscoACI-BRKACI-3004presentationUploaded.pdf
Ad

More from Moti Sagey מוטי שגיא (10)

PDF
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
PDF
Why Check Point - Top 4 Facts
PPTX
Mind the gap_cpx2022_moti_sagey_final
PDF
Why check point win top 4 facts
PDF
Why Check Point - Moti Sagey
DOCX
NGFW RFP TEMPLATE - TEST PLAN
PPTX
Check point Infinity Overview
PDF
Why Check Point - Top 4
PPTX
Check Point Corporate Overview 2020 - Detailed
DOCX
Security architecture proposal template
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
Why Check Point - Top 4 Facts
Mind the gap_cpx2022_moti_sagey_final
Why check point win top 4 facts
Why Check Point - Moti Sagey
NGFW RFP TEMPLATE - TEST PLAN
Check point Infinity Overview
Why Check Point - Top 4
Check Point Corporate Overview 2020 - Detailed
Security architecture proposal template

Recently uploaded (20)

PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Testing WebRTC applications at scale.pdf
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
E -tech empowerment technologies PowerPoint
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
Funds Management Learning Material for Beg
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Introduction to the IoT system, how the IoT system works
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Slides PPTX World Game (s) Eco Economic Epochs.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Testing WebRTC applications at scale.pdf
Sims 4 Historia para lo sims 4 para jugar
Tenda Login Guide: Access Your Router in 5 Easy Steps
SASE Traffic Flow - ZTNA Connector-1.pdf
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
RPKI Status Update, presented by Makito Lay at IDNOG 10
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
E -tech empowerment technologies PowerPoint
Introuction about WHO-FIC in ICD-10.pptx
Funds Management Learning Material for Beg
522797556-Unit-2-Temperature-measurement-1-1.pptx
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
An introduction to the IFRS (ISSB) Stndards.pdf
Design_with_Watersergyerge45hrbgre4top (1).ppt
The Internet -By the Numbers, Sri Lanka Edition
Introduction to the IoT system, how the IoT system works
Job_Card_System_Styled_lorem_ipsum_.pptx

Check point response to Cisco NGFW competitive

  • 1. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Restricted] ONLY for designated groups and individuals Q3, 2016 | 1 ITEM 1: THIRD-PARTY FINDINGS CISCO CLAIM CHECK POINT FACTS, UNDERSTANDING & DETAILS:  Efficacy : Cisco quotes NSS-BDS 2016 results where it indeed scored 100% and Check Point Scored 99.4% (both great results) , what is not mentioned that Cisco used 2 products to achieve that score (Firepower and AMP endpoint) where Check Point used 1  If comparing apples-to-apples NGFW solutions which is the scope of THEIR COMPARISON , if we take the latest NSS NGFW test, check point scored 99.8% security efficacy where cisco missed 2900% more exploits than check point (see more here)  Time to Detection: not clear why they represent it like this , in fact Check Point average response was ~50% faster than Cisco (see more here) WHAT  CISCO PUBLISHED A COMPETITIVE COMPARISON OF ITS NGFW SOLUTION VS. OTHER VENDORS (PAN, FORTINET, CHECK POINT) : http://www.cisco.com/c/m/en_us/products/security/firewalls/competitive-comparison.html  THE COMPARISON CONTAINS SOME INACCURACIES ABOUT CHECK POINT  THE BELOW CONTAINS FUD – FACTS, UNDERSTANDING AND DETAILS ABOUT CISCO COMPARISON IN REGARDS TO CHECK POINT CHECK POINT RESPONSE TO CISCO NGFW COMPETITIVE
  • 2. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and individuals Q3, 2016 | 2 Competitive Cheat Sheet ITEM 2: SECURITY FEATURES CISCO CLAIM CHECK POINT FACTS, UNDERSTANDING & DETAILS Cisco claims are inaccurate: 1. Continuous analysis and retrospective detection – supported (in Early Availability ) 2. Network file trajectory – supported (SandBlast Agent) 3. Impact assessment – supported (SmartEvent, Sandblast) 4. Security automation – supported (R80) 5. Behavioral IOC – supported (Anti-bot) 6. User, network, endpoint awareness – supported (across all products) 7. NGIPS – supported , with the highest security effectiveness in the industry (according to NSS LABS) 8. Integrated ATP – supported (Sandblast suite) 9. Malware remediation – supported (SandBlast Agent)
  • 3. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and individuals Q3, 2016 | 2 Competitive Cheat Sheet ITEM 3: OPERATIONAL CAPABILITIES CISCO CLAIM CHECK POINT FACTS, UNDERSTANDING & DETAILS Cisco claims are inaccurate (except the claim that our management is excellent): 1. Scanning architecture: Check Point supports parallel processing (more info here 1:19) 2. Software-based segmentation : supported (actually with Cisco TrustSec & ACI , but also NSX, Azure, Aws,OpenStack and more) 3. Automatic threat containment : supported (actually with the same Cisco ISE , but also with cooperative enforcement ) 4. Operations and management : we agree it is indeed excellent 5. Different API’s : supported (REST API ,SANDBLAST API, similar to their proprietary ones)
  • 4. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and individuals Q3, 2016 | 2 Competitive Cheat Sheet ITEM 4: ICS/SCADA CISCO CLAIM CHECK POINT FACTS, UNDERSTANDING & DETAILS Cisco claims are inaccurate (except the first and last statement): 1. Base feature set : Check Point includes all relevant protections for SCADA 2. SCADA rules : rules meaning numbers of signatures and AVC , check point supports over 1,000 “rules” (more than 800 SCADA detectors , more than 300 IPS signatures) For a more accurate comparison, read the “zero tolerance” report here) below a recap
  • 5. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and individuals Q3, 2016 | 2 Competitive Cheat Sheet ITEM 6: THREAT INTELLIGENCE CISCO CLAIM CHECK POINT FACTS, UNDERSTANDING & DETAILS Cisco claims are inaccurate: Check Point ThreatCloud holds over 30M of IOC’s (files, hashes, domains, URL), with more than half a million unique samples per day ITEM 7: SERVICE PROVIDER CISCO CLAIM CHECK POINT FACTS, UNDERSTANDING & DETAILS Cisco claims are mostly accurate, though shows their weakness: Cisco uses third-part stitching (mostly as a concept except Radware), where check point can provide best of breed in house solution
  • 6. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and individuals Q3, 2016 | 2 Competitive Cheat Sheet THE CHECK POINT ADVANTAGE Unbeatable security & best management efficiency with predictable performance in the real world Strongest Protection with Multi-Layer Security  Industry-leading security award winning Next Generation Firewall - Leader in Gartner's 2016 Magic Quadrant of Enterprise Network Firewall (NGFW), since 1997 - Recommended rating in NSS Labs 2016 Breach Detection System test (BDS) - Recommended in NSS Labs 2016 Next-Gen Firewall test (NGFW) Best management and visibility  Easily control over 7,270 apps, 264,256 internet widgets and 200M websites by user, group, or OU  Protect clear and encrypted traffic against data breaches with strong DLP  Provide simple and secure corporate access from all mobile and fixed endpoints Most efficient security consolidation while keeping predictable real world performance  Predictable real-world performance with Security Power (SPU)  Lowest management labor time according to NSS  Industry’s only true unified management and reporting solution covering all aspects of security CISCO FACTS Security: with its integrated Sourcefire solution, Cisco provides partial security solution  Cisco ASA equipment affected by severe vulnerability – (Read more: http://goo.gl/B6IVKR)  Vulnerable to a full inspection bypass, allowing an attacker to bypass malware detection mechanisms (https://goo.gl/VwCELc)  Cisco Botnet filter lacks core components to detect network behavioral anomalies  Cisco has limited visibility of risk with 68 P2P/File sharing types vs. Check Points 342+  The APP Gap: Cisco has limited application awareness with ~4,366 apps vs. Check Point over 7,270  Cisco management has multiple vulnerabilities (CSRF - http://goo.gl/I9ukZP) and (Cross-Site Scripting http://goo.gl/cRXw0n)  Cisco new unified image Firepower Threat Defense (FTD) has many limitations and missing features such as High Availability, remote access VPN, multiple context, QoS, PBR, etc.  Cisco has 3 separate images (ASA, FirePOWER and FTD) for different appliances lines and different managements which adds to deployment complexity and increase admin labor time Management: with its Sourcefire integrations, Cisco solution requires two separate management Interfaces  Cisco needs 3 separate management consoles to properly manage Threat Prevention, Content Security, and 3 rd party event analysis (Splunk, Logrythm) (vs. 1 from Checkpoint). In some cases with cisco CSM (core FW) is also needed  Cisco needs an added Security Administrator headcount compared to Check Point due to cumbersome management interface (according to 3rd party analysts)  Cisco lacks an Event Analysis solution—no correlation of security events leads to lack of visibility & added management time  Cisco troubleshooting with FirePOWER management, requires an admin to look at seven different categories for threat prevention and Next-Gen logs  Cisco central management lacks some basic multi-domain tasks such as Global IPS, Global services, Global VPN Performance: Cisco very high price performance makes it a less attractive solution  Cisco is limited in regards to VPN setup rate with 95% less tunnels comparing Check Point  Cisco fastest appliance performs only 225Gbps of Firewall throughput (Check Point’s is 400Gbps)  Cisco shows very high cost performance (x3 times more than Check Point )  Cisco-FirePOWER SSP20,40,60 with FirePOWER services and 4000 series show very low performance throughputs compared to Check Point parallel appliances FOR MORE FACTS SEE “WINNING AGAINST“SLIDE DECK IN COMPETITIVE WIKI OR PARTNERMAP