Hi Pablo.
Thank you for participating.
Frankly, I have expected better turnout in this discussion:)
I think that recognizing when solution is Not applicable is as important as recognizing when it is. Else, as a security practitioner I am doing disservice to both, my clients and vendors who's solutions I am implementing.
Therefore, I am trying to map-out the areas where Check Point's strength could and should be supplemented by other solutions and identify those by functionality. I am trying to stay vendor agnostic in order not to spark fan wars.
Even if I will not interest anyone in this project, I will likely write an article on the subject and place it here. It likely will suffer from bias and will miss a bunch of data if no one else will be here to provide much needed criticism and alternative view-points.