Check Point Security Management is an advanced security management platform for enterprises. The platform integrates all aspects of security. A single platform manages the entire infrastructure, from data centers to private/public cloud deployments.
Check Point Security Management offers advanced threat prevention tools and malware detection, as well as excellent monitoring, auditing, and logging capabilities that help improve safety and decision-making.
The solution also provides a centralized administration that is easy to integrate, manage, and orchestrate, with a single interface to manage multiple cybersecurity platforms, making it easy to track the reason for a block. The solution offers several health checks in an overview, and the SSL VPN monitoring, based on users and tunnel monitoring, are great value-added features present in the management console.
The management API is a new feature that allows for automation, while the compliance feature provides verification of overall compliance against standards. The solution is user-friendly and easy to install and deploy.
Its logs are also fast and the layered architecture is easily understandable. Some say the event correlation function is brilliant.
Improvements could be made to Check Point Security Management's internal environments and dashboards to make them more visually appealing with more comprehensive reporting and more report templates. Networking could be enhanced to align with existing architecture.
Hybrid cloud integration needs improvement, but the system has efficient features that can meet international standards. Integration with third-party equipment and mobile applications would be beneficial, and policy installation time could be reduced.
Troubleshooting within multi-domain management is complicated. In addition, more automation and simpler processes are needed. Finally, the solution requires more memory and CPU to work properly, and the addition of SD-WAN functionality would be useful.
Other areas for improvement are updating documentation and support for non-English speaking countries.
Users feel that investing in security is always a good idea, and the solution helps them to use company resources more efficiently by enforcing policies. Additionally, users report feeling a sense of peace of mind knowing their data is safe. Some users have reported that their ROI has exceeded expectations.
Check Point Security Management is a high-quality solution that comes at a cost, but is considered is competitive in the market. The solution offers annual licensing with options for longer-term. Check Point has a granular licensing system where each blade needs to be purchased, but trial licenses are available.
Check Point offers upgrades at a cost-effective price.
Some users recommend analyzing business needs and purchasing accordingly to avoid paying for unnecessary features.
Check Point Security Management is used for centralizing and managing security policies, control, monitoring, and administration of gateway security tools. Primary use cases include endpoint security, controlling OPCs (Object Policy Controls), and managing large numbers of rules. It is also used for filtering out harmful content, and its AI and deep learning are employed to predict and block malware attacks. Additionally, it is used to manage security gateways and establish VPNs, segregate and filter traffic flow, and configure policies on mobile access blades.
The technical support of Check Point Security Management is good, although sometimes slow to respond. Some customers have had issues with support and cases needing to be escalated, while others have had positive experiences with knowledgeable and helpful support teams. The quality of support seems to vary depending on the customer's level of experience and the severity of the issue.
The initial setup for Check Point Security Management can be challenging or straightforward depending on the user's experience and resources. The distributed deployment requires the purchase of several components, which can be seen as complex, but they also provide greater visibility. Customer service assistance was provided for some users. Migration from another vendor can be challenging.
Check Point Security Management has a distributed and complex solution, which can impact its scalability. Some reviewers find it highly scalable and efficient, especially when managed through Multi-Domain systems or virtual instances. The recent addition of Quantum Maestro expanding its capabilities tremendously.
Some note that the licensing can be restrictive and cookie-cutter, and upgrades and maintenance can be challenging due to the many components involved.
Users rate the stability of Check Point Security Management highly. Some note that updates have improved stability and that fixes are provided regularly.
Some mention potential issues with overloaded appliances or old policy revisions.
Check Point Security Management is a reliable and easy-to-use security platform. It integrates all aspects of your security environment to strengthen the security posture without impairing productivity. The system has a layered policy model. This means the security policy can be separated into layers for network segmentation. Different administrators can manage different policies. The policy layer automates the tasks.
The platform is extensible, scalable, and integrates easily with orchestration systems and change management.
Basic Components of the Infrastructure
The smart console offers several advantages. Changes in security policies and logs can be done with a click. You can navigate from an item within a log to the policy. There are also built-in multi-language support and accessibility features.
1. Security Management Server: The server manages security gateways with set security policies and monitors security events on the network.
The automation server is an integrated part of the management server. The API server is active by default on servers with 4 GB of RAM or more and on standalone servers with 8 or more GB of RAM.
The automation server communicates with the management server the same way as the Smart Console. This architecture allows the same validation errors and warnings to be presented when using an automation session.
The same audit logs generated using the Smart Console are also generated using an automation session. If you have a multi-domain environment, there is only one automation server that monitors all the IP addresses of the multi-domain management server.
2. Security Gateway is placed at the edge of the network. It monitors and filters traffic and enforces security policies.
Logging, Event management, and Monitoring
With Check Point Security Management, logging, reporting, event management, and monitoring are integrated. The platform features widgets and chart templates that optimize visibility. One of the best features is the one-click exploration. This simplifies going from a general overview to specific event details.
Benefits of Check Point Security Management
The unified console also means a single policy for users, data, applications, and networks. The granularity control helps accelerate administration processes. This feature, together with automation, is key to achieving reduced operational overhead. Security teams can automate tasks and even create self-service security web portals with the Check Point Security Management platform.
Threat management is fully integrated, with reporting, logging, and monitoring all in one dashboard. This provides full visibility into the security of the network.
Security Management Suite
The Security Management Suite consists of the following modules:
Reviews from Real Users
A Network Security Engineer/Architect at a tech services company says, "The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other."
"The management API is the best new feature for me. It allows us to further automate our customers' automated server ordering," says a System Engineer Network & Security at OTTO GmbH & Co KG.
A Senior Infrastructure Services Specialist at St.George Bank Limited adds that "The solution is ideal for use and deployment in a large infrastructure environment."
Check Point Security Management was previously known as R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management.
Hedgetec, Geiger