Try our new research platform with insights from 80,000+ expert users
Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
MGMT Security Tool easy control, policies and security.
Pros and Cons
  • "The control is granular, so you can set policy profiles for different organizational profiles."
  • "Some costs are ridiculously high."

What is our primary use case?

Thanks to the new Check Point management, we were able to manage our environments decentrally with a server or from the Check Point Infinity Portal. This management is handled separately and provides greater ease of implementation and backups. You can have your gateways separated from the control server. You can even lose the management server, and easily, with a previous backup, you can restore all the policies that had been generated so that you never lose the operation of the GW.

Our Check Point implementations are quite important in our environment. With them, we were able to shield our infrastructure from modern vulnerabilities.

How has it helped my organization?

The separate management provides greater security and peace of mind. In the face of events in which we can lose communication with the management server, the operation of the Check Point gateways continues unaffected.

We also like the ease and intuitiveness of the management server since it allows you to generate policies in a straightforward way. Its logs and monitoring provide the necessary information so that those responsible for security can make decisions and improve security even more.

The control is intuitive, it's an excellent tool.

What is most valuable?

The monitoring is excellent. It helps a lot in making decisions.

Finally, the additional tools or blades implemented in this console are great. You can go from basic security implementation to a fairly advanced one with all the blades you have available.

The separate environment of the Check Point gateways is one of the most important features. The separate management allows for the continued use of the gateways.

What needs improvement?

As for the support, it is not the best. 

The hours are different from those in America. They generally respond to us at dawn. They are not as fast or efficient, and they could improve in this area.

Every manufacturer must have enough documentation for client implementations and proof of concept. However, Check Point has many outdated manuals. These should be simpler for users and help them to manage their environments with the best practices.

They should improve the ease of licensing.

Buyer's Guide
Check Point Security Management
December 2024
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.

For how long have I used the solution?

We've used the solution for more than three years. We started using Check Point Security Management and have had very good results in a manufacturer's architecture with excellent performance.

Which solution did I use previously and why did I switch?

Previously, we had WatchGuard to provide security. However, it does not meet the parameters required for our organization.

What's my experience with pricing, setup cost, and licensing?

It is important to value the support of a Check Point partner to validate the tools, in addition to seeing the product more closely.

Which other solutions did I evaluate?

We researched to find the security tool that best suits our requirements.

What other advice do I have?

For us, there are more benefits than failures; it really is an exceptional tool, and I recommend it.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2000274 - PeerSpot reviewer
Software Engineer at CloudSense
User
Top 10
Good malware detection with helpful threat prevention tools and an excellent reporting system
Pros and Cons
  • "The reporting system provides real-time insights into the security situation and shows measures that can be taken to protect our data."
  • "Sometimes the security system slows down when it is overloaded."

What is our primary use case?

The security management platform monitors the performance of applications and the security demands that can secure our data. 

Check Point Security Management has helped us to set secure points across all sectors to filter out harmful content that can destroy confidential information. 

The software has given the IT team access control in setting firewalls and securing cloud-based servers efficiently. 

This product provides comprehensive security coverage services that reduce operational costs. 

This tool has educated our teams and advanced our knowledge of setting effective security.

How has it helped my organization?

This software has improved the security situation in the organization and guarded the most confidential information against landing in unsafe areas. 

Check Point Security Management is the leading threat prevention system that ensures the networking system is protected from external attacks. 

All the departments can easily access security situations on set programs and come up with a suitable strategic plan. 

The reporting system provides real-time insights into the security situation and measures that can be taken to protect our data.

What is most valuable?

The set threat prevention tools have advanced the security monitoring systems and set up reliable data management platforms. 

Security analysis has helped teams in the organization plan and deploy the best security systems for protecting data. 

The malware detection feature has enabled the organization to block unauthorized attacks that can destroy data and leak confidential information.

Check Point Security Management has reduced operational costs and improved overall data security performance. 

Most set features have contributed to security stability in the organization, and I highly recommend this platform to other organizations.

What needs improvement?

This security control system has efficient features that have transformed the company to help it achieve set international standards. 

Most of the features provide excellent services that cannot be extracted from other platforms. 

It can be scaled down to provide services based on the company's demands and lowers operational costs. 

Sometimes the security system slows down when it is overloaded. Poor configurations have led to data leakages and weakened security signals. 

The overall performance has impressed all the team members and provided a secure environment for better workflows.

For how long have I used the solution?

I've been using the solution for 12 months.

What do I think about the stability of the solution?

This platform is highly stable and I recommend it to others.

What do I think about the scalability of the solution?

Check Point Security Management is excellent for setting security plans.

How are customer service and support?

The customer service team has performed well since we started engaging with them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with other similar solutions.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

Implementation was done through the vendor.

What was our ROI?

Our ROI has increased from 45% to 65% since we deployed this application.

What's my experience with pricing, setup cost, and licensing?

The setup cost is efficient.

Which other solutions did I evaluate?

I have not examined other related applications.

What other advice do I have?

I have observed great performance since we deployed this platform.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Security Management
December 2024
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
PeerSpot user
Security IT at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
Excellent portal and dashboard - Very intuitive
Pros and Cons
  • "With the generation and review of logs, we have verified some vulnerabilities and attempted attacks to generate improvements in our infrastructure and policies to help avoid issues in the future."
  • "It would be helpful if the documentation and good practice guides are updated. Many are still from R77."

What is our primary use case?

The use of this tool is for the administration of policies, control, monitoring, and all the management of our gateway security tool. The separation of these environments has given us a robust solution in which we can apply and protect all the configurations created in our gateways without being afraid if we lose or damage the Check Point Security Management solution. Nothing bad would happen since we can create the environment again at the Microsoft Azure level and later restore the backup without being affected.

It also provides us with the required reports on perimeter security.

How has it helped my organization?

Thanks to this incredible tool, we have been able to generate all the control configurations in which we determine which applications or sites can be accessed on the networks that are under the supervision of the Check Point gateways. In addition to the access policies, we have allowed access to servers in a granular manner to such a level that it is allowed at the port level.

With the generation and review of logs, we have verified some vulnerabilities and attempted attacks to generate improvements in our infrastructure and policies to help avoid issues in the future.

What is most valuable?

The features that we liked the most about the solution are its audits and logs, where we can validate the problems, accesses, connection refusals, vulnerabilities, or malicious accesses that are generated in our infrastructure. All of this helps to improve our safety after being analyzed.

Another excellent feature is its granularity both in policies and access control. It helps us establish good policies.

What needs improvement?

There are some improvements that can be generated in this solution. For example, their internal environments and dashboards should all be updated to look pleasant on a visual level.

It would be helpful if the documentation and good practice guides are updated. Many are still from R77.

At the support level, they should expand the languages of attention to be able to expand support in countries where the English language is not standard.  They could improve the response time when it comes to providing customer support.

For how long have I used the solution?

This tool has been used together with our Check Point Gateway for more than four years. It is excellent and the administration has been great.

How are customer service and support?

The support at the technical level is very good. That said, sometimes it takes a long time to get a response. In general, it is good.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

Previously we did not use a management tool like this.

What's my experience with pricing, setup cost, and licensing?

It is one of the best solutions that exist today. The costs are high, yet, in general, any GWs solution is. 

It is good that they support themselves with partners. Partners help clients understand the product and can request tests of the product before purchasing it to know if it is what the business is looking for.

Which other solutions did I evaluate?

It is always important to look for options available in the security solutions market. We really like how Check Point is managed, which is why we trust this manufacturer.

What other advice do I have?

It is an excellent administration tool.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro
Real User
User-friendly with remote management capabilities and great for hybrid setups
Pros and Cons
  • "Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it."
  • "Among the things that I would like in the future is for the solution to have its application on Android and iOS, as many of the administrators have adopted remote administration positions due to what has happened since the pandemic. This would help us to have an easier and simpler administration."

What is our primary use case?

We needed a solution that would be in the cloud or on-premise, that would centralize the equipment, and that would help us comprehensively manage each of the appliances that we were going to place in the four branches that we manage. Starting from that premise, we started with Check Point Security Management being the number one solution as it was pioneering in managing multiple computers simultaneously. This tool helped us to be more efficient and better at controlling risk with our hybrid cloud.

How has it helped my organization?

Starting from the need for our teams to be in the cloud and on-premises data centers, we decided on centrally securing and managing all these environments, making them easier, and more user-friendly, and their policy configuration, management of blades in the appliances, and management completely remote. 

Among its value, we can say that it helps us administrators have less administrative management burden in each appliance that must be configured and managed. Another fact is that its version can be on-premise or cloud and this cloud version helps us lower costs.

What is most valuable?

Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it. 

Among its advantages and features that add value is managing teams both on-premise and in the cloud, regardless of the type of cloud. It helps to have and use a solution that adapts to environments and is easy to manage and configure. 

What needs improvement?

Among the things that I would like in the future is for the solution to have its application on Android and iOS, as many of the administrators have adopted remote administration positions due to what has happened since the pandemic. This would help us to have an easier and simpler administration. I believe that these mobile solutions are part of the technological evolution and the promising future that new technologies bring us; this will help us with future innovation and management.

For how long have I used the solution?

I've used the solution for one year. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Technical Manager at M.Tech
Real User
Easy management, helpful support, and great for tracking logs
Pros and Cons
  • "The log dashboard in the SmartConsole is very useful and convenient for monitoring and tracking."
  • "Installing a policy takes a very long time to complete."

What is our primary use case?

With Security Management solution, we can manage and distribute security policies to firewall gateways. In large environment where there are dozens of Check Point appliances from Headquarter to branches, I deployed the Security Management with thousands of rules for an enterprise. I created different security packages for each gateway/cluster pair for administration purpose while maintaining separation and ease of policy installation. With every change request, we just need to configure the relating package and install to right gateways. Besides log dashboard in smartconsole is very useful and convenient for monitoring and tracking. It provides intuitive interface to search log, operation to filter is very to understand

How has it helped my organization?

With Check Point Security Management, we can:

- Manage and configure cluster for Check Point Gateways. Define security zones (internal, dmz, external) on interfaces.

- Add, modify, delete security rules, objects and install to gateways.

- Activate or de-activate blades like Mobile Access, IPS, URL Filtering, Application Control, Identity Awareness, Antivirus,... to the selected gateways and configure the security settings on them.

- Track and monitor security logs.

- send commands to the Management API. Supporting Management API helps automated tasks for daily operation or integrate with third-party solution SIEM/SOAR.

What is most valuable?

The most valuable feature is Management API. It has been supported since R80 and above. Why? For firewall administrators who handle many tasks daily on not only Check Point systems. They are flooded with their boring manual tasks but always got stuck with request tickets. For security analysts who work with numerous logs from many sources and take actions to stop attacks. Can analysist and protection be highly effective if they must take much time in implementing policies? All limitations above can be solved with Check Point Management API. The administrators can automate and improve their productivity in operation by scripting. The security analysts can immediately apply security settings on the firewall while saving their time and concentrate on their research job. This feature is very useful and Check Point works great job to support many security aspects with easy-to-understand guide.

What needs improvement?

In complex environment, the Security Management system manages many firewall gateways. There are thousands of security rules in the server and there are also other security settings about Check Point blades. Database in the server becomes large. Hence installing policy takes very long time to complete. Imagine that the administrators must process their daily tickets. They make configuration changes in Smart Console of Management Server for the first ticket, and while waiting for installation completion, then they receive the second ticket, a critical case, what should they do? This is only one of the situations that the administrators are facing in operation. Hope that Check Point can improve the processing time of installation.

For how long have I used the solution?

More than 5 years

How are customer service and support?

Check Point TAC team is very professional.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Only manage Check Point gateways by using Check Point Management Server. I used other firewall vendors like Cisco, Fortinet but Check Point is much better about stability and performance. So using central management for Check Point is best choice.

How was the initial setup?

Easy of setup

What about the implementation team?

I always implement by myself because it's very easy to implement.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Systems Engineer at Starlabs Limited
Real User
Great smart event feature and smart console with an easy to use interface
Pros and Cons
  • "The interface also makes it easy for us to configure the VPN from the GUI rather than the command line, which makes it easy even for less experienced engineers to work with."
  • "It could improve by showing DNS-specific information for connections to unknown public IPs."

What is our primary use case?

The solution is used to manage security gateways. We use the management server to manage our firewalls, one at DR and the other at HQ. 

The Management servers are also used to manage security policies to determine who or what system should connect to what. This allows us to block applications that are not needed per department. For example, Facebook is blocked for everyone except the marketing team. This helps keep people more productive. We also use the rules to prevent users from visiting dangerous and illegal sites.  

How has it helped my organization?

It has helped improve work in our organization. Check Point Management tracks a lot of activities on the network such as who is connecting to what sites and applications. 

It has also provided visibility into who is connecting to the corporate network via VPN and at what time which helps us keep unauthorized users away. 

The interface also makes it easy for us to configure the VPN from the GUI rather than the command line, which makes it easy even for less experienced engineers to work with. 

The management also gives visibility into licenses and device-related information to help track how long you have till licenses expire and the software and hardware health of devices. 

What is most valuable?

The smart event feature is the most valuable. The consolidated logs give full network visibility. 

The smart console has been able to provide us with good detailed information and reports ranging from bandwidth, risky applications, IPS reports, VPN reports, and infected hosts on the network. 

Reports help determine which machines may be infected with bots if they indicate that they were trying to connect to command and control servers, smart event helps determine these machines by IP address or username. 

The IPS also indicates what attacks and from where we're trying to hit our organization which helps us twerk our settings accordingly to have the most security we can get. 

What needs improvement?

It could improve by showing DNS-specific information for connections to unknown public IPs. 

Check Point could also improve management by not having applications for each version released because we have to install a new application for every version it is not very nice. They could do that by moving management to the web so that we do not have to install a client for every version. 

The fact that you have to connect to two different applications for management, does not make it the most usable. It could be great to have a system setting and policy setting done from one interface. 

For how long have I used the solution?

I've been using the solution for four years.

What do I think about the stability of the solution?

It's a very stable solution and Check Point is always doing proactive support to avoid any future problems or failures. Checkpoint support fixes bugs that they discover before the implemented production systems are affected. By logging a call with the customer and helping them remediate problems before they occur. 

What do I think about the scalability of the solution?

It is reasonably scalable as you are able to manage five gateways with one management server at entry-level.

How are customer service and support?

The solution offers very good customer support. The engineers respond on time and are available to help even if it means setting up a call to help you in implementing the given instructions.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup was straightforward. The prompt to install and the setup guide will get you through the process. When you're unclear, there are plenty of online resources to help.

What about the implementation team?

We did the implementation in-house.

What was our ROI?

The solution is definitely worth it as it helps put policies that help people focus more on work than play to use company resources more efficiently.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: We manage checkpoint products for 10 of our customers and we are checkpoint partners
PeerSpot user
PeerSpot user
Associate Consult at Atos
Vendor
Great Log monitoring and alert configuration with helpful technical support
Pros and Cons
  • "The SSL VPN monitoring based on users and tunnel monitoring are great value-added features present in the management console."
  • "SD-WAN functionality could be added."

What is our primary use case?

We use the solution for a distributed lean IT environment where there's a need to monitor logs, threats, and events, or requires configuring security policies within a single dashboard.

It's great for customers who are searching for an upgraded top to bottom yet simple and improved log management solution. In such cases, Check Point Management works perfectly.

Wherever we have provided such a solution, it has become very easy for IT administrators to manage not only a single location but also geographically distributed workplaces.

It works similarly to other management software in the industry, but Check Point is far beyond all others due to its management log monitoring functionality.

How has it helped my organization?

After integration with the R80 series, Check Point has made most organizations become relatively secure as configuration with security policies, IPS, and log management extend to the maximum ability.

Previously, we needed to monitor all logs related to network traffic and threats and had to audit logs in different dashboards which sometimes felt time and memory consuming.

With the R80 management consoles, all tasks become very easy - starting from gateway management, log monitoring, IPS configuration, global properties configuration, etc.

What is most valuable?

Some of the great aspects of the solution include:

1. Smart Event is a great feature of the Check Point management console. It gives a complete graphical view of more than a year of traffic flow including botnet traffic, malicious host present in-network, compromised hosts, and many more.

2. Object (based on IP, hostname, domain name) configuration.

3. Application and URL filtering configuration.

4. Log monitoring and alert configuration.

5. IPS configuration with improved performance.

6. Applying filters based on source, destination, port, application, etc. which is easy compared to all other vendors in the market.

7. Managing clustering for gateways - including their live health check performance - can be done on the dashboard itself.

8. The SSL VPN monitoring based on users and tunnel monitoring are great value-added features present in the management console.

What needs improvement?

The solution could be improved in these ways:

1. In order to work the management console properly we're required to have more memory and CPU on the system where we need to install a setup.

2. Due to the large size of logs generated for daily traffic, even when old logs purging is enabled, we need to delete old logs manually or else it causes errors while publishing policies which slow down the process.

3. SD-WAN functionality could be added.

4. The required license addition for every blade is a bit of a complicated task for normal IT admins to understand.

For how long have I used the solution?

I've used the solution for more than four years.

What do I think about the stability of the solution?

Stability is always improving day by day with Hotfixes they are releasing.

What do I think about the scalability of the solution?

We can scale up to a maximum limit.

How are customer service and technical support?

The technical support is very knowledgeable.

Which solution did I use previously and why did I switch?

We have good relations with Check Point. This is the main reason we have always preferred it. The technical support offered by Check Point is always a top priority.

Customer from Sophos to Check Point and ASA to Check Point has migrated to our centralized management from Check Point.

How was the initial setup?

The initial setup is straightforward, however, it can get a little complex for migration from another vendor to Check Point.

What about the implementation team?

We had the assistance of vendor support during the implementation.

What's my experience with pricing, setup cost, and licensing?

Check Point licenses work very differently compared to other vendors. We need to purchase each blade in order to make it work, but we can easily obtain a trial (evaluation) license from Check Point to get visibility for the blade.

Check Point tries to maintain relationships with customers and they try to match their price with customer expectations.

Which other solutions did I evaluate?

Palo Alto is most preferred NGFW compared to Check Point, due to having a large market share.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2040309 - PeerSpot reviewer
Property Accountant at a real estate/law firm with 201-500 employees
User
Reduces costs, has deep learning threat prevention, and improves internet browsing security
Pros and Cons
  • "Each department can easily share data with the management without fear of data compromise."
  • "It sometimes blocks safe sites when I am researching, affecting the overall output and wasting time."

What is our primary use case?

The application intervenes in security situations in the organization and launches advanced threat prevention measures. 

It has automated security controls that can predict and block malware attacks. 

It is backed by AI deep learning that offers intelligent information and scales performance to unlock hidden malicious behaviors. 

Data fraud cases have reduced since we set up this product as the main security assessment platform. 

Employees can safely browse and share files with their colleagues without fear of external interference.

How has it helped my organization?

We are satisfied with this application as it improves internet browsing security across the organization. 

Each department can easily share data with the management without fear of data compromise. 

It is more flexible than other solutions in the market as it can be deployed in both cloud and on-premise. 

It prevents members from logging in to unsecured sites and running links that may spread viruses to clean data. 

The set features are updated regularly to meet company demands and comply with set community guidelines.

What is most valuable?

The advanced security operational features help the business to identify weak points that can leak data to unauthorized personnel and take necessary precautions. 

Autonomous IoT Security monitors the performance of applications and equips them with safety measures to prevent risks and attacks. 

Deep learning threat prevention has blocked unsafe sites and phishing attacks from cyber attackers. 

It has audited the entire network and removed threat barriers that are used to slow down workflows. 

The cost of running this software has been reduced due to the modern automated version that can work faster without human intervention.

What needs improvement?

Overloading and access to many members simultaneously slow down performance, which can lead to security threats. 

New users working with this software find it hard to integrate effectively with other applications without the input of the customer support staff. 

It sometimes blocks safe sites when I am researching, affecting the overall output and wasting time. 

If the authorization commands are not well set, it slows down the working capacity of the Operating System. 

I love the current version with upgraded features that can block more attacks and protect our work environment.

For how long have I used the solution?

I've used the solution for nine months.

What do I think about the stability of the solution?

The innovative security enhancement models have helped us in curbing most online threats.

What do I think about the scalability of the solution?

There is improved security in communication and internet browsing.

How are customer service and support?

We have achieved most of the set goals due to customer service team transparency and assistance.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This solution has been awesome and offers excellent functionalities.

How was the initial setup?

The setup was relatively complex. That said, the customer service team provided enough assistance.

What about the implementation team?

The vendor team was responsible for setting up everything.

What was our ROI?

The measured ROI has improved from 30% to 55% from the deployment period.

What's my experience with pricing, setup cost, and licensing?

The setup and pricing costs are favorable to many business enterprises.

Which other solutions did I evaluate?

I have no interest in other applications.

What other advice do I have?

This is the best platform for reducing phishing and blocking malware attacks.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2024
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.