Try our new research platform with insights from 80,000+ expert users
reviewer2040309 - PeerSpot reviewer
Property Accountant at a real estate/law firm with 201-500 employees
User
Reduces costs, has deep learning threat prevention, and improves internet browsing security
Pros and Cons
  • "Each department can easily share data with the management without fear of data compromise."
  • "It sometimes blocks safe sites when I am researching, affecting the overall output and wasting time."

What is our primary use case?

The application intervenes in security situations in the organization and launches advanced threat prevention measures. 

It has automated security controls that can predict and block malware attacks. 

It is backed by AI deep learning that offers intelligent information and scales performance to unlock hidden malicious behaviors. 

Data fraud cases have reduced since we set up this product as the main security assessment platform. 

Employees can safely browse and share files with their colleagues without fear of external interference.

How has it helped my organization?

We are satisfied with this application as it improves internet browsing security across the organization. 

Each department can easily share data with the management without fear of data compromise. 

It is more flexible than other solutions in the market as it can be deployed in both cloud and on-premise. 

It prevents members from logging in to unsecured sites and running links that may spread viruses to clean data. 

The set features are updated regularly to meet company demands and comply with set community guidelines.

What is most valuable?

The advanced security operational features help the business to identify weak points that can leak data to unauthorized personnel and take necessary precautions. 

Autonomous IoT Security monitors the performance of applications and equips them with safety measures to prevent risks and attacks. 

Deep learning threat prevention has blocked unsafe sites and phishing attacks from cyber attackers. 

It has audited the entire network and removed threat barriers that are used to slow down workflows. 

The cost of running this software has been reduced due to the modern automated version that can work faster without human intervention.

What needs improvement?

Overloading and access to many members simultaneously slow down performance, which can lead to security threats. 

New users working with this software find it hard to integrate effectively with other applications without the input of the customer support staff. 

It sometimes blocks safe sites when I am researching, affecting the overall output and wasting time. 

If the authorization commands are not well set, it slows down the working capacity of the Operating System. 

I love the current version with upgraded features that can block more attacks and protect our work environment.

Buyer's Guide
Check Point Security Management
March 2025
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,690 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for nine months.

What do I think about the stability of the solution?

The innovative security enhancement models have helped us in curbing most online threats.

What do I think about the scalability of the solution?

There is improved security in communication and internet browsing.

How are customer service and support?

We have achieved most of the set goals due to customer service team transparency and assistance.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This solution has been awesome and offers excellent functionalities.

How was the initial setup?

The setup was relatively complex. That said, the customer service team provided enough assistance.

What about the implementation team?

The vendor team was responsible for setting up everything.

What was our ROI?

The measured ROI has improved from 30% to 55% from the deployment period.

What's my experience with pricing, setup cost, and licensing?

The setup and pricing costs are favorable to many business enterprises.

Which other solutions did I evaluate?

I have no interest in other applications.

What other advice do I have?

This is the best platform for reducing phishing and blocking malware attacks.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.

PeerSpot user
Rich text editor
    SameerMogale - PeerSpot reviewer
    Independent Business Owner at 3Kay Solutions
    Real User
    Top 5
    It integrates well with my other solutions, but it may be difficult for the average person to use
    Pros and Cons
    • "The company uses software called Harmony. Check Point integrates nicely, whether on an endpoint or mobile device. It integrates well with the firewall and can give me reports that I can check without going to an online portal."
    • "You need some technical expertise to use the solution. I don't think it's accessible to the typical end-user. You need to access the box and use some command lines or the web interface. It would be nice to have a user-friendly dashboard and comprehensive reporting."

    What is our primary use case?

    I am using Check Point to secure my home office because I'm doing all my work from home. 

    What is most valuable?

    The company uses software called Harmony. Check Point integrates nicely, whether on an endpoint or mobile device. It integrates well with the firewall and can give me reports that I can check without going to an online portal.

    What needs improvement?

    You need some technical expertise to use the solution. I don't think it's accessible to the typical end-user. You need to access the box and use some command lines or the web interface. It would be nice to have a user-friendly dashboard and comprehensive reporting. 

    For how long have I used the solution?

    I started using Check Point last year.

    How are customer service and support?

    I contacted Check Point because the device wasn't logging into the portal to download the license I purchased. It took them about three days to answer.

    Which solution did I use previously and why did I switch?

    I was using Untangled and switched to Sophos. I decided after a year that Sophos wasn't for me, so I tried Check Point. 

    How was the initial setup?

    It took me about two hours to do the initial installation, but the total deployment took a day. I did it myself and found it somewhat complicated. You need to know what you're doing. Check Point doesn't provide enough guidance and assumes you know everything. 

    What's my experience with pricing, setup cost, and licensing?

    I pay for a yearly license, but you have the option of a three-year or a five-year license. 

    What other advice do I have?

    I rate Check Point Security Management seven out of 10. I recommend it if you're a technical person experienced in WFM security devices. 

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer:

    PeerSpot user
    Rich text editor
      Buyer's Guide
      Check Point Security Management
      March 2025
      Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
      842,690 professionals have used our research since 2012.
      reviewer2000274 - PeerSpot reviewer
      Software Engineer at CloudSense
      User
      Good malware detection with helpful threat prevention tools and an excellent reporting system
      Pros and Cons
      • "The reporting system provides real-time insights into the security situation and shows measures that can be taken to protect our data."
      • "Sometimes the security system slows down when it is overloaded."

      What is our primary use case?

      The security management platform monitors the performance of applications and the security demands that can secure our data. 

      Check Point Security Management has helped us to set secure points across all sectors to filter out harmful content that can destroy confidential information. 

      The software has given the IT team access control in setting firewalls and securing cloud-based servers efficiently. 

      This product provides comprehensive security coverage services that reduce operational costs. 

      This tool has educated our teams and advanced our knowledge of setting effective security.

      How has it helped my organization?

      This software has improved the security situation in the organization and guarded the most confidential information against landing in unsafe areas. 

      Check Point Security Management is the leading threat prevention system that ensures the networking system is protected from external attacks. 

      All the departments can easily access security situations on set programs and come up with a suitable strategic plan. 

      The reporting system provides real-time insights into the security situation and measures that can be taken to protect our data.

      What is most valuable?

      The set threat prevention tools have advanced the security monitoring systems and set up reliable data management platforms. 

      Security analysis has helped teams in the organization plan and deploy the best security systems for protecting data. 

      The malware detection feature has enabled the organization to block unauthorized attacks that can destroy data and leak confidential information.

      Check Point Security Management has reduced operational costs and improved overall data security performance. 

      Most set features have contributed to security stability in the organization, and I highly recommend this platform to other organizations.

      What needs improvement?

      This security control system has efficient features that have transformed the company to help it achieve set international standards. 

      Most of the features provide excellent services that cannot be extracted from other platforms. 

      It can be scaled down to provide services based on the company's demands and lowers operational costs. 

      Sometimes the security system slows down when it is overloaded. Poor configurations have led to data leakages and weakened security signals. 

      The overall performance has impressed all the team members and provided a secure environment for better workflows.

      For how long have I used the solution?

      I've been using the solution for 12 months.

      What do I think about the stability of the solution?

      This platform is highly stable and I recommend it to others.

      What do I think about the scalability of the solution?

      Check Point Security Management is excellent for setting security plans.

      How are customer service and support?

      The customer service team has performed well since we started engaging with them.

      How would you rate customer service and support?

      Positive

      Which solution did I use previously and why did I switch?

      I have no experience with other similar solutions.

      How was the initial setup?

      The setup was straightforward.

      What about the implementation team?

      Implementation was done through the vendor.

      What was our ROI?

      Our ROI has increased from 45% to 65% since we deployed this application.

      What's my experience with pricing, setup cost, and licensing?

      The setup cost is efficient.

      Which other solutions did I evaluate?

      I have not examined other related applications.

      What other advice do I have?

      I have observed great performance since we deployed this platform.

      Which deployment model are you using for this solution?

      Public Cloud

      If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

      Google
      Disclosure: I am a real user, and this review is based on my own experience and opinions.

      PeerSpot user
      Rich text editor
        Technical Manager at M.Tech
        Real User
        Easy management, helpful support, and great for tracking logs
        Pros and Cons
        • "The log dashboard in the SmartConsole is very useful and convenient for monitoring and tracking."
        • "Installing a policy takes a very long time to complete."

        What is our primary use case?

        With Security Management solution, we can manage and distribute security policies to firewall gateways. In large environment where there are dozens of Check Point appliances from Headquarter to branches, I deployed the Security Management with thousands of rules for an enterprise. I created different security packages for each gateway/cluster pair for administration purpose while maintaining separation and ease of policy installation. With every change request, we just need to configure the relating package and install to right gateways. Besides log dashboard in smartconsole is very useful and convenient for monitoring and tracking. It provides intuitive interface to search log, operation to filter is very to understand

        How has it helped my organization?

        With Check Point Security Management, we can:

        - Manage and configure cluster for Check Point Gateways. Define security zones (internal, dmz, external) on interfaces.

        - Add, modify, delete security rules, objects and install to gateways.

        - Activate or de-activate blades like Mobile Access, IPS, URL Filtering, Application Control, Identity Awareness, Antivirus,... to the selected gateways and configure the security settings on them.

        - Track and monitor security logs.

        - send commands to the Management API. Supporting Management API helps automated tasks for daily operation or integrate with third-party solution SIEM/SOAR.

        What is most valuable?

        The most valuable feature is Management API. It has been supported since R80 and above. Why? For firewall administrators who handle many tasks daily on not only Check Point systems. They are flooded with their boring manual tasks but always got stuck with request tickets. For security analysts who work with numerous logs from many sources and take actions to stop attacks. Can analysist and protection be highly effective if they must take much time in implementing policies? All limitations above can be solved with Check Point Management API. The administrators can automate and improve their productivity in operation by scripting. The security analysts can immediately apply security settings on the firewall while saving their time and concentrate on their research job. This feature is very useful and Check Point works great job to support many security aspects with easy-to-understand guide.

        What needs improvement?

        In complex environment, the Security Management system manages many firewall gateways. There are thousands of security rules in the server and there are also other security settings about Check Point blades. Database in the server becomes large. Hence installing policy takes very long time to complete. Imagine that the administrators must process their daily tickets. They make configuration changes in Smart Console of Management Server for the first ticket, and while waiting for installation completion, then they receive the second ticket, a critical case, what should they do? This is only one of the situations that the administrators are facing in operation. Hope that Check Point can improve the processing time of installation.

        For how long have I used the solution?

        More than 5 years

        How are customer service and support?

        Check Point TAC team is very professional.

        How would you rate customer service and support?

        Positive

        Which solution did I use previously and why did I switch?

        Only manage Check Point gateways by using Check Point Management Server. I used other firewall vendors like Cisco, Fortinet but Check Point is much better about stability and performance. So using central management for Check Point is best choice.

        How was the initial setup?

        Easy of setup

        What about the implementation team?

        I always implement by myself because it's very easy to implement.

        Which deployment model are you using for this solution?

        On-premises
        Disclosure: I am a real user, and this review is based on my own experience and opinions.

        PeerSpot user
        Rich text editor
          PeerSpot user
          Systems Engineer at Starlabs Limited
          Real User
          Great smart event feature and smart console with an easy to use interface
          Pros and Cons
          • "The interface also makes it easy for us to configure the VPN from the GUI rather than the command line, which makes it easy even for less experienced engineers to work with."
          • "It could improve by showing DNS-specific information for connections to unknown public IPs."

          What is our primary use case?

          The solution is used to manage security gateways. We use the management server to manage our firewalls, one at DR and the other at HQ. 

          The Management servers are also used to manage security policies to determine who or what system should connect to what. This allows us to block applications that are not needed per department. For example, Facebook is blocked for everyone except the marketing team. This helps keep people more productive. We also use the rules to prevent users from visiting dangerous and illegal sites.  

          How has it helped my organization?

          It has helped improve work in our organization. Check Point Management tracks a lot of activities on the network such as who is connecting to what sites and applications. 

          It has also provided visibility into who is connecting to the corporate network via VPN and at what time which helps us keep unauthorized users away. 

          The interface also makes it easy for us to configure the VPN from the GUI rather than the command line, which makes it easy even for less experienced engineers to work with. 

          The management also gives visibility into licenses and device-related information to help track how long you have till licenses expire and the software and hardware health of devices. 

          What is most valuable?

          The smart event feature is the most valuable. The consolidated logs give full network visibility. 

          The smart console has been able to provide us with good detailed information and reports ranging from bandwidth, risky applications, IPS reports, VPN reports, and infected hosts on the network. 

          Reports help determine which machines may be infected with bots if they indicate that they were trying to connect to command and control servers, smart event helps determine these machines by IP address or username. 

          The IPS also indicates what attacks and from where we're trying to hit our organization which helps us twerk our settings accordingly to have the most security we can get. 

          What needs improvement?

          It could improve by showing DNS-specific information for connections to unknown public IPs. 

          Check Point could also improve management by not having applications for each version released because we have to install a new application for every version it is not very nice. They could do that by moving management to the web so that we do not have to install a client for every version. 

          The fact that you have to connect to two different applications for management, does not make it the most usable. It could be great to have a system setting and policy setting done from one interface. 

          For how long have I used the solution?

          I've been using the solution for four years.

          What do I think about the stability of the solution?

          It's a very stable solution and Check Point is always doing proactive support to avoid any future problems or failures. Checkpoint support fixes bugs that they discover before the implemented production systems are affected. By logging a call with the customer and helping them remediate problems before they occur. 

          What do I think about the scalability of the solution?

          It is reasonably scalable as you are able to manage five gateways with one management server at entry-level.

          How are customer service and support?

          The solution offers very good customer support. The engineers respond on time and are available to help even if it means setting up a call to help you in implementing the given instructions.

          How would you rate customer service and support?

          Positive

          How was the initial setup?

          The initial setup was straightforward. The prompt to install and the setup guide will get you through the process. When you're unclear, there are plenty of online resources to help.

          What about the implementation team?

          We did the implementation in-house.

          What was our ROI?

          The solution is definitely worth it as it helps put policies that help people focus more on work than play to use company resources more efficiently.

          Which deployment model are you using for this solution?

          On-premises
          Disclosure: My company has a business relationship with this vendor other than being a customer: We manage checkpoint products for 10 of our customers and we are checkpoint partners

          PeerSpot user
          Rich text editor
            reviewer1721694 - PeerSpot reviewer
            Network Security Engineer at Atlantic Data Security
            User
            Good performance monitoring with good configuration capabilities and the ability to view logs
            Pros and Cons
            • "We love the ability to monitor performance in real-time, and gather critical information about network flows and traffic."
            • "Check Point could possibly lighten up the software code so that it is not as resource-intensive and will run more smoothly on a variety of hardware and cloud or virtual machine platforms."

            What is our primary use case?

            We work with multiple clients managing their network firewalls. This includes many multi-national networks as well as local systems in the U.S.A. 

            We primarily are utilizing these products for managing customer/client environments to modify access rules and other policies for controlling traffic to and from both internal and external networks as well as cloud-based Azure systems. 

            Check Point management products are in use in all these networks, including both standard Single Management Servers as well as Multi-Domain Management servers.

            How has it helped my organization?

            Check Point Security Management has always made it simple and easy to manage all our firewall systems and firewall policies. 

            Check Point Security Management systems, both standard Single Management Servers as well as Multi-Domain Management servers, have made it very simple and easy to perform daily functions such as adding new user hosts or destination servers to existing firewall policy rules and successfully managing large corporate networks easily from both our office space or from remote worker systems.

            What is most valuable?

            We love the ability to monitor performance in real-time, and gather critical information about network flows and traffic. 

            The controls for creating, modifying, and editing firewall policies, firewall configurations, and other system operations are very simple and seamless. Accessing and viewing logging from many firewalls worldwide is also made very simple and intuitive with the ability to see both an overall picture of the logging, as well as the ability to filter down to the most specific traffic flows.

            What needs improvement?

            Sometimes there are some performance issues that cause certain operations to run slowly, however, that may just be due to the hardware it is running on needing to be stronger. Check Point could possibly lighten up the software code so that it is not as resource-intensive and will run more smoothly on a variety of hardware and cloud or virtual machine platforms. 

            More ability for users to generate reports for traffic flows, firewall performance factors like CPU, memory usage, total bandwidth consumption, and tracing heavy traffic (elephant) flows would also be great.

            For how long have I used the solution?

            I've used the solution for over seven years.

            What do I think about the stability of the solution?

            So far, we have not experienced really serious issues with the stability of the platform.

            What do I think about the scalability of the solution?

            Check Point Security Management is pretty robust at allowing the management of large numbers of firewalls - especially the Multi-Domain systems.

            How are customer service and support?

            Though we do not need to utilize the support services often, they have always been prompt and courteous, and definitely knowledgeable.

            How would you rate customer service and support?

            Positive

            Which solution did I use previously and why did I switch?

            Some of our clients have switched from other firewall solutions such as Fortinet or Palo Alto, however, they were not happy with these systems for various reasons.

            How was the initial setup?

            These systems are pretty straightforward to install and implement.

            What's my experience with pricing, setup cost, and licensing?

            Check Point seems to be reasonable with its pricing, and competitive in the market.

            Which other solutions did I evaluate?

            Sometimes our clients look at other options such as Palo Alto, or even a blend of these and Check Point.

            Which deployment model are you using for this solution?

            Hybrid Cloud
            Disclosure: I am a real user, and this review is based on my own experience and opinions.

            PeerSpot user
            Rich text editor
              Richard Lachira - PeerSpot reviewer
              Consultant, Reseller and IT Infrastructure Projects at Elytelec
              Real User
              Top 10
              Enhanced security with centralized control for threat prevention
              Pros and Cons
              • "It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering."
              • "They could offer educational courses to help individuals improve their knowledge and skills."

              What is our primary use case?

              Check Point plays a crucial role in enhancing our security firewall solution in our company. It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering.

              What is most valuable?

              The most valuable feature for me is the firewall. Whether it's five stars or even higher, the analytics reports it provides are truly impressive. They offer valuable Key Performance Indicators (KPIs) that shed light on various situations and different logs.

              What needs improvement?

              They could offer educational courses to help individuals improve their knowledge and skills.

              For how long have I used the solution?

              I have been working with it for two years now.

              What do I think about the stability of the solution?

              It provides good stability features. I would rate it eight out of ten.

              What do I think about the scalability of the solution?

              I would rate its scalability capabilities nine out of ten.

              Which solution did I use previously and why did I switch?

              In my previous company, I had experience using Fortinet and Palo Alto.

              How was the initial setup?

              I find that the setup process is somewhat distinct from other solutions. I believe that having some guidance from the website or tutorials would make it easier.

              What other advice do I have?

              I strongly recommend this solution because it's a highly effective and reliable choice. I would rate it nine out of ten.

              Which deployment model are you using for this solution?

              On-premises
              Disclosure: I am a real user, and this review is based on my own experience and opinions.

              PeerSpot user
              Rich text editor
                Hazel Zuñiga Rojas - PeerSpot reviewer
                Administrative Assistant at Tecapro
                Real User
                User-friendly with remote management capabilities and great for hybrid setups
                Pros and Cons
                • "Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it."
                • "Among the things that I would like in the future is for the solution to have its application on Android and iOS, as many of the administrators have adopted remote administration positions due to what has happened since the pandemic. This would help us to have an easier and simpler administration."

                What is our primary use case?

                We needed a solution that would be in the cloud or on-premise, that would centralize the equipment, and that would help us comprehensively manage each of the appliances that we were going to place in the four branches that we manage. Starting from that premise, we started with Check Point Security Management being the number one solution as it was pioneering in managing multiple computers simultaneously. This tool helped us to be more efficient and better at controlling risk with our hybrid cloud.

                How has it helped my organization?

                Starting from the need for our teams to be in the cloud and on-premises data centers, we decided on centrally securing and managing all these environments, making them easier, and more user-friendly, and their policy configuration, management of blades in the appliances, and management completely remote. 

                Among its value, we can say that it helps us administrators have less administrative management burden in each appliance that must be configured and managed. Another fact is that its version can be on-premise or cloud and this cloud version helps us lower costs.

                What is most valuable?

                Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it. 

                Among its advantages and features that add value is managing teams both on-premise and in the cloud, regardless of the type of cloud. It helps to have and use a solution that adapts to environments and is easy to manage and configure. 

                What needs improvement?

                Among the things that I would like in the future is for the solution to have its application on Android and iOS, as many of the administrators have adopted remote administration positions due to what has happened since the pandemic. This would help us to have an easier and simpler administration. I believe that these mobile solutions are part of the technological evolution and the promising future that new technologies bring us; this will help us with future innovation and management.

                For how long have I used the solution?

                I've used the solution for one year. 

                Which deployment model are you using for this solution?

                Hybrid Cloud
                Disclosure: I am a real user, and this review is based on my own experience and opinions.

                PeerSpot user
                Rich text editor
                  Buyer's Guide
                  Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.
                  Updated: March 2025
                  Buyer's Guide
                  Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.