We utilize the security management solution to oversee all our Check Point products, including firewall, IPS, and antivirus policies. It serves as our primary tool for managing all Check Point devices.
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Easy to open and edit policies, search within them, and view logs
Pros and Cons
- "Check Point Security Management excels over Forti Management in daily operations, policy management, and graphical interface. It is easy to open and edit policies, search within them, and view logs."
What is our primary use case?
What is most valuable?
Check Point Security Management excels over Forti Management in daily operations, policy management, and graphical interface. It is easy to open and edit policies, search within them, and view logs.
What needs improvement?
The only issue is that, you need to install an application instead of managing it through a browser. Thus, it requires installation. Additionally, it can be slow when multiple users access the manager simultaneously. Even with increased CPU and memory resources, some performance issues may still occur when multiple users check simultaneously.
For how long have I used the solution?
I have been using Check Point Security Management for ten years.
Buyer's Guide
Check Point Security Management
November 2024
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
What do I think about the stability of the solution?
Sometimes, we encounter crashes while working on Check Point Security Management, necessitating application restarts. We also face connectivity issues with certain firewalls, making it less stable than other products.
What do I think about the scalability of the solution?
The solution’s scalability is good ; adding more CPUs and memory can give you more gateways.
20 managers are using this solution.
I rate the solution’s scalability a nine out of ten.
How are customer service and support?
We currently have at least two or three cases open, and some are regarding demand. We struggle to find a good engineer who can truly help us instead of just sending some comments for us to run and provide feedback. They need to improve, especially in their initial client support.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is complex.
Compared to Forti Management, Check Point Security Management involves much more work and is more difficult. You need to establish connections to all the firewalls manually, one by one. However, with the function manager, you point the firewall to the manager and accept it on the Management, and it's done. Additionally, you need to manage certificates on Check Point, making the process less straightforward than FortiManager.
You depend entirely on the manager to edit the security gateway policies. If the manager encounters an issue with Fortinet, you can still access the FortiGate and delete policies. In Check Point, you cannot delete firewall policies directly on the firewall itself if you encounter a Management issue.
Deployment, including firewall synchronization, takes about four days to complete.
You usually need to create and use the VM Manager VM. So, you need to deploy the VM, configure the IPs, and install the Check Point console software. Then, you need to perform an SIP IT connection to all the firewalls to manage them. After that, you need to configure the firewall networks and public IPs.
I rate the initial setup as seven out of ten, where one is difficult, and ten is easy.
What's my experience with pricing, setup cost, and licensing?
The product is more expensive than Fortinet. We need to pay the license for the Management. I rate the product’s pricing a seven out of ten, where one is cheap and ten is expensive.
What other advice do I have?
It enhances our daily operational efficiency. Therefore, all management personnel prioritizing working on Check Point policies over Fortinet would benefit. However, maintenance upgrades, backups, snapshots, and synchronization between primary and secondary management can become cumbersome. These tasks tend to be more challenging and time-consuming.
The learning curve for Check Point is quite steep. Sometimes, when we recruit new members to our company, they take a lot of time to understand how our Check Point system works, including the connection between the Management and the firewall, among other components. With Fortinet, it takes only two or three weeks for them to get acquainted with everything. With Check Point, they need at least three months to become accustomed to upgrades, managing policies, and maintenance of the Management system. So, it takes at least three or four times longer than with Fortinet.
AI is essential for correlating logs and presenting the ones that matter. They could strengthen how they present logs by giving more attention to the ones that matter most.
Check Point is easy to use, allowing users to drag and drop objects effortlessly. However, it's essential to note that deploying and maintaining the solution may require a bit more expertise than some competitors.
Overall, I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: May 28, 2024
Flag as inappropriateSystems Administrator with 201-500 employees
Affordable, easily deployable, user-friendly security management
Pros and Cons
- "This solution is easy to install and deploy. It is also user-friendly."
- "I would like for users to have more control over the platform in the next release. Right now, the system is very central and general requiring new rules to be created that better-suite our requirements."
What is our primary use case?
This solution is used to control OPC's. You are also able to generate reports with it.
How has it helped my organization?
Our organization is now able to easily see if our computers are running smoothly or not.
What is most valuable?
This solution is easy to install and deploy. It is also user-friendly.
What needs improvement?
I would like for users to have more control over the platform in the next release. Right now, the system is very central and general requiring new rules to be created that better-suite our requirements.
For how long have I used the solution?
I have been using this solution since 1993.
What do I think about the stability of the solution?
This is a stable solution.
What do I think about the scalability of the solution?
This is a scalable solution, we currently have three to four hundred users.
How are customer service and support?
We hardly contact Check Point support thanks to help from our partner. However, if there is an issue neither of us can resolve, we open a case with Check Point and they are able to resolve the issue quickly.
Which solution did I use previously and why did I switch?
We were using Symantec for its antivirus and backup capabilities, but now that Check Point offers antivirus, we are only using Symantec for backups. And Check Point is one fourth of the price!
How was the initial setup?
The initial setup was not complex. There was still a bit to learn with the program, but it was not complex. Initial installation took about a day and a half and it took one week for deployment in total after running some tasks.
What about the implementation team?
We had support from a Check Point partner perform the initial setup. We now have four members of our technical group maintaining the solution.
What's my experience with pricing, setup cost, and licensing?
Check Point is much cheaper than the competition ($4/server as compared to $17/server).
What other advice do I have?
I would rate this solution an eight out of ten (nine for its antivirus capabilities).
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point Security Management
November 2024
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
Network Administrator at N S PHARMACY SDN.BHD.
Good interface, excellent technical support, and very helpful additional features
Pros and Cons
- "The additional features offered by the solution are excellent. We didn't have a lot fo these on a previous solution, and they've proven to be an advantage for us."
- "The reporting should be improved in future releases. It needs to be very explicit. This is very important."
What is our primary use case?
We primarily use the solution based on the results that are provided. We've tried others previously and they didn't give us the results we receive on this particular product.
What is most valuable?
The additional features offered by the solution are excellent. We didn't have a lot of these on a previous solution, and they've proven to be an advantage for us.
Based on my personal use of the system, the interface is quite good.
What needs improvement?
It depends on the user, but all of the checkpoints need improvement. The only place I need a bit of an update, for example, is in the endpoint management. There are some policies that are embedded that you have to examine if you have sensitive users.
For some applications, the default acts as a manager. However, in a system with a history of being breached or where users are given access based on their job function, we seem to have issues particularly there.
The reporting should be improved in future releases. It needs to be very explicit. This is very important.
For how long have I used the solution?
I've been using the solution for about a year.
What do I think about the stability of the solution?
Over the past nine or ten months that we've been using the solution we've found it to be very stable. We haven't had any issues at all. Since we have a monetary drive to enforce stability, when we see a flagged issue we will address it immediately.
What do I think about the scalability of the solution?
The scalability of the solution is excellent. We haven't faced any negative aspects when trying to scale up.
How are customer service and technical support?
The technical support of the solution has been very good. They are much better than what I previously had. I find that we get attention within 24 hours if we flag something. We are purchasing the support so it may be the reason we get such a quick and helpful response.
Which solution did I use previously and why did I switch?
We did previously use a different solution. They didn't have support locally in my country and this was difficult for us. Everything was done via mail or phone and it was not helpful. With this solution, if the situation cannot be remotely addressed within 48 hours, they will come to my office in person and attend to me. It's much better.
How was the initial setup?
The initial setup is very straightforward. Deployment takes about three working days. In our case, we had to import policies from SonicWall but not on the same platform, so we had some little challenges like that, however, overall it was quite straightforward.
We have an in-house team that handles maintenance.
What about the implementation team?
We had an integrator that assisted us with the implementation of the product. We use them for support as well.
What other advice do I have?
We're still in the testing phase in terms of using the solution. Soon, it will be one year since we have fully deployed it. So far, it's been very good. I would rate it eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Web filtering and built-in VPN are key features, but the user interface is overly complicated
Pros and Cons
- "Key features include the ability to include logs for everything that you do for admin. Also, it has web filtering built in and VPN."
- "I would like the ability to have an overview, cross-site: One portal that does all firewalls. Also, the user interface is overly complicated."
What is our primary use case?
Perimeter protection. It has performed well. It's good.
How has it helped my organization?
It hasn't really improved the way our organization functions. It has just provided that extra functionality. That is something we now demand of all firewalls.
What is most valuable?
The ability to include logs for everything that you do for admin. Also, it has web filtering built in and VPN. Those are the main features we use.
What needs improvement?
I would like the ability to have an overview, cross-site: One portal that does all firewalls.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
The stability is good, but that's because we've got a high-availability configuration.
What do I think about the scalability of the solution?
It is scalable, but, as I said before, you are not able to connect across multiple sites for a similar firewall.
How are customer service and technical support?
I would say tech support is about a six out of 10.
Which solution did I use previously and why did I switch?
There was no previous solution. I inherited this one.
When selecting a vendor, the most important criteria are history, reputation, and looking at the industry ratings.
How was the initial setup?
Although I wasn't involved in the initial setup, I believe it was quite complicated.
What other advice do I have?
Do the homework because Check Point is rather expensive. There are better firewalls on the market now that are cheaper and provide better functionality and security.
I rate it a six out of 10 because the user interface is overly complicated.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Technology consultant at a tech services company with 501-1,000 employees
Easy to set up, helpful support, but the stability needs to be improved
Pros and Cons
- "The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration."
- "For those not familiar with the Command Line interface, there should be an option in the GUI for operating backups."
What is our primary use case?
We have a Check Point firewall to secure our perimeter as well as on the internal network. We also have our Security Management server on VM. Both perimeter & internal sets are managed via the same Security Management system.
Two separate packages are created for both perimeter & internal sets.
We are also managing a SandBlast device via Security Management.
Even though all of the work is performed by the gateway, Security Management plays a vital role in a three-tier architecture. Here, our primary use case is to push security policies & manage logs.
How has it helped my organization?
Check Point Security Management is one-stop for all operation-related activity on the Check Point Security Gateway (firewalls).
We have completed one-time implementation configurations, like clustering, using this tool.
Check Point has a very sophisticated log monitor, where troubleshooting is very simple. We just have to put the desired filter, and Check Point generates the reports that help us to understand the overall picture in our network.
We have created multiple users, and they each have a smart dashboard install on their machine.
What is most valuable?
The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration. Logs are collected at the management server, hence we can preserve those as well.
We can keep on adding new devices that can all be managed from a single security management server.
After the upgrade to R80, we have a single interface for all activities. Previously, we needed to configure using different applications.
What needs improvement?
It is very difficult to recover policies from the gateway in case if you lose your security management server, and don't have a backup.
The backup functionality (Migrate export command), which covers policies, can not be operated from the GUI. Instead, we have to log into the CLI and generate a file then take it out. For those not familiar with the Command Line interface, there should be an option in the GUI for operating backups. There should also be an option to automatically schedule the backup.
The smart dashboard is a very heavy application. If we could directly connect & manage firewalls from the Management server itself then it would make it very easy.
For how long have I used the solution?
I have been working with Check Point Security Management for more than three years.
What do I think about the stability of the solution?
The stability needs to be improved.
What do I think about the scalability of the solution?
Scalability-wise, it is very good, as it was deployed on VM.
How are customer service and technical support?
TAC is very supportive but we face many issues with this product.
Which solution did I use previously and why did I switch?
Previously, we had only firewalls & not a management device.
How was the initial setup?
The initial setup is not very complex & can be done easily.
What about the implementation team?
We are the ones who implemented it.
What's my experience with pricing, setup cost, and licensing?
This product can be used for 25 security gateways on a basic license. I think that this is good value for the money.
Which other solutions did I evaluate?
We wanted to implement Check Point and hence, we did not evaluate others.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Global IT Network and Security Service Senior Specialist at a manufacturing company with 1,001-5,000 employees
Allows for easy troubleshooting and configuration using a single pane of glass but is unstable
Pros and Cons
- "The unique management using Smart Console for all firewalls is very useful."
- "I've found the solution was a bit unstable."
What is our primary use case?
We are using it on the cloud for cloud segmentation and as a VPN for users. We have been implementing Checkpoint on Azure's cloud for configuring scale sets for internal and external firewalls and as a gateway group active/standby for the VPN. The solution is implemented using a Multiple Entry Point feature. This allows us to use the same URL deplyed for all users and let them connect to the nearest node. We use other features like IPS, Threat Control, and Antivirus/Antibot for protecting our servers. We wanted to implement the SCV feature but it's not working. We've been working with support for months without a resolution.
How has it helped my organization?
It has allowed global worldwide access to our cloud infrastructure. It gives us the possibility to improve security on the Azure cloud as well.
It features NGFW provided by checkpoint with all of the capabilities that are required to protect for Next Generation protection from attacks at perimeter level The module and security features that are provided as part of the base license with Checkpoint include the VPN, IPS, Application Control, and Content Awareness which offers strong protection for the organization. The main problem is that the support in terms of solving any issue is not very good.
What is most valuable?
The unique management using Smart Console for all Firewalls is very useful. Also, the management of policies and the log page allows for easy troubleshooting and configuration using a single pane of glass. The new release R81 allows a very fast installation of policies on the firewalls.
The MEP feature had a lot of problems during the implementation, needing configuration of TXT file via the CLI, however, at the end of the implementation, it is working well and has given us a very good advantage on the VPN solution in our company. I hope to see other useful features in the next release.
What needs improvement?
I've found the solution was a bit unstable. It would be better to improve the stability of the service. Another thing that needs to be improved is the Checkpoint support. Very often they were not able to solve the problems that we had. Sometimes to solve problems you need to install a new Hotfix or Custom release - and that can generate some side effects that can create instability problems. It's necessary to improve the support - especially the one that is provided in India.
For how long have I used the solution?
We had done an upgrade 2 months ago.
What do I think about the stability of the solution?
It's improving with new releases.
What do I think about the scalability of the solution?
It's very scalable.
How are customer service and technical support?
The experience has not been very good.
Which solution did I use previously and why did I switch?
Yes, we were using on-prem products with Cisco Anyconnect VPN solutions. We switched to Checkpoint and moved the VPN solution to the cloud.
How was the initial setup?
Yes, it was a bit complex.
What about the implementation team?
We had a good level of expertise, and we also used Checkpoint professional services directly.
What was our ROI?
We hope to have ROI in 3 years.
What's my experience with pricing, setup cost, and licensing?
Licensing is very granular. You can easily select the best solution and feature that fits to you.
Which other solutions did I evaluate?
We did not evaluate other options.
What other advice do I have?
They should improve the support and the stability of the system. When there are issues, it is not very easy to solve problems using the support they offer. Other vendors like Cisco have better support. This is very important for Enterprise companies - even more than new features.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Works at a financial services firm with 5,001-10,000 employees
Good access control, security control, and threat prevention, but needs better support and a workflow for user authorization
Pros and Cons
- "It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution. Check Point is effective when it comes to security control and threat prevention."
- "Support is the main area that they need to improve. Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region. I would like a feature where there is a workflow to provide authorization to some users before they're able to create and apply rules. Such a feature should be integrated with the management. It should not be in the box that comes with it."
What is our primary use case?
We use it for both perimeter and internal defense.
What is most valuable?
It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution. Check Point is effective when it comes to security control and threat prevention.
What needs improvement?
Support is the main area that they need to improve. Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region.
I would like a feature where there is a workflow to provide authorization to some users before they're able to create and apply rules. Such a feature should be integrated with the management. It should not be in the box that comes with it.
For how long have I used the solution?
I have been working on the protection network since 2014. It has been around seven years.
What do I think about the stability of the solution?
So far, it has been stable, but stability also depends on your design and deployment. You might have a performance issue, especially when you have to deal with a lot of traffic. You also need to factor in maintenance in terms of the upgrades, patches, and hotfixes that you need to do regularly. When you're able to do that and take care of the maintenance, you'll have stability.
What do I think about the scalability of the solution?
Scalability depends on your design. You have to properly scope your environment to know the amount of traffic that is expected to go through, pass, or transmit through the firewall. After you have a proper scope, you won't have any problems. Otherwise, you'll definitely be experiencing issues.
How are customer service and technical support?
Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region.
How was the initial setup?
As compared to other security and firewall solutions, its deployment is not that easy. The deployment duration depends on your project plan. It also depends on whether you are working just on the deployment, and there are no distractions.
What about the implementation team?
In terms of those who manage the rules and administer the system, we have about ten people. They are administrators, and they create rules, manage the system, and provide support.
Which other solutions did I evaluate?
I wasn't a part of the team that did the evaluation.
What other advice do I have?
I would advise others to properly apply good design concepts by engaging professionals. They should properly scope their environment to ensure that they are deploying the solution to optimized standards. They should also ensure that they train their personnel to be able to handle the first level and even second level support when it comes to the management of Check Point.
I would rate Check Point Security Management a seven out of ten considering the skills that are required and the ease of use and management.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Head of IT Director at Cosyn Limited
Effective threat management and comprehensive protection against vulnerabilities
Pros and Cons
- "Check Point has been very effective in terms of threat management and comprehensive protection against vulnerabilities, and it has given us confidence that our data is not going anywhere."
- "The tracking of new threats could be improved."
What is our primary use case?
I mainly use this solution for endpoint security, to capture data with a secure approach.
How has it helped my organization?
Our data is the most important thing, therefore, it's essential that it be secured. Checkpoint has been very effective in terms of threat management and comprehensive protection against vulnerabilities, and it has given us confidence that our data is not going anywhere.
What needs improvement?
The tracking of new threats could be improved.
For how long have I used the solution?
I've been working with this solution for a couple of years.
What do I think about the stability of the solution?
Check Point's stability is good.
How are customer service and support?
My experience with technical support has been good.
How was the initial setup?
The initial setup is straightforward.
What was our ROI?
The return on investment is that our data is safe, Check Point offer upgrades, and we get the best possible cost-effective price.
Which other solutions did I evaluate?
I looked at Sophos, but Check Point's security coverage is better.
What other advice do I have?
I would definitely recommend this solution to anybody thinking of implementing it. I would give it a rating of nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Popular Comparisons
Splunk Enterprise Security
IBM Security QRadar
Elastic Security
LogRhythm SIEM
Fortinet FortiAnalyzer
USM Anywhere
VMware Aria Operations for Logs
ManageEngine EventLog Analyzer
ArcSight Logger
Nagios Log Server
Splunk Cloud Platform
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- When evaluating Log Management tools and software, what aspect do you think is the most important to look for?
- Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
- Which Windows event log monitoring tool do you recommend?
- What is the difference between log management and SIEM?
- Splunk vs. Elastic Stack
- How can Cloudtrail logs be used effectively to improve log monitoring?
- Why hot data and cold data differences in SIEM solutions are not discussed sufficiently?
- When evaluating Log Management solutions, what aspect do you think is the most important to look for?
- When evaluating Log Management solutions, what aspects do you think are the most important to look for?
- Why are Log Management tools important for companies?