Try our new research platform with insights from 80,000+ expert users

Check Point IPS vs Splunk User Behavior Analytics comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Check Point IPS
Ranking in Intrusion Detection and Prevention Software (IDPS)
3rd
Average Rating
8.6
Reviews Sentiment
7.9
Number of Reviews
50
Ranking in other categories
No ranking in other categories
Splunk User Behavior Analytics
Ranking in Intrusion Detection and Prevention Software (IDPS)
16th
Average Rating
8.2
Reviews Sentiment
8.7
Number of Reviews
18
Ranking in other categories
User Entity Behavior Analytics (UEBA) (5th)
 

Mindshare comparison

As of November 2024, in the Intrusion Detection and Prevention Software (IDPS) category, the mindshare of Check Point IPS is 7.1%, down from 10.9% compared to the previous year. The mindshare of Splunk User Behavior Analytics is 2.3%, down from 3.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Intrusion Detection and Prevention Software (IDPS)
 

Featured Reviews

Greg Tate - PeerSpot reviewer
Great for detection and access with the capabilities of defining specific rules
Support is the biggest area for improvement. Check Point is responsive, however, their support agents seem to be very siloed in their ability and/or product knowledge. It takes time and escalation to get through most tickets as they are passed from one group to another and then back again. We are able to navigate our support issues with the aid of our account team, so I want to underscore that support is indeed responsive. However, the processes support techs have to follow seem to be the root cause of the support response issues.
Sharath Chander - PeerSpot reviewer
It's more user-friendly than other solutions we tried, but it could use more features like process mining and automation
We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is easy to configure."
"Check Point helps reduce downtime and costs associated with detected cyberattacks and can block those threats to ensure protection from any significant damage that may be caused within the organization."
"Check Point Intrusion Prevention System has great profiles, and we can continuously create, modify, activate, deactivate or configure any specific setting to allow the profile to focus on just one thing or for certain attacks."
"IPS signatures can be set quite granularly depending on your environment. You can filter on performance impact, severity, and confidence which makes sizing and adapting easier."
"The IPS module offers protection against malicious inbound Internet traffic to our DMZ network and inspects and blocks outbound Internet traffic to sites that could be a danger to our internal users."
"It protects against specific known exploits but also, with SandBlast integration, it is able to protect against unknown or zero-day attacks at the perimeter level."
"We are able to define our own rules for detection."
"The most valuable feature of Check Point IPS is the management of devices and policies."
"It is a solution that helps test and measure customer satisfaction."
"The most valuable features are its data aggregation and the ability to automatically identify a number of threats, then suggest recommended actions upon them."
"The most valuable feature is the ability to search through a large amount of data."
"It's straightforward in terms of configuration and troubleshooting and log management and monitoring as well. These are the edge points in addition to it being a modular solution where you can capitalize on your current licenses with extra licensing models, which can match the customer's business requirement and it can help the customer to design or to actually plan for their own roadmap."
"The most valuable features are the indexing and powerful search features."
"It's easily scalable."
"Splunk is more user-friendly than some competing solutions we tried."
"The solution is fast, flexible, and easy to use."
 

Cons

"There is no standalone IPS appliance available."
"Threat Prevention policies are not very easily manageable as there are several profiles/policies/etc. Therefore, there are several ways to add exceptions and check the configuration."
"After the R80 release, there are almost all feature sets available under IPS Configuration. However, further to this, adding a direct vulnerability scan based on ports and protocol for every zone (LAN, DMZ, or Outside) will make Check Point very different compared to other vendors on the market."
"Support is the biggest area for improvement."
"Despite being a blade, this is expensive."
"The service that we want to see in the future is a capacity to segment the IPS services by equipment."
"The solution needs enhanced reporting. The reporting on Cisco Stealthwatch and Darktrace is much bigger. The visibility that they grant for the filtering capabilities over large infrastructures are far superior."
"When exceptions need to be done for certain profiles, it is easy to get them done, however, implementation on some general ones may cause some extra work as the IPS is not easy to overwrite."
"Currently, a lot of network operations need improvement. We still need people to handle incidents. Our vision is to leverage status and convert it directly from the network devices. It would be ideal if we could take action using APIs and API code and remove manual processes."
"We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time."
"The correlation engine should have persistent and definable rules."
"The initial setup was complex because some of the configurations that we required needed customization."
"They should work to add more built-in correlation searches and more use cases based on worldwide customer experiences. They need more ready-made use cases."
"The price of Splunk UBA is too high."
"We'd like the ability to do custom searches."
"If the price was lowered and the setup process was less complex, I would consider rating it higher."
 

Pricing and Cost Advice

"Enabling IPS does not require any additional license purchase from OEM, as it comes by default with the NGFW bundle."
"The pricing for Check Point IPS is competitive and brings good value for the money."
"There is a license needed to use the Check Point IPS which is not expensive. However, the Check Point IPS device is expensive."
"The price of this product should be reduced."
"The tool's licensing model is good. The licensing costs are yearly. I rate it an eight out of ten."
"My company pays for the yearly licensing of Check Point IPS. It is a very expensive tool."
"You can pay for Check Point IPS yearly, or you can go with a three-year license. There's no extra cost apart from the standard licensing fee."
"It is a reasonably priced product."
"The licensing costs is around 10,000 dollars."
"Pricing varies based on the packages you choose and the volume of your usage."
"My biggest complaint is the way they do pricing... You can never know the pricing for next year. Every single time you adjust to something new, the price goes up. It's impossible to truly budget for it. It goes up constantly."
"There are additional costs associated with the integrator."
"I am not aware of the price, but it is expensive."
"I hope we can increase the free license to be more than 5 gig a day. This would help people who want to introduce a POC or a demo license for the solution."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
816,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Financial Services Firm
9%
Government
9%
Manufacturing Company
8%
Computer Software Company
15%
Financial Services Firm
13%
Government
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point IPS?
The most valuable feature of the solution is called tunneling. Tunneling is one of the major security features that hackers cannot penetrate through.
What is your experience regarding pricing and costs for Check Point IPS?
Pricing is average. Usually, the price listed isn't adhered to, and negotiations occur.
What needs improvement with Check Point IPS?
It's hard to specify areas for improvement without a deeper investigation. However, usually, IPS does its job. Some challenges might exist with integration depending on the environment.
What do you like most about Splunk User Behavior Analytics?
The solution's most valuable feature is Splunk queries, which allow us to query the logs and analyze the attack vectors.
What is your experience regarding pricing and costs for Splunk User Behavior Analytics?
I am not aware of the price, but it is expensive. A rough estimate would be around 150 gigabytes, given the huge amount of data. At the moment there are no additional costs for maintenance.
What needs improvement with Splunk User Behavior Analytics?
Sometimes, we need to write explicit queries. It would be good if the solution had an analytics tool that allowed us to analyze the data without writing specific queries. The solution's user interf...
 

Also Known As

Check Point Intrusion Prevention System
Caspida, Splunk UBA
 

Learn More

 

Overview

 

Sample Customers

Morton Salt, Medical Advocacy and Outreach, BH Telecom, Lightbeam Health Solutions, X by Orange, Cadence, Nihondentsu, Datastream Connexion, Good Sam, Omnyway, FIASA, Pacific Life, Banco del Pacifico, Control Southern, Xero, Centrify
8 Securities, AAA Western, AdvancedMD, Amaya, Cerner Corporation, CJ O Shopping, CloudShare, Crossroads Foundation, 7-Eleven Indonesia
Find out what your peers are saying about Check Point IPS vs. Splunk User Behavior Analytics and other solutions. Updated: October 2024.
816,406 professionals have used our research since 2012.