Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Cribl comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 9, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.1
Check Point Security Management yields high ROI through reduced incidents, time savings, ease of use, and improved financial performance.
Sentiment score
6.3
Cribl enhanced data management efficiency, delivering cost savings, improved processing speed, system performance, and operational flexibility for users.
 

Customer Service

Sentiment score
6.8
Check Point Security Management services are praised for expertise and rapid responses, but some note regional inconsistencies and delays.
Sentiment score
6.8
Cribl customer service is praised for prompt responses, effective support, and community assistance, with a high satisfaction rating.
The challenge was with drivers due to the size, and we had not provisioned the partition to the right size.
We have partner support that helps us mitigate vulnerabilities reported by our infrastructure team.
The community, including the engineering and sales teams, is available on Slack and is very supportive.
 

Scalability Issues

Sentiment score
8.1
Check Point Security Management is scalable and efficient, though complex environments may present challenges despite enhancements like Quantum Maestro.
Sentiment score
7.9
Cribl is scalable and easily integrates with CI/CD pipelines, receiving praise for efficient deployment and seamless cloud management.
 

Stability Issues

Sentiment score
8.1
Check Point Security Management is stable and reliable, with some variability in performance, requiring regular maintenance and updates.
Sentiment score
7.3
Cribl is generally rated 7-8 for stability, with minor bugs quickly addressed and continuous development enhancing reliability.
 

Room For Improvement

Check Point Security Management needs usability improvements, easier upgrades, better third-party integration, and updated support and documentation.
Cribl needs better legacy compatibility, intuitive logging, enhanced documentation, improved onboarding, and desktop server functionality for developers.
We had to provision the virtual machine twice.
Perhaps more flexibility in terms of metrics would be helpful.
 

Setup Cost

Check Point Security Management offers flexibility and effectiveness despite high costs, justifying its price for comprehensive protection.
Cribl offers a cost-effective, scalable pricing model with up to 30% cost reductions, appealing to mid-level and large enterprises.
Since we are using it extensively, we get significant discounts during procurement.
 

Valuable Features

Check Point Security Management offers comprehensive features, centralized control, and user-friendly tools for effective, scalable, and secure network management.
Cribl streamlines real-time data transformation, log collection, and routing with user-friendly features, security, and extensive integration support.
We can't work without Check Point because it provides the real visibility needed to manage the environment.
It's already helped secure our organization effectively.
The community on Slack is excellent for solving questions and getting ideas.
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
10th
Average Rating
9.0
Reviews Sentiment
7.3
Number of Reviews
63
Ranking in other categories
Advanced Threat Protection (ATP) (15th), Threat Intelligence Platforms (5th)
Cribl
Ranking in Log Management
13th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
10
Ranking in other categories
Application Performance Monitoring (APM) and Observability (14th), Security Information and Event Management (SIEM) (13th), Observability Pipeline Software (1st)
 

Mindshare comparison

As of April 2025, in the Log Management category, the mindshare of Check Point Security Management is 0.4%, down from 0.7% compared to the previous year. The mindshare of Cribl is 1.5%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
 

Featured Reviews

Ozan Durmus - PeerSpot reviewer
Good documentation and proxy support with a helpful community available for troubleshooting
It's useful that we can find unused objects. This helps us to get rid of unused objects in our database, Proxy support is valuable for us. We can apply centralized proxy settings to get additional databases when we need them. Revision history and detailed audit log is a good feature with this we can always feeling safe if somethings go wrong, I'm sure that I can go back the old one. Smart Event is a very good feature. It provides a graphical view of the traffics and provides history. The filter syntax is very good and helps control when we need it.
Phanindra Ponnada - PeerSpot reviewer
Provides good documentation and worth the investment
As of now, there are some environments where some organizations are still on legacy infrastructure, so they are still in virtual environments and are using old versions of devices. Some companies bought Splunk, while others bought Cribl for a very low-priced license. There are some protocols to connect from Cribl to Splunk. I understand Cribl has come into the market very recently, but the tool might have had a picture in its mind where organizations might also have some legacy infrastructure. In the future, with our protocols or our level of architecture, Cribl should not come and say that it is not compatible with them. If Cribl is the reason because I have to change my environment, then I will have to end up investing more. There are some organizations where the end machines have forwarders that forward the data to Cribl, and from it, the data is forwarded to Splunk. This is how general architecture works. There are two methods of connection between Cribl and Splunk. One is the S2S protocol, which collects logs from Cribl or sends data between Cribl and Splunk. There is another method called HTTP Event Collector (HEC) and HTTPS protocol. With Cribl, connecting to Splunk mostly uses the S2S protocol. The tool supports all the latest devices and platform devices, like all the latest operating systems. There are some organizations where there is legacy infrastructure or if they are still on the old platforms. Companies using old platforms have to consider HTTP Event Collector (HEC), and then they have to change their infrastructure setup in order to fulfill that setup. In order to have Google and Splunk set up in my organization, if I have to change my existing infrastructure connectivity or setup, that might incur more cost or more investment for me to have Cribl and Splunk. Cribl should provide compatibility, or else the tool's developers should speak to the people of such organizations and understand the challenges. Cribl could have developed some version that can give backward compatibility.
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
848,253 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Government
10%
Financial Services Firm
10%
Comms Service Provider
6%
Financial Services Firm
17%
Computer Software Company
10%
Healthcare Company
8%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
One case I saw was with the logs, which gave me the transfer and the vibration. There's a lot of logs, and I'm unsure about their validity, however, they take up a lot of space. We had to provision...
What is your primary use case for Check Point Security Management?
This is the Wi-Fi documentation. I work with the service, and we are partners with Check Point. One of our clients, Parliament, required an upgrade from physical to virtual implementation. This was...
What is your experience regarding pricing and costs for Cribl?
I am not aware of the pricing details, however, I know they use a credit format for billing.
What needs improvement with Cribl?
At the moment, I don't have specific feedback on what can be improved as I do not work with Cribl daily. Perhaps more flexibility in terms of metrics would be helpful.
What is your primary use case for Cribl?
I am using Cribl to have everything centralized in one tool in terms of data collection. We were working with different Splunk customers, and Cribl helps collect data and then send it to an S3 buck...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
No data available
 

Overview

 

Sample Customers

Hedgetec, Geiger
Information Not Available
Find out what your peers are saying about Check Point Security Management vs. Cribl and other solutions. Updated: April 2025.
848,253 professionals have used our research since 2012.