Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Dynatrace comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 12, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.1
Check Point Security Management yields high ROI through reduced incidents, time savings, ease of use, and improved financial performance.
Sentiment score
7.4
Dynatrace boosts troubleshooting efficiency and ROI, supporting DevOps, but requires commitment despite potential high costs.
ROI is hard to specify; however, incidents like impending ransomware attacks highlight its value, though those are exceptional events.
 

Customer Service

Sentiment score
6.8
Check Point Security Management services are praised for expertise and rapid responses, but some note regional inconsistencies and delays.
Sentiment score
7.2
Dynatrace receives praise for friendly, responsive service, though complex cases sometimes face delays needing more expertise.
The challenge was with drivers due to the size, and we had not provisioned the partition to the right size.
We have partner support that helps us mitigate vulnerabilities reported by our infrastructure team.
They have a good reputation, and the support is commendable.
 

Scalability Issues

Sentiment score
8.1
Check Point Security Management is scalable and efficient, though complex environments may present challenges despite enhancements like Quantum Maestro.
Sentiment score
7.4
Dynatrace effectively scales, especially cloud-based, with some challenges in complex environments, offering efficient handling of new demands.
If it's an enterprise, increasing the number of instances doesn’t pose problems.
 

Stability Issues

Sentiment score
8.1
Check Point Security Management is stable and reliable, with some variability in performance, requiring regular maintenance and updates.
Sentiment score
7.7
Dynatrace is praised for reliable performance and stability, with quick issue resolution and consistent updates enhancing user satisfaction.
Generally, all are stable at ninety-nine point nine nine percent, but if the underlying infrastructure is not deployed correctly, stability may be problematic.
 

Room For Improvement

Check Point Security Management needs usability improvements, easier upgrades, better third-party integration, and updated support and documentation.
Dynatrace users desire better pricing, UI simplicity, monitoring, integrations, analytics, legacy support, automation, data export, and platform compatibility.
We had to provision the virtual machine twice.
The definition of enterprise is loosely used, however, from a holistic security perspective, including infrastructure, network, ports, software, applications, transactions, and databases, there are areas lacking, especially in network monitoring tools.
 

Setup Cost

Check Point Security Management offers flexibility and effectiveness despite high costs, justifying its price for comprehensive protection.
Dynatrace offers advanced features with complex, high-cost pricing, varying by infrastructure size, but provides trials for suitability assessment.
Since we are using it extensively, we get significant discounts during procurement.
 

Valuable Features

Check Point Security Management offers comprehensive features, centralized control, and user-friendly tools for effective, scalable, and secure network management.
Dynatrace provides comprehensive performance monitoring and optimization with AI-driven insights and seamless integration across cloud and hybrid environments.
We can't work without Check Point because it provides the real visibility needed to manage the environment.
It's already helped secure our organization effectively.
Graduation features offered by Dynatrace provide a single view and can connect with many other monitoring systems.
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
10th
Average Rating
9.0
Reviews Sentiment
7.3
Number of Reviews
63
Ranking in other categories
Advanced Threat Protection (ATP) (15th), Threat Intelligence Platforms (5th)
Dynatrace
Ranking in Log Management
5th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
345
Ranking in other categories
Application Performance Monitoring (APM) and Observability (2nd), Mobile APM (1st), Container Monitoring (2nd), AIOps (2nd)
 

Mindshare comparison

As of April 2025, in the Log Management category, the mindshare of Check Point Security Management is 0.4%, down from 0.7% compared to the previous year. The mindshare of Dynatrace is 5.2%, down from 7.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
 

Featured Reviews

Ozan Durmus - PeerSpot reviewer
Good documentation and proxy support with a helpful community available for troubleshooting
It's useful that we can find unused objects. This helps us to get rid of unused objects in our database, Proxy support is valuable for us. We can apply centralized proxy settings to get additional databases when we need them. Revision history and detailed audit log is a good feature with this we can always feeling safe if somethings go wrong, I'm sure that I can go back the old one. Smart Event is a very good feature. It provides a graphical view of the traffics and provides history. The filter syntax is very good and helps control when we need it.
Anand_Kumar - PeerSpot reviewer
Provides a comprehensive view by integrating with other monitoring systems
There may be an issue since there are many tools like Splunk involved in network monitoring. From an IP perspective, Dynatrace is performing well. If they want to develop in network monitoring, they can, as it's part of their product line. It's not rocketry, so they can accomplish it. If I, as an SI, look at it from an enterprise perspective, considering the cost from the client, I prefer not to go with multiple systems, as they don't provide a complete 360-degree view. They need to improve on claims about being an enterprise system. The definition of enterprise is loosely used, however, from a holistic security perspective, including infrastructure, network, ports, software, applications, transactions, and databases, there are areas lacking, especially in network monitoring tools.
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
847,862 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Government
10%
Financial Services Firm
10%
Comms Service Provider
6%
Educational Organization
36%
Financial Services Firm
17%
Computer Software Company
7%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
One case I saw was with the logs, which gave me the transfer and the vibration. There's a lot of logs, and I'm unsure about their validity, however, they take up a lot of space. We had to provision...
What is your primary use case for Check Point Security Management?
This is the Wi-Fi documentation. I work with the service, and we are partners with Check Point. One of our clients, Parliament, required an upgrade from physical to virtual implementation. This was...
Any advice about APM solutions?
The key is to have a holistic view over the complete infrastructure, the ones you have listed are great for APM if you need to monitor applications end to end. I have tested them all and have not f...
What cloud monitoring software did you choose and why?
While the environment does matter in the selection of an APM tool, I prefer to use Dynatrace to manage the entire stack. Both production and Dev/Test. I find it to be quite superior to anything els...
Any advice about APM solutions?
There are many factors and we know little about your requirements (size of org, technology stack, management systems, the scope of implementation). Our goal was to consolidate APM and infra monitor...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
No data available
 

Overview

 

Sample Customers

Hedgetec, Geiger
Audi, Best Buy, LinkedIn, CISCO, Intuit, KRONOS, Scottrade, Wells Fargo, ULTA Beauty, Lenovo, Swarovsk, Nike, Whirlpool, American Express
Find out what your peers are saying about Check Point Security Management vs. Dynatrace and other solutions. Updated: April 2025.
847,862 professionals have used our research since 2012.