Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Elastic Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
9th
Average Rating
8.8
Number of Reviews
61
Ranking in other categories
Advanced Threat Protection (ATP) (14th), Threat Intelligence Platforms (4th)
Elastic Security
Ranking in Log Management
5th
Average Rating
7.6
Number of Reviews
61
Ranking in other categories
Security Information and Event Management (SIEM) (5th), Endpoint Detection and Response (EDR) (16th), Security Orchestration Automation and Response (SOAR) (6th), Extended Detection and Response (XDR) (8th)
 

Mindshare comparison

As of November 2024, in the Log Management category, the mindshare of Check Point Security Management is 0.5%, down from 0.8% compared to the previous year. The mindshare of Elastic Security is 5.0%, down from 8.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
 

Featured Reviews

reviewer06814135 - PeerSpot reviewer
Oct 12, 2023
Great DDoS protection, high availability, and useful firewall rule implementation
We use the product as a primary gateway firewall for all offices at different locations.  We have deployed their high-end firewall UTMs to medium business grade devices 1400 series. They are easy to manage either centrally or as separate devices. We are using them for Network security including…
Gajewski Marek - PeerSpot reviewer
Aug 13, 2024
Provides good anomaly detection and connectivity reporting
I use Elastic Security to aggregate all logs from different devices in one place. It works pretty well and provides one overview of everything The solution's most valuable features are anomaly detection and connectivity reporting. Elastic Security also has many automation capabilities, which can…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Having the possibility to use Smart Event to check for threats on a broader scale helps after a security incident and also makes it easier to check - instead of looking through different logs."
"It provides for capabilities and has allowed us to be more scalable."
"We can track logs of each firewall which is very helpful."
"It offers numerous features and blades, including intrusion prevention (IPS) and malware detection. It excels in network security and VPN capabilities, including IPSec VPNs. IPS is particularly powerful due to its signature-based detection, which automatically checks for and identifies malicious software."
"The firewall cleverly handles such attacks without compromising on performance."
"The product's installation phase was easy."
"With the generation and review of logs, we have verified some vulnerabilities and attempted attacks to generate improvements in our infrastructure and policies to help avoid issues in the future."
"The most valuable feature for me is Identity Awareness."
"What customers found most valuable in Elastic Security feature-wise is the search capability, in particular, the way of writing the search query and the speed of searching for results."
"The most valuable features of the solution are the prevention methods and the incident alerts."
"The solution's most valuable features are anomaly detection and connectivity reporting."
"Elastic Security is a highly flexible platform that can be implemented anywhere."
"Enables monitoring of application performance and the ability to predict behaviors."
"The tool's functionality is good for overall security and incident response times."
"It's open-source and free to use."
"The cost is reasonable. It's not overly pricey."
 

Cons

"Check Point EDR has room for improvement, especially in the area of Data Loss Prevention where it currently lacks functionality."
"While the console and administration work well, they have to work on performance since it consumes a lot of CPU and memory."
"I like that the Compliance software blade is available for free with the Security Management server purchase, but it is free for only one year - after that you have to buy an additional license to continue using it. I think such an important feature is vital for the management server, and should not be licensed separately."
"Check Point could improve by enhancing the networking in their solution in order to align it with the existing network architecture."
"You need some technical expertise to use the solution. I don't think it's accessible to the typical end-user. You need to access the box and use some command lines or the web interface. It would be nice to have a user-friendly dashboard and comprehensive reporting."
"Check Point Security Management lacks some of the competitor features."
"They need to make a Mac version of the SmartConsole, in my opinion."
"Troubleshooting is quite complicated within multi-domain management. If an issue arises, the local administrator has to keep in mind that there are other domains that could be also affected."
"I would like the process of retrieving archived data and viewing it in Kibana to be simplified."
"Technical support could respond faster."
"With Elastic, you have to build the use cases for the specific requirement. Other products have a simple integration and more use cases to integrate out-of-the-box solutions for SIEM."
"The solution could also use better dashboards. They need to be more graphical, more matrix-like."
"They don't provide user authentication and authorisation features (Shield) as a part of their open-source version."
"There should be a simulation environment to check whether my Elastic implementation is functioning perfectly fine. Other solutions have their own Android and iOS applications that I can install on my mobile so that I am continuously connected to the SIEM."
"The solution's basic setup takes time, and a lot of effort is required from the beginning to make it actually work."
"Better integration with third-party APMs would be really good."
 

Pricing and Cost Advice

"The solution is expensive and there is an annual license."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"Do the homework because Check Point is rather expensive."
"Price-wise, it is an expensive solution."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"The solution is expensive."
"This product can be used for 25 security gateways on a basic license."
"Elastic Stack is an open-source tool. You don't have to pay anything for the components."
"We use the open-source version, so there is no charge for this solution."
"Its price is fine. Its licensing works on a yearly basis. We have to renew the license every year. I also have a good experience with Darktrace. When we buy Darktrace, we get training free of cost, which is not there in Elastic. We have to pay extra for training. There is certainly room for improvement."
"Compared to other tools, Elastic Security is a cheaper solution."
"The tool's pricing is flexible and comes at unit cost. You don't have to pay for everything."
"I find it better than Splunk in terms of cost-effectiveness. For cost-effectiveness, I would rate it a nine out of 10."
"It is easy to deploy, easy to use, and you get everything you need to become operational with it, and have nothing further to pay unless you want the OLED plugin."
"This is an open-source product, so there are no costs."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
11%
Government
8%
Security Firm
8%
Computer Software Company
17%
Financial Services Firm
10%
Government
10%
University
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
To make the tool better, I think we could have some sort of analysis similar to how some products offer information related to social media sentiments. If we could get that kind of assessment, some...
What is your primary use case for Check Point Security Management?
We use the solution for VPN with multifactor authentication, IPS protection, and threat emulation. We have deployed the product in the cloud data center.
Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several times lately using the dashboards we have created with Datadog; they are very good c...
What do you like most about Elastic Security?
Elastic provides the capability to index quickly due to the reverse indexes it offers. This data is crucial as it contains critical information. The reverse index allows fast data indexing because ...
What is your experience regarding pricing and costs for Elastic Security?
Compared to other tools, Elastic Security is a cheaper solution.
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
Elastic SIEM, ELK Logstash
 

Overview

 

Sample Customers

Hedgetec, Geiger
Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health Care
Find out what your peers are saying about Check Point Security Management vs. Elastic Security and other solutions. Updated: October 2024.
815,854 professionals have used our research since 2012.