Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Graylog comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
9th
Average Rating
8.8
Number of Reviews
61
Ranking in other categories
Advanced Threat Protection (ATP) (14th), Threat Intelligence Platforms (4th)
Graylog
Ranking in Log Management
17th
Average Rating
8.0
Number of Reviews
18
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of November 2024, in the Log Management category, the mindshare of Check Point Security Management is 0.5%, down from 0.8% compared to the previous year. The mindshare of Graylog is 6.4%, up from 5.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
 

Featured Reviews

reviewer06814135 - PeerSpot reviewer
Oct 12, 2023
Great DDoS protection, high availability, and useful firewall rule implementation
We use the product as a primary gateway firewall for all offices at different locations.  We have deployed their high-end firewall UTMs to medium business grade devices 1400 series. They are easy to manage either centrally or as separate devices. We are using them for Network security including…
Nicolae CIornii - PeerSpot reviewer
Dec 26, 2023
Stable solution with room for improvement in interactivity and user-friendliness
As a bank, we use the product to collect logs from various sources, including applications, our website, and mobile applications Since it's a free tool, I don't have much to say. Troubleshooting is important to me. The initial setup is complex. I hope to see improvements in Graylog for more…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The firewall's blades are the solution's most valuable feature."
"The centralized logs and management are helpful."
"It provides for capabilities and has allowed us to be more scalable."
"It has a central management log server that helps us to easily identify faults and issues in the environment, especially during outages and incidents during the implementation of policy rules."
"The firewall cleverly handles such attacks without compromising on performance."
"Each department can easily share data with the management without fear of data compromise."
"The product's installation phase was easy."
"HA Structure provides good coverage and works fine."
"Everything stands out as valuable, including the fact that I can quantify and qualify the logs, create pipelines and process the logs in any way I like, and create charts or data maps."
"The best feature of Graylog is the Elasticsearch integration. We can integrate and we can run filters, such as an event of interest, and those logs we can send to any SIEM tool or as an analytic. Additionally, there are clear and well-documented implementation instructions on their website to follow if needed."
"The solution's most valuable feature is its new interface."
"One of the most valuable features is that you are able to do a very detailed search through the log messages in the overview."
"Storing logs in Elasticsearch means log retrieval is extremely fast, and full text search is available by default."
"UDP is a fast and lightweight protocol, perfect for sending large volumes of logs with minimal overhead."
"Graylog's search functionality, alerting functionality, user management, and dashboards are useful."
"This had increased productivity for the dev and support teams, because we are directly notifying them."
 

Cons

"The tracking of new threats could be improved."
"Check Point is highly regarded for its effectiveness and the three-layer architecture for security, comprising the client, Security Management, and secure management console, integrated with firewall capabilities."
"Some costs are ridiculously high."
"It would be great if the SmartView Monitor could become integrated into the SmartView Console Platform."
"It sometimes blocks safe sites when I am researching, affecting the overall output and wasting time."
"Policy installation time can be reduced."
"While the console and administration work well, they have to work on performance since it consumes a lot of CPU and memory."
"The upgrade procedure already made huge improvements, yet it remains more challenging compared to other products."
"The infrastructure cost is the main issue. I like the rest. If the infrastructure costs could be lower, it would be fantastic."
"More complex visualizations and the ability to execute custom Elasticsearch queries would be great."
"More customization is always useful."
"Lacks sufficient documentation."
"I would like to see some kind of visualization included in Graylog."
"I would like to see a default dashboard widget that shows the topology of the clusters defined for the graylog install."
"Dashboards, stream alerts and parsing could be improved."
"Graylog could improve the process of creating rules. We have to create them manually by doing parses and applying them. Other SIEM solutions have basic rules and you can create and get more events of interest."
 

Pricing and Cost Advice

"The solution is expensive and there is an annual license."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"This product can be used for 25 security gateways on a basic license."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"The solution is expensive."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"Do the homework because Check Point is rather expensive."
"Price-wise, it is an expensive solution."
"It's open source and free. They have a paid version, but we never looked into that because we never needed the features of the paid version."
"Consider Enterprise support if you have atypical needs or setup requirements.​"
"There is an open source version and an enterprise version. I wouldn't recommend the enterprise version, but as an open source solution, it is solid and works really well."
"I am using a community edition. I have not looked at the enterprise offering from Graylog."
"If you want something that works and do not have the money for Splunk or QRadar, take Graylog.​​"
"​You get a lot out-of-the-box with the non-enterprise version, so give it a try first."
"Graylog is a free open-source solution. The free version has a capacity limitation of 2 GB daily, if you want to go above this you have to purchase a license."
"We're using the Community edition."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
11%
Government
8%
Security Firm
8%
Computer Software Company
17%
Comms Service Provider
9%
Government
8%
University
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
To make the tool better, I think we could have some sort of analysis similar to how some products offer information related to social media sentiments. If we could get that kind of assessment, some...
What is your primary use case for Check Point Security Management?
We use the solution for VPN with multifactor authentication, IPS protection, and threat emulation. We have deployed the product in the cloud data center.
What do you like most about Graylog?
The product is scalable. The solution is stable.
What is your experience regarding pricing and costs for Graylog?
We are using the free version of the product. However, the paid version is expensive.
What needs improvement with Graylog?
Since it's a free tool, I don't have much to say. Troubleshooting is important to me. The initial setup is complex. I hope to see improvements in Graylog for more interactivity, user-friendliness, ...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
Graylog2
 

Overview

 

Sample Customers

Hedgetec, Geiger
Blue Cross Blue Shield, eBay, Cisco, LinkedIn, SAP, King.com, Twilio, Deutsche Presse-Agentur
Find out what your peers are saying about Check Point Security Management vs. Graylog and other solutions. Updated: October 2024.
815,854 professionals have used our research since 2012.