Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Graylog comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
9th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
62
Ranking in other categories
Advanced Threat Protection (ATP) (14th), Threat Intelligence Platforms (5th)
Graylog
Ranking in Log Management
18th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
18
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of December 2024, in the Log Management category, the mindshare of Check Point Security Management is 0.4%, down from 0.7% compared to the previous year. The mindshare of Graylog is 6.5%, up from 5.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
 

Featured Reviews

reviewer06814135 - PeerSpot reviewer
Great DDoS protection, high availability, and useful firewall rule implementation
We didn't find any major feature missing or lacking in Check Point products that we used. We'd just like them to continue to improve their products with new features and updates. We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners. The Check Point SandBlast platform could also be merged with the Check Point GAIA platform for a central management console and easier controls.
Nicolae CIornii - PeerSpot reviewer
Stable solution with room for improvement in interactivity and user-friendliness
We have tested IBM QRadar and now use it. First of all, the key factor is the pricing. I saw that IBM QRadar has an interactive dashboard, providing valuable insights to people. Additionally, I've seen that IBM QRadar has an agent that simplifies installations across various platforms without requiring intricate configurations. Also, IBM QRadar has automatic reporting.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is easy to use and comes with few vulnerabilities. You don't have to worry about release upgrades. Life cycle management is very easy."
"One of the most outstanding characteristics of its centralized administration is its great computing power."
"The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as TLS violations or content violations."
"Each department can easily share data with the management without fear of data compromise."
"The additional features offered by the solution are excellent. We didn't have a lot fo these on a previous solution, and they've proven to be an advantage for us."
"The most valuable feature for me is Identity Awareness."
"Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it."
"Check Point Security Management excels over Forti Management in daily operations, policy management, and graphical interface. It is easy to open and edit policies, search within them, and view logs."
"Graylog's search functionality, alerting functionality, user management, and dashboards are useful."
"The build is stable and requires little maintenance, even compared to some extremely expensive products."
"We're using the Community edition, but I know that it has really good dashboarding and alerts."
"The solution's most valuable feature is its new interface."
"This had increased productivity for the dev and support teams, because we are directly notifying them."
"UDP is a fast and lightweight protocol, perfect for sending large volumes of logs with minimal overhead."
"It is used as a log manager/SIEM. It provides visibility into the infrastructure and security related events."
"What I like about Graylog is that it's real-time and you have access to the raw data. So, you ingest it, and you have access to every message and every data item you ingest. You can then build analytics on top of that. You can look at the raw data, and you can do some volumetric estimations, such as how big traffic you have, how many messages of data of a type you have, etc."
 

Cons

"In my experience, the place they can improve the most is in the technical support where I have had some serious problems that could not be solved in time due to a lack of knowledge of the assigned engineer."
"I would like the ability to have an overview, cross-site: One portal that does all firewalls. Also, the user interface is overly complicated."
"I've found the solution was a bit unstable."
"We are not sure if there is a centralized security console available. It would be beneficial if all firewalls could be integrated under one management console."
"I would like to bind users to their network, as well as their local office machine."
"I guess it lacks in providing visibility of the many incidents."
"Being a security appliance, there should be the ability for the Security Management server to send email alerts via authenticated email."
"We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners."
"More customization is always useful."
"I hope to see improvements in Graylog for more interactivity, user-friendliness, and creating alerts. The initial setup is complex."
"Elasticsearch recommendations for tuning could be better. Graylog doesn't have direct support for running the system inside of Kubernetes, so it can be challenging to fill in the gaps and set up containers in a way that is both performant and stable."
"With technical support, you are on your own without an enterprise license."
"Lacks sufficient documentation."
"Its scalability gets complicated when we have to update or edit multiple nodes."
"It would be great if Graylog could provide a better Python package in order to make it easier to use for the Python community."
"I would like to see a date and time in the Graylog Grok patterns so that I can save time when searching for a log. I like how the streams and the search query work, but adding a date and time will allow me to pull out a log in a milli-second."
 

Pricing and Cost Advice

"Price-wise, it is an expensive solution."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"The solution is expensive and there is an annual license."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"The solution is expensive."
"Do the homework because Check Point is rather expensive."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"This product can be used for 25 security gateways on a basic license."
"We are using the free version of the product. However, the paid version is expensive."
"I am using a community edition. I have not looked at the enterprise offering from Graylog."
"Having paid official support is wise for projects."
"I use the free version of Graylog."
"We're using the Community edition."
"It's an open-source solution that can be used free of charge."
"It's open source and free. They have a paid version, but we never looked into that because we never needed the features of the paid version."
"There is an open source version and an enterprise version. I wouldn't recommend the enterprise version, but as an open source solution, it is solid and works really well."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
823,875 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
11%
Government
9%
Security Firm
8%
Computer Software Company
17%
Comms Service Provider
9%
Government
8%
Educational Organization
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
We are not sure if there is a centralized security console available. It would be beneficial if all firewalls could be integrated under one management console.
What is your primary use case for Check Point Security Management?
We work with multiple security tools, including network security and information security solutions. Our primary use case includes using Check Point and other tools like CyberArk for privilege acce...
What do you like most about Graylog?
The product is scalable. The solution is stable.
What is your experience regarding pricing and costs for Graylog?
We are using the free version of the product. However, the paid version is expensive.
What needs improvement with Graylog?
Since it's a free tool, I don't have much to say. Troubleshooting is important to me. The initial setup is complex. I hope to see improvements in Graylog for more interactivity, user-friendliness, ...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
Graylog2
 

Overview

 

Sample Customers

Hedgetec, Geiger
Blue Cross Blue Shield, eBay, Cisco, LinkedIn, SAP, King.com, Twilio, Deutsche Presse-Agentur
Find out what your peers are saying about Check Point Security Management vs. Graylog and other solutions. Updated: December 2024.
823,875 professionals have used our research since 2012.