Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs LogRhythm SIEM comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Customer Service

Sentiment score
6.8
Check Point Security Management support is mixed; some users praise it while others report slow resolutions and unhelpful agents.
Sentiment score
6.3
LogRhythm SIEM's customer service is praised for quick, knowledgeable support, though higher-level assistance can have occasional delays.
We have partner support that helps us mitigate vulnerabilities reported by our infrastructure team.
 

Room For Improvement

Sentiment score
5.4
Check Point Security Management needs speed, stability, better integration, intuitive usability, cost efficiency, enhanced reporting, and improved hybrid cloud management.
Sentiment score
4.2
LogRhythm SIEM needs interface, integration, and performance improvements, enhanced tools, better documentation, streamlined processes, automation, and user-friendly dashboards.
 

Scalability Issues

Sentiment score
8.1
Check Point Security Management offers robust scalability and flexibility, but complex environments may require careful planning for optimal performance.
Sentiment score
7.0
LogRhythm SIEM is mostly scalable but faces challenges with older models, licensing, and cloud environment costs for smaller businesses.
 

Setup Cost

Sentiment score
6.8
Check Point Security Management is costly but valuable, offering robust features and flexibility with potential discounts for extensive use.
Sentiment score
6.8
LogRhythm SIEM offers transparency and competitive pricing, valued for features, despite high costs for large-scale deployments and services.
Since we are using it extensively, we get significant discounts during procurement.
 

Stability Issues

Sentiment score
8.1
Check Point Security Management is stable and reliable, with some performance issues under heavy loads and occasional bugs.
Sentiment score
6.1
LogRhythm SIEM is stable and reliable, though minor issues occur during upgrades or with complex queries and high event rates.
 

Valuable Features

Sentiment score
8.2
Check Point Security Management provides centralized policy management, advanced features for threat prevention, and efficient gateway management for enhanced security.
Sentiment score
8.5
LogRhythm SIEM excels in threat detection with AI, ease of use, extensive log collection, and seamless integration, enhancing security visibility.
It's already helped secure our organization effectively.
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
9th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
62
Ranking in other categories
Advanced Threat Protection (ATP) (14th), Threat Intelligence Platforms (5th)
LogRhythm SIEM
Ranking in Log Management
10th
Average Rating
8.4
Reviews Sentiment
6.7
Number of Reviews
172
Ranking in other categories
Security Information and Event Management (SIEM) (7th)
 

Mindshare comparison

As of December 2024, in the Log Management category, the mindshare of Check Point Security Management is 0.4%, down from 0.7% compared to the previous year. The mindshare of LogRhythm SIEM is 2.5%, down from 3.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
 

Featured Reviews

reviewer06814135 - PeerSpot reviewer
Great DDoS protection, high availability, and useful firewall rule implementation
We didn't find any major feature missing or lacking in Check Point products that we used. We'd just like them to continue to improve their products with new features and updates. We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners. The Check Point SandBlast platform could also be merged with the Check Point GAIA platform for a central management console and easier controls.
Joseph W. - PeerSpot reviewer
Has pre-built pieces for third party vendors and does not take a long time to implement
One of the main features that I like about LogRhythm SIEM is that there are a lot of pre-built pieces. Like with our AV, we didn't have to tell it how to read the logs; they already had it pre-made. So, we essentially just had to follow their guide to get the logs imported in and set up some rules for it. We've only had to manually create the parsing rules for a few of our vendors so that we could interpret the logs correctly. Most of them had already been pre-created for us. We use the Event Log Filtering feature a lot. We use it for simple troubleshooting tasks like when a user is logged out, to more important tasks like trying to investigate a threat. As far as its effect on productivity, we can go and search instead of trying to troubleshoot and guess what is causing an error. We can identify what the program is or where the hiccup is. LogRhythm helped us to identify a lot of blind spots. Originally, we didn't have a SIEM tool. We had auditors say that this is something that we should be doing. My management team asked me to go and find a product, and I researched a bunch of them and found LogRhythm. It really opened our eyes to see how much traffic we have, whether it's other IP addresses that are scanning us or external users trying to hit certain ports that could then get closed. It helped us tighten down some of those firewall rules that may have been left open unintentionally through other changes. It helped us a lot early on to identify who was trying to communicate with us or, essentially, who was trying to attack us. As far as our overall security posture, our SIEM tool was the initial push that really got us going into identifying where all of our threats were. We expanded over the seven years that we've had it, and I implemented at least eight other products that are all security related because the SIEM tool indicated the need to identify other risks. It really helped us as an organization to identify risks and move forward to a more secure environment.
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
823,875 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
11%
Government
9%
Security Firm
8%
Educational Organization
45%
Computer Software Company
9%
Government
6%
Financial Services Firm
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
We are not sure if there is a centralized security console available. It would be beneficial if all firewalls could be integrated under one management console.
What is your primary use case for Check Point Security Management?
We work with multiple security tools, including network security and information security solutions. Our primary use case includes using Check Point and other tools like CyberArk for privilege acce...
What is the difference between log management and SIEM?
Rony, Daniel's answer is right on the money. There are many solutions for each in the market, a lot depends upon your ability to manage such tools and your budget. A small operation may be best s...
What needs improvement with LogRhythm NextGen SIEM?
The integration is slightly difficult with other assets, like EDR technologies or firewalls. Also, the back end is not as user-friendly as other solutions like IBM QRadar. The technical support is ...
What do you like most about LogRhythm SIEM?
I find LogRhythm's log management capabilities to be beneficial.
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
LogRhythm NextGen SIEM, LogRhythm, LogRhythm Threat Lifecycle Management, LogRhythm TLM
 

Overview

 

Sample Customers

Hedgetec, Geiger
Macy's, NASA, Fujitsu, US Air Force, EY, Abbott, HD Supply, SAB Miller, UCLA, Raytheon, Amtrak, Cargill
Find out what your peers are saying about Check Point Security Management vs. LogRhythm SIEM and other solutions. Updated: December 2024.
823,875 professionals have used our research since 2012.