Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs USM Anywhere comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
9th
Average Rating
8.8
Number of Reviews
61
Ranking in other categories
Advanced Threat Protection (ATP) (14th), Threat Intelligence Platforms (4th)
USM Anywhere
Ranking in Log Management
34th
Average Rating
8.4
Number of Reviews
114
Ranking in other categories
Security Information and Event Management (SIEM) (31st), Endpoint Detection and Response (EDR) (51st), Compliance Management (11th)
 

Mindshare comparison

As of November 2024, in the Log Management category, the mindshare of Check Point Security Management is 0.5%, down from 0.8% compared to the previous year. The mindshare of USM Anywhere is 0.6%, down from 1.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
 

Featured Reviews

reviewer06814135 - PeerSpot reviewer
Oct 12, 2023
Great DDoS protection, high availability, and useful firewall rule implementation
We use the product as a primary gateway firewall for all offices at different locations.  We have deployed their high-end firewall UTMs to medium business grade devices 1400 series. They are easy to manage either centrally or as separate devices. We are using them for Network security including…
Omer Jamil - PeerSpot reviewer
Jan 16, 2024
An easy-to-deploy tool that needs to improve its vulnerability scanning feature
In my company, we use the solution in our security operation center to monitor the client environment and as a solution that provides us with continuous monitoring ability The benefits experienced by our company from the use of the solution stem from the fact that it has been working pretty well…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The compliance is great."
"The control is granular, so you can set policy profiles for different organizational profiles."
"We can easily push the policies to any of our gateways."
"This solution is easy to install and deploy. It is also user-friendly."
"The layered architecture is really understandable and easy to use."
"The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as TLS violations or content violations."
"We love the ability to monitor performance in real-time, and gather critical information about network flows and traffic."
"Regarding the tool's valuable features, I would say that Check Point is a very accessible and fast tool, especially when dealing with logs for the first time."
"The most valuable feature in AT&T AlienVault USM is the reporting."
"I can easily check (in one place) all the logs and data in relation to attacks. It also gives me an overview if a server is not configured properly."
"It is my "security person" looking at irregularities and letting me know when something has occurred."
"The asset management functionality (active and passive scans) is also really important. You can't protect what you do not know about, so having an inventory of all your devices and software is critical to a security management program."
"SIEM log collection is great, and all of the rules that support updates with maintenance."
"AT&T AlienVault USM is good for ELK Stack, the user experience is great because of its architecture. The ELK has a great performance and it has very good speed in the search and Kibana. Additionally, the visuals and dashboards and very nice and customizable."
"It brought our logs into one place for review and set up alarms based on changes we were missing due to lack of having one place for everything to go."
"In terms of monitoring, my best feature would be the monitoring of components across the network. It monitors the respective nodes and any new node that comes onto the network and provides reports. The reporting dashboards are really helpful for management in terms of making decisions around patch management."
 

Cons

"Support is the main area that they need to improve. Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region. I would like a feature where there is a workflow to provide authorization to some users before they're able to create and apply rules. Such a feature should be integrated with the management. It should not be in the box that comes with it."
"The graphical interface is nice but it is a bit heavy."
"Check Point Tech Support will not assist with new configurations if we encounter any issues during the configuration process."
"There is room for improvement in reliability."
"Even though the platform is simple, and creating security policies is a fairly quick task, creating a bulk of policies at once (ie. for a migration) could be a useful tool. This is probably possible through scripting, however, having an easy-to-use "import CSV" button would be beneficial."
"Some costs are ridiculously high."
"You need some technical expertise to use the solution. I don't think it's accessible to the typical end-user. You need to access the box and use some command lines or the web interface. It would be nice to have a user-friendly dashboard and comprehensive reporting."
"The application filtering and URL filtering could be better."
"Plugins could be better utilized, as some of them do not recognize all logs."
"I've been using it just for my own personal upskilling in terms of how the product works. At the moment, it is pretty straightforward and simple, and it is working how it is supposed to. The feedback would come once it is deployed to customer sites. They'll be using it on a more frequent basis, and that's when the feedback would come in terms of the areas in which they're facing issues or are looking for simplicity."
"The only complex area of the setup was writing the custom scripts."
"The reporting tools are a bit lacking for building reports to give directly to customers, but support has been helpful in giving our requests for new features to the development team and following up with us."
"The other thing is the agent is OSSEC. They needed to create its own agent to help to find threats on the devices that it happens to be installed."
"The reporting is mediocre and is something that needs to be improved."
"The vulnerability reporting needs to have options to be able to sort or customize the output."
"Support can be slow at times, but the quality is high. Posted knowledge base articles could use improvement."
 

Pricing and Cost Advice

"Do the homework because Check Point is rather expensive."
"Price-wise, it is an expensive solution."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"This product can be used for 25 security gateways on a basic license."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"The solution is expensive and there is an annual license."
"The solution is expensive."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"It is affordable, and it also has many features that the premium products such as ArcSight and QRadar have. It is a very good platform for a SIEM solution. Everything is included in the price."
"Do the one month trial and try to work out the kinks during it, as it has free support and service hours."
"It's affordable for most customers."
"So far, it has been a good solution for a tight budget."
"It has good pricing."
"They are a little more expensive than Microsoft."
"We checked out several competitors. For what it can do and the cost, it was the best option!"
"We ran a few PoCs. The price and feature set were the best with AlienVault."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
11%
Government
8%
Security Firm
8%
Computer Software Company
17%
Educational Organization
9%
Financial Services Firm
7%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
To make the tool better, I think we could have some sort of analysis similar to how some products offer information related to social media sentiments. If we could get that kind of assessment, some...
What is your primary use case for Check Point Security Management?
We use the solution for VPN with multifactor authentication, IPS protection, and threat emulation. We have deployed the product in the cloud data center.
What do you like most about AT&T AlienVault USM?
The most valuable feature of the solution is the ease of deployment that it provides to users. The integrations that the product has with third-party applications are useful.
What is your experience regarding pricing and costs for AT&T AlienVault USM?
The price is really variable depending on what tier the customer is subscribing to. I think USM Anywhere recently started a 125, a 250, and then 500 and 1000 tier. So it depends on the organization...
What needs improvement with AT&T AlienVault USM?
The only issue that you need to bypass is the issue with integration with some other log sources, some other application security applications. The issue is still present. The process of collecting...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
AT&T AlienVault USM, AlienVault, AlienVault USM, Alienvault Cybersecurity
 

Learn More

 

Overview

 

Sample Customers

Hedgetec, Geiger
Abel & Cole, Bank of Ireland, Bluegrass Cellular, CareerBuilder, Claire's, Hays Medical Center, Hope International, McCurrach, McKinsey & Company, Party Delights, Pepco Holdings, Richland School District, Ricoh, SaveMart, Shake Shack, Steelcase, TaxAct, Taylor Morrison, Vonage and Zoom
Find out what your peers are saying about Check Point Security Management vs. USM Anywhere and other solutions. Updated: October 2024.
815,854 professionals have used our research since 2012.