Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Wazuh comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
9th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
62
Ranking in other categories
Advanced Threat Protection (ATP) (14th), Threat Intelligence Platforms (5th)
Wazuh
Ranking in Log Management
2nd
Average Rating
7.4
Reviews Sentiment
6.6
Number of Reviews
45
Ranking in other categories
Security Information and Event Management (SIEM) (2nd), Extended Detection and Response (XDR) (3rd)
 

Mindshare comparison

As of December 2024, in the Log Management category, the mindshare of Check Point Security Management is 0.4%, down from 0.7% compared to the previous year. The mindshare of Wazuh is 17.0%, up from 13.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
 

Featured Reviews

reviewer06814135 - PeerSpot reviewer
Great DDoS protection, high availability, and useful firewall rule implementation
We didn't find any major feature missing or lacking in Check Point products that we used. We'd just like them to continue to improve their products with new features and updates. We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners. The Check Point SandBlast platform could also be merged with the Check Point GAIA platform for a central management console and easier controls.
AKASH MAJUMDER - PeerSpot reviewer
Open-source platform with custom alerting
There are three key strengths of Wazuh that stand out to me. Firstly, Wazuh offers an enhanced HDR version that outperforms the Elastic Stack. Wazuh has achieved this by running a config or a sec in the background, which has improved the XBR for endpoint security significantly. Secondly, Wazuh comes with built-in frameworks, such as the NISC and ISO, that make it easy to comply with various industry standards. We didn't need to configure any custom frameworks for this, as Wazuh had it built in. Lastly, Wazuh has the ability to collect terabytes of data within seconds, which is a crucial feature for modern enterprises dealing with large amounts of data.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The management API is the best new feature for me. It allows us to further automate our customers' automated server ordering."
"The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other."
"It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering."
"We can easily push the policies to any of our gateways."
"The SSL VPN monitoring based on users and tunnel monitoring are great value-added features present in the management console."
"Having the possibility to use Smart Event to check for threats on a broader scale helps after a security incident and also makes it easier to check - instead of looking through different logs."
"With the generation and review of logs, we have verified some vulnerabilities and attempted attacks to generate improvements in our infrastructure and policies to help avoid issues in the future."
"We are now able to monitor the different VPN communities in real-time."
"Wazuh's most valuable features include file monitoring and compliance reporting, which do not require excessive costs."
"It's stable."
"The product's initial setup phase was easy."
"My company implemented Wazuh because it was relatively inexpensive. They could quickly get their hands on it to check a box for some audit and compliance."
"The tool is stable."
"Wazuh is simple to use for PCI compliance."
"Some of the strengths of Wazuh that stand out for us include its scalability when deployed on Azure, its open-source nature, which allows for customization based on our needs, and its compatibility with various security solutions like threat intelligence platforms."
"It has efficient SCA capabilities."
 

Cons

"Some costs are ridiculously high."
"Being a security appliance, there should be the ability for the Security Management server to send email alerts via authenticated email."
"We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners."
"The graphical interface is nice but it is a bit heavy."
"Among the things that I would like in the future is for the solution to have its application on Android and iOS, as many of the administrators have adopted remote administration positions due to what has happened since the pandemic. This would help us to have an easier and simpler administration."
"We would like to improve the upgrade process in order to do mass upgrades to firewalls and to be able to upgrade target firewalls at the same time."
"They need to make a Mac version of the SmartConsole, in my opinion."
"Installing a policy takes a very long time to complete."
"The only challenge we faced with Wazuh was the lack of direct support."
"Integration with Vyara could be better."
"An issue I noticed is with tag values in certain rules not functioning properly."
"Adding the flexibility to integrate various plug-ins or modules into its core system would enhance functionality."
"I have yet to find the same capability in Wazuh to get logs from different sources into the system"
"Its configuration process is time-consuming."
"The support channel is not optimal, and extensive research is required on our part to implement Wazuh effectively."
"It would be great if there could be customization for the decoder portion."
 

Pricing and Cost Advice

"This product can be used for 25 security gateways on a basic license."
"The solution is expensive and there is an annual license."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"Price-wise, it is an expensive solution."
"Do the homework because Check Point is rather expensive."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"The solution is expensive."
"Wazuh is open-source, therefore it is free. You can purchase support for $1,000 a year."
"It is a cost-effective solution."
"My client uses the open-source version of Wazuh."
"Wazuh is a good tool, but the open-source version has scalability limitations."
"The product price is neither too high nor too low."
"Wazuh is open-source, but you must consider the total cost of ownership. It may be free to acquire, but you spend a lot of time and effort supporting the product and getting it to a point where it's useful."
"Wazuh is a cheaply priced product."
"The solution's pricing is very competitive."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
823,875 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
11%
Government
9%
Security Firm
8%
Computer Software Company
16%
University
7%
Comms Service Provider
7%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
We are not sure if there is a centralized security console available. It would be beneficial if all firewalls could be integrated under one management console.
What is your primary use case for Check Point Security Management?
We work with multiple security tools, including network security and information security solutions. Our primary use case includes using Check Point and other tools like CyberArk for privilege acce...
What do you like most about Wazuh?
Integrates with various open-source and paid products, allowing for flexibility in customization based on use cases.
What needs improvement with Wazuh?
I am investigating more about the community support for Wazuh. I can't provide a definitive answer yet. An issue I noticed is with tag values in certain rules not functioning properly. It's unclear...
What is your primary use case for Wazuh?
I am currently evaluating and using Wazuh for file monitoring and compliance reporting. We are in the process of conducting a POC to understand how the rules work. I lead this effort to explore and...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
No data available
 

Overview

 

Sample Customers

Hedgetec, Geiger
Information Not Available
Find out what your peers are saying about Check Point Security Management vs. Wazuh and other solutions. Updated: December 2024.
823,875 professionals have used our research since 2012.