Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Wazuh comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 12, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
9th
Average Rating
9.0
Reviews Sentiment
7.3
Number of Reviews
63
Ranking in other categories
Advanced Threat Protection (ATP) (14th), Threat Intelligence Platforms (5th)
Wazuh
Ranking in Log Management
2nd
Average Rating
7.4
Reviews Sentiment
6.6
Number of Reviews
45
Ranking in other categories
Security Information and Event Management (SIEM) (2nd), Extended Detection and Response (XDR) (3rd)
 

Mindshare comparison

As of February 2025, in the Log Management category, the mindshare of Check Point Security Management is 0.4%, down from 0.7% compared to the previous year. The mindshare of Wazuh is 15.2%, up from 13.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
 

Featured Reviews

Ozan Durmus - PeerSpot reviewer
Good documentation and proxy support with a helpful community available for troubleshooting
It's useful that we can find unused objects. This helps us to get rid of unused objects in our database, Proxy support is valuable for us. We can apply centralized proxy settings to get additional databases when we need them. Revision history and detailed audit log is a good feature with this we can always feeling safe if somethings go wrong, I'm sure that I can go back the old one. Smart Event is a very good feature. It provides a graphical view of the traffics and provides history. The filter syntax is very good and helps control when we need it.
Sandip_Patel - PeerSpot reviewer
Evaluating robust file monitoring with insights for community support improvements
Wazuh's most valuable features include file monitoring and compliance reporting, which do not require excessive costs. These aspects are vital as they provide alerts for changes and facilitate the monitoring of compliance. The platform is also relatively easy to set up and operate. Reports are straightforward to extract and prove useful for compliance requirements.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Check Point Security Management excels over Forti Management in daily operations, policy management, and graphical interface. It is easy to open and edit policies, search within them, and view logs."
"One of the most outstanding characteristics of its centralized administration is its great computing power."
"The fact that everything starts from the same unified management console makes it very easy to integrate new equipment or functionalities once the operator has become familiar with it, as everything will follow similar management or operation mechanisms."
"Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it."
"The intuitive interface also allows new team members to adapt to the technology if they are not familiar with it initially. It doesn't take much for one to familiarize themselves with the product."
"I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation. These allow me to select to whom to do what, and when."
"The reporting system provides real-time insights into the security situation and shows measures that can be taken to protect our data."
"With the generation and review of logs, we have verified some vulnerabilities and attempted attacks to generate improvements in our infrastructure and policies to help avoid issues in the future."
"Wazuh offers an enhanced HDR version that outperforms its competitors."
"Wazuh's most valuable features include file monitoring and compliance reporting, which do not require excessive costs."
"Integrates with various open-source and paid products, allowing for flexibility in customization based on use cases."
"Wazuh's most beneficial features for our security needs are flexibility, built-in rules, integration capabilities, and documentation."
"The solution is easy to maintain."
"The MITRE ATT&CK correlation is most valuable."
"It's very easy to integrate Wazuh with other environments, cloud applications, and on-prem applications. So, the advantage is that it's easy to implement and integrate with other solutions."
"My company implemented Wazuh because it was relatively inexpensive. They could quickly get their hands on it to check a box for some audit and compliance."
 

Cons

"License update and upgrade processes can be made a little easier."
"I've found the solution was a bit unstable."
"It could improve by showing DNS-specific information for connections to unknown public IPs."
"In the future, I would like to see more frequent updates because of the changing security landscape."
"I would like for users to have more control over the platform in the next release. Right now, the system is very central and general requiring new rules to be created that better-suite our requirements."
"The graphical interface is nice but it is a bit heavy."
"Check Point could improve by enhancing the networking in their solution in order to align it with the existing network architecture."
"I would like it to be the administrator of equipment or Next Generation firewalls (which have to be managed on this platform) and to be able to manage other services (like Harmony) that also belong to Check Point."
"One area where Wazuh could use some improvement is in its reporting mechanism, especially for high-level management like CSOs and CEOs."
"The tool doesn't detect anomalies or new environments."
"A lack of certain features creates limitations."
"They need to go towards integrating with more cloud applications and not just OS like Windows and Linux."
"The implementation is very complex."
"An issue I noticed is with tag values in certain rules not functioning properly."
"Integration with Vyara could be better."
"It would be great if there could be customization for the decoder portion."
 

Pricing and Cost Advice

"Do the homework because Check Point is rather expensive."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"The solution is expensive."
"The solution is expensive and there is an annual license."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"Price-wise, it is an expensive solution."
"This product can be used for 25 security gateways on a basic license."
"Wazuh is a good tool, but the open-source version has scalability limitations."
"The product price is neither too high nor too low."
"Wazuh is an open-source tool."
"The solution's pricing is very competitive."
"They have a good pricing strategy for market expansion."
"When I contacted customer care, they mentioned bundling options, that I found to be overall affordable."
"Wazuh has a community edition, and I was using that. It's free and open source."
"We use the free version of Wazuh."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
838,713 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Government
9%
Financial Services Firm
9%
Comms Service Provider
6%
Computer Software Company
16%
Comms Service Provider
8%
University
7%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
One case I saw was with the logs, which gave me the transfer and the vibration. There's a lot of logs, and I'm unsure about their validity, however, they take up a lot of space. We had to provision...
What is your primary use case for Check Point Security Management?
This is the Wi-Fi documentation. I work with the service, and we are partners with Check Point. One of our clients, Parliament, required an upgrade from physical to virtual implementation. This was...
What do you like most about Wazuh?
Integrates with various open-source and paid products, allowing for flexibility in customization based on use cases.
What needs improvement with Wazuh?
I am investigating more about the community support for Wazuh. I can't provide a definitive answer yet. An issue I noticed is with tag values in certain rules not functioning properly. It's unclear...
What is your primary use case for Wazuh?
I am currently evaluating and using Wazuh for file monitoring and compliance reporting. We are in the process of conducting a POC to understand how the rules work. I lead this effort to explore and...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
No data available
 

Overview

 

Sample Customers

Hedgetec, Geiger
Information Not Available
Find out what your peers are saying about Check Point Security Management vs. Wazuh and other solutions. Updated: January 2025.
838,713 professionals have used our research since 2012.