Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Wazuh comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 12, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.1
Check Point Security Management yields high ROI through reduced incidents, time savings, ease of use, and improved financial performance.
Sentiment score
3.5
Wazuh offers rapid detection and response, reducing costs and ensuring high ROI for small to medium businesses without security compromises.
 

Customer Service

Sentiment score
6.8
Check Point Security Management services are praised for expertise and rapid responses, but some note regional inconsistencies and delays.
Sentiment score
4.3
Wazuh's support is praised, but response times vary; satisfaction ranges from 7 to 9 out of 10.
We have partner support that helps us mitigate vulnerabilities reported by our infrastructure team.
The challenge was with drivers due to the size, and we had not provisioned the partition to the right size.
There is no dedicated technical support for Wazuh as it is open source.
The documentation is good and provides clear instructions, though it's targeted at those with technical backgrounds.
We use the open-source version of Wazuh, which does not provide paid support.
 

Scalability Issues

Sentiment score
8.1
Check Point Security Management is scalable and efficient, though complex environments may present challenges despite enhancements like Quantum Maestro.
Sentiment score
7.4
Wazuh is scalable and adaptable but requires technical expertise for setup and may struggle with massive data handling.
It can accommodate thousands of endpoints on one instance, and multiple instances can run for different clients.
Scalability depends on the configuration and the infrastructure resources like compute and memory we allocate.
 

Stability Issues

Sentiment score
8.1
Check Point Security Management is stable and reliable, with some variability in performance, requiring regular maintenance and updates.
Sentiment score
7.0
Wazuh is generally stable and reliable for small to mid-level businesses, though updates and configuration errors can cause issues.
The stability of Wazuh is largely dependent on maintenance.
The stability of Wazuh is strong, with no issues stemming from the solution itself.
 

Room For Improvement

Check Point Security Management needs usability improvements, easier upgrades, better third-party integration, and updated support and documentation.
Wazuh needs scalability, user interface improvements, better AI, cloud integration, Unix support, and efficient threat detection features.
We had to provision the virtual machine twice.
The integration modules are insufficiently developed, necessitating the creation of custom integration solutions using tools like Logstash and PubSub.
An issue I noticed is with tag values in certain rules not functioning properly.
There is room for improvement by integrating more AI into Wazuh.
 

Setup Cost

Check Point Security Management offers flexibility and effectiveness despite high costs, justifying its price for comprehensive protection.
Wazuh provides cost-effective, open-source security with free software but may incur costs for support, storage, and Wazuh Cloud enhancements.
Since we are using it extensively, we get significant discounts during procurement.
Totaling around two lakh Indian rupees per month.
Since Wazuh is open source, the pricing for support could be applicable to medium-sized companies without much issue.
 

Valuable Features

Check Point Security Management offers comprehensive features, centralized control, and user-friendly tools for effective, scalable, and secure network management.
Wazuh provides comprehensive security features, scalability, and cost-effectiveness, supporting diverse environments and regulatory compliance with strong community support.
We can't work without Check Point because it provides the real visibility needed to manage the environment.
It's already helped secure our organization effectively.
Wazuh is a SIEM tool that is highly customizable and versatile.
Wazuh's most valuable features include file monitoring and compliance reporting, which do not require excessive costs.
We found the MITRE framework mapping and the agent enrollment service to be the most valuable features of Wazuh.
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
9th
Average Rating
9.0
Reviews Sentiment
7.3
Number of Reviews
63
Ranking in other categories
Advanced Threat Protection (ATP) (15th), Threat Intelligence Platforms (5th)
Wazuh
Ranking in Log Management
1st
Average Rating
7.4
Reviews Sentiment
6.3
Number of Reviews
46
Ranking in other categories
Security Information and Event Management (SIEM) (2nd), Extended Detection and Response (XDR) (3rd)
 

Mindshare comparison

As of March 2025, in the Log Management category, the mindshare of Check Point Security Management is 0.4%, down from 0.7% compared to the previous year. The mindshare of Wazuh is 15.0%, up from 14.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
 

Featured Reviews

Ozan Durmus - PeerSpot reviewer
Good documentation and proxy support with a helpful community available for troubleshooting
It's useful that we can find unused objects. This helps us to get rid of unused objects in our database, Proxy support is valuable for us. We can apply centralized proxy settings to get additional databases when we need them. Revision history and detailed audit log is a good feature with this we can always feeling safe if somethings go wrong, I'm sure that I can go back the old one. Smart Event is a very good feature. It provides a graphical view of the traffics and provides history. The filter syntax is very good and helps control when we need it.
Sandip_Patel - PeerSpot reviewer
Evaluating robust file monitoring with insights for community support improvements
Wazuh's most valuable features include file monitoring and compliance reporting, which do not require excessive costs. These aspects are vital as they provide alerts for changes and facilitate the monitoring of compliance. The platform is also relatively easy to set up and operate. Reports are straightforward to extract and prove useful for compliance requirements.
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
842,194 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Financial Services Firm
10%
Government
9%
Comms Service Provider
6%
Computer Software Company
16%
Comms Service Provider
8%
University
7%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
One case I saw was with the logs, which gave me the transfer and the vibration. There's a lot of logs, and I'm unsure about their validity, however, they take up a lot of space. We had to provision...
What is your primary use case for Check Point Security Management?
This is the Wi-Fi documentation. I work with the service, and we are partners with Check Point. One of our clients, Parliament, required an upgrade from physical to virtual implementation. This was...
What do you like most about Wazuh?
Integrates with various open-source and paid products, allowing for flexibility in customization based on use cases.
What needs improvement with Wazuh?
There is room for improvement by integrating more AI into Wazuh. It requires constant nurturing, as I have to provide it with code and specific requirements. This maintenance can be quite labor-int...
What is your primary use case for Wazuh?
We use Wazuh as a SIEM solution because it is open source, highly customizable, and continually expanding. Our clients can request various solutions for their issues, which Wazuh is able to address.
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
No data available
 

Overview

 

Sample Customers

Hedgetec, Geiger
Information Not Available
Find out what your peers are saying about Check Point Security Management vs. Wazuh and other solutions. Updated: March 2025.
842,194 professionals have used our research since 2012.