User Reviews of Check Point Security Management & LogRhythm SIEM

Updated April 2024

Would you like to learn about products from people using them now? Simplify your research with trusted advice from people like you.

Download our FREE report comparing Check Point Security Management and LogRhythm SIEM based on reviews, features, and more!

Where should we email your report?






Check Point Security Management review

Ozan Durmus
Ozan Durmus
Senior Information Security Specialist at AKBANK TAS
Good documentation and proxy support with a helpful community available for...
It's useful that we can find unused objects. This helps us to get rid of unused objects in our database, Proxy support is valuable for us. We can apply centralized proxy settings to get additional databases when we need them. Revision history and detailed audit log is a good feature with this we can always feeling safe if somethings go...
LogRhythm SIEM review

Joseph W.
Joseph W.
System Administrator at GOLDENWEST FEDERAL CREDIT UNION
Has pre-built pieces for third party vendors and does not take a long time to...
One of the main features that I like about LogRhythm SIEM is that there are a lot of pre-built pieces. Like with our AV, we didn't have to tell it how to read the logs; they already had it pre-made. So, we essentially just had to follow their guide to get the logs imported in and set up some rules for it. We've only had to manually create...

Since 2012, we've had 767,847 professionals use our research.

As seen in