User Reviews of Check Point Security Management & Graylog

Updated April 2024

Would you like to learn about products from people using them now? Simplify your research with trusted advice from people like you.

Download our FREE report comparing Check Point Security Management and Graylog based on reviews, features, and more!

Where should we email your report?






Check Point Security Management review

Ozan Durmus
Ozan Durmus
Senior Information Security Specialist at AKBANK TAS
Good documentation and proxy support with a helpful community available for...
It's useful that we can find unused objects. This helps us to get rid of unused objects in our database, Proxy support is valuable for us. We can apply centralized proxy settings to get additional databases when we need them. Revision history and detailed audit log is a good feature with this we can always feeling safe if somethings go...
Graylog review

Andrey Mostovykh
Andrey Mostovykh
Senior Data Architect at a comms service provider with 51-200 employees
Real-time analysis, easy setup, and open source
We stopped using it for analytics because of its price, and at the moment, we are using it mostly for log centralization. If you use it with high traffic for analytical purposes, as well as for the logs, the infrastructure costs are unbelievable. Graylog is a great product backed by Elasticsearch as the storage and query engine. It is just...

Since 2012, we've had 768,578 professionals use our research.

As seen in