Check Point Security Management is an advanced security management platform for enterprises. The platform integrates all aspects of security. A single platform manages the entire infrastructure, from data centers to private/public cloud deployments.
Product | Market Share (%) |
---|---|
Check Point Security Management | 0.4% |
Wazuh | 13.2% |
Grafana Loki | 8.4% |
Other | 78.0% |
Type | Title | Date | |
---|---|---|---|
Category | Log Management | Aug 25, 2025 | Download |
Product | Reviews, tips, and advice from real users | Aug 25, 2025 | Download |
Comparison | Check Point Security Management vs Wazuh | Aug 25, 2025 | Download |
Comparison | Check Point Security Management vs Splunk Enterprise Security | Aug 25, 2025 | Download |
Comparison | Check Point Security Management vs Datadog | Aug 25, 2025 | Download |
Title | Rating | Mindshare | Recommending | |
---|---|---|---|---|
Wazuh | 3.7 | 13.2% | 80% | 48 interviewsAdd to research |
Dynatrace | 4.4 | 5.1% | 95% | 349 interviewsAdd to research |
Company Size | Count |
---|---|
Small Business | 24 |
Midsize Enterprise | 22 |
Large Enterprise | 32 |
Company Size | Count |
---|---|
Small Business | 63 |
Midsize Enterprise | 41 |
Large Enterprise | 86 |
Check Point Security Management is a reliable and easy-to-use security platform. It integrates all aspects of your security environment to strengthen the security posture without impairing productivity. The system has a layered policy model. This means the security policy can be separated into layers for network segmentation. Different administrators can manage different policies. The policy layer automates the tasks.
The platform is extensible, scalable, and integrates easily with orchestration systems and change management.
Basic Components of the Infrastructure
The smart console offers several advantages. Changes in security policies and logs can be done with a click. You can navigate from an item within a log to the policy. There are also built-in multi-language support and accessibility features.
1. Security Management Server: The server manages security gateways with set security policies and monitors security events on the network.
The automation server is an integrated part of the management server. The API server is active by default on servers with 4 GB of RAM or more and on standalone servers with 8 or more GB of RAM.
The automation server communicates with the management server the same way as the Smart Console. This architecture allows the same validation errors and warnings to be presented when using an automation session.
The same audit logs generated using the Smart Console are also generated using an automation session. If you have a multi-domain environment, there is only one automation server that monitors all the IP addresses of the multi-domain management server.
2. Security Gateway is placed at the edge of the network. It monitors and filters traffic and enforces security policies.
Logging, Event management, and Monitoring
With Check Point Security Management, logging, reporting, event management, and monitoring are integrated. The platform features widgets and chart templates that optimize visibility. One of the best features is the one-click exploration. This simplifies going from a general overview to specific event details.
Benefits of Check Point Security Management
The unified console also means a single policy for users, data, applications, and networks. The granularity control helps accelerate administration processes. This feature, together with automation, is key to achieving reduced operational overhead. Security teams can automate tasks and even create self-service security web portals with the Check Point Security Management platform.
Threat management is fully integrated, with reporting, logging, and monitoring all in one dashboard. This provides full visibility into the security of the network.
Security Management Suite
The Security Management Suite consists of the following modules:
Reviews from Real Users
A Network Security Engineer/Architect at a tech services company says, "The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other."
"The management API is the best new feature for me. It allows us to further automate our customers' automated server ordering," says a System Engineer Network & Security at OTTO GmbH & Co KG.
A Senior Infrastructure Services Specialist at St.George Bank Limited adds that "The solution is ideal for use and deployment in a large infrastructure environment."
Check Point Security Management was previously known as R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management.
Hedgetec, Geiger
Author info | Rating | Review Summary |
---|---|---|
Leading IT at Tonbo Imaging india Pvt Ltd | 4.0 | My main use of Check Point Security Management is as a firewall to secure our IT infrastructure. Its segmentation of devices enhances threat detection. However, frequent firmware upgrades are needed to resolve internet utilization visibility issues. Nonetheless, it provides a good return on investment. |
Network Cyber Security Specialist at a tech services company with 51-200 employees | 5.0 | I've used Check Point Security Management for years to manage firewalls and logs, enabling faster troubleshooting and improved security, though the system crashes daily. Its log management is unmatched, despite occasional performance and stability issues. |
Head of Project Delivery at Absa Group Ltd | 4.0 | I believe Check Point Security Management can be improved with sentiment analysis, frequent updates, and community engagement. Despite its cost, it effectively suits our business needs, enhances our IT infrastructure security, and integrates well with AWS. |
Senior Network Engineer at a healthcare company with 10,001+ employees | 4.0 | I've used Check Point Security Management for over five years to unify security policies across sites. It offers strong centralized control, though GUI stability could improve. Overall, it’s scalable, effective, and delivers a solid return on investment. |
Systems Engineer at Service & Computer Industries | 5.0 | I implemented Check Point Security Management for a client transitioning from physical to virtual systems. It's crucial for visibility and environment security. However, log management needs improvement as it takes up significant space. I prefer it over Fortinet for reliability. |
Information Security at Synechron | 4.0 | We use Check Point among various security tools to secure our organization effectively. Centralizing firewall management would ease administration, but we're unaware of a unified console. Integration with tools like CyberArk, Cisco, and WebSight CloudSec is part of our setup. |
Security Support Engineer at a tech vendor with 51-200 employees | 3.5 | I mainly use Check Point Security Management for troubleshooting and policy tasks; it's user-friendly and effective, though VM performance issues and inconsistent support can be challenging. Licensing is costly, but hands-on experience makes learning easier. |
Network Engineering and IS Access at a comms service provider with 5,001-10,000 employees | 5.0 | I've used Check Point Security Management for over 13 years to manage 500 firewalls efficiently, appreciating its centralized console and direct upgrade capabilities, though API usability could improve for better automation. |