Try our new research platform with insights from 80,000+ expert users
Check Point Security Management Logo

Check Point Security Management Reviews

4.4 out of 5

What is Check Point Security Management?

Featured Check Point Security Management reviews

Check Point Security Management mindshare

As of August 2025, the mindshare of Check Point Security Management in the Log Management category stands at 0.4%, down from 0.5% compared to the previous year, according to calculations based on PeerSpot user engagement data.
Log Management Market Share Distribution
ProductMarket Share (%)
Check Point Security Management0.4%
Wazuh13.2%
Grafana Loki8.4%
Other78.0%
Log Management

PeerResearch reports based on Check Point Security Management reviews

TypeTitleDate
CategoryLog ManagementAug 25, 2025Download
ProductReviews, tips, and advice from real usersAug 25, 2025Download
ComparisonCheck Point Security Management vs WazuhAug 25, 2025Download
ComparisonCheck Point Security Management vs Splunk Enterprise SecurityAug 25, 2025Download
ComparisonCheck Point Security Management vs DatadogAug 25, 2025Download
Suggested products
TitleRatingMindshareRecommending
Wazuh3.713.2%80%48 interviewsAdd to research
Dynatrace4.45.1%95%349 interviewsAdd to research
 
 
Key learnings from peers

Valuable Features

Room for Improvement

ROI

Pricing

Popular Use Cases

Service and Support

Deployment

Scalability

Stability

Review data by company size

By reviewers
Company SizeCount
Small Business24
Midsize Enterprise22
Large Enterprise32
By reviewers
By visitors reading reviews
Company SizeCount
Small Business63
Midsize Enterprise41
Large Enterprise86
By visitors reading reviews

Top industries

By visitors reading reviews
Computer Software Company
11%
Comms Service Provider
8%
Financial Services Firm
8%
Manufacturing Company
6%
Government
6%
University
6%
Healthcare Company
5%
Security Firm
5%
Insurance Company
5%
Performing Arts
4%
Educational Organization
4%
Retailer
3%
Legal Firm
3%
Energy/Utilities Company
3%
Recreational Facilities/Services Company
3%
Transportation Company
3%
Outsourcing Company
2%
Non Profit
2%
Consumer Goods Company
2%
Construction Company
2%
Media Company
2%
Real Estate/Law Firm
2%
Renewables & Environment Company
2%
Pharma/Biotech Company
1%
Leisure / Travel Company
1%
Hospitality Company
1%
Wholesaler/Distributor
1%
Marketing Services Firm
1%
Logistics Company
1%

Compare Check Point Security Management with alternative products

Learn more about Check Point Security Management

Check Point Security Management customers

Related questions

 
Check Point Security Management Reviews Summary
Author infoRatingReview Summary
Leading IT at Tonbo Imaging india Pvt Ltd4.0My main use of Check Point Security Management is as a firewall to secure our IT infrastructure. Its segmentation of devices enhances threat detection. However, frequent firmware upgrades are needed to resolve internet utilization visibility issues. Nonetheless, it provides a good return on investment.
Network Cyber Security Specialist at a tech services company with 51-200 employees5.0I've used Check Point Security Management for years to manage firewalls and logs, enabling faster troubleshooting and improved security, though the system crashes daily. Its log management is unmatched, despite occasional performance and stability issues.
Head of Project Delivery at Absa Group Ltd4.0I believe Check Point Security Management can be improved with sentiment analysis, frequent updates, and community engagement. Despite its cost, it effectively suits our business needs, enhances our IT infrastructure security, and integrates well with AWS.
Senior Network Engineer at a healthcare company with 10,001+ employees4.0I've used Check Point Security Management for over five years to unify security policies across sites. It offers strong centralized control, though GUI stability could improve. Overall, it’s scalable, effective, and delivers a solid return on investment.
Systems Engineer at Service & Computer Industries5.0I implemented Check Point Security Management for a client transitioning from physical to virtual systems. It's crucial for visibility and environment security. However, log management needs improvement as it takes up significant space. I prefer it over Fortinet for reliability.
Information Security at Synechron4.0We use Check Point among various security tools to secure our organization effectively. Centralizing firewall management would ease administration, but we're unaware of a unified console. Integration with tools like CyberArk, Cisco, and WebSight CloudSec is part of our setup.
Security Support Engineer at a tech vendor with 51-200 employees3.5I mainly use Check Point Security Management for troubleshooting and policy tasks; it's user-friendly and effective, though VM performance issues and inconsistent support can be challenging. Licensing is costly, but hands-on experience makes learning easier.
Network Engineering and IS Access at a comms service provider with 5,001-10,000 employees5.0I've used Check Point Security Management for over 13 years to manage 500 firewalls efficiently, appreciating its centralized console and direct upgrade capabilities, though API usability could improve for better automation.