Try our new research platform with insights from 80,000+ expert users
Senior Network Engineer at a healthcare company with 10,001+ employees
Real User
Top 5
Unifies security policies and streamlines rule updates across sites
Pros and Cons
  • "Check Point Security Management has positively impacted my organization by providing centralized control, allowing us to manage all security policies and gateways from a single console, reducing complexity and saving time, and by enabling faster policy updates, which allowed quicker roll-out of rule changes across multiple sites, improving agility and reducing configuration errors."
  • "I and my colleagues occasionally report glitches or missing data views with the GUI stability and performance issues, and sometimes SmartConsole crashes."

What is our primary use case?

My main use case for Check Point Security Management is to unify firewall and threat prevention policies across multiple international sites, so I use SmartConsole to streamline rule updates and monitor security events in real-time.

What is most valuable?

The best features Check Point Security Management offers me are unified management console, automated policy management, and real-time monitoring and reporting.

Check Point Security Management has positively impacted my organization by providing centralized control, allowing us to manage all security policies and gateways from a single console, reducing complexity and saving time, and by enabling faster policy updates, which allowed quicker roll-out of rule changes across multiple sites, improving agility and reducing configuration errors.

What needs improvement?

I see areas of improvement for Check Point Security Management such as GUI stability and performance, and simplified firmware upgrades.

I and my colleagues occasionally report glitches or missing data views with the GUI stability and performance issues, and sometimes SmartConsole crashes.

The main things regarding needed improvements are GUI stability and performance, and there is no need to add more.

For how long have I used the solution?

I have been using Check Point Security Management for five to six years.

Buyer's Guide
Check Point Security Management
October 2025
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,778 professionals have used our research since 2012.

What do I think about the stability of the solution?

Check Point Security Management is stable, although sometimes it is not.

What do I think about the scalability of the solution?

Check Point Security Management is scalable.

How are customer service and support?

The customer support for Check Point Security Management is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I did not previously use a different solution before Check Point Security Management.

What was our ROI?

I have seen a strong ROI from using Check Point Security Management through unified policy management, reduced misconfigurations, and faster incident response.

Which other solutions did I evaluate?

I did not evaluate other options before choosing Check Point Security Management.

What other advice do I have?

My advice for others looking into using Check Point Security Management is that if you manage complex or multi-site networks, it is a powerful tool for centralizing control and improving security consistency.

I don't have specific metrics or examples of time saved, fewer errors, or other measurable benefits.

I don't have information regarding pricing, setup cost, and licensing.

My company does not have a business relationship with this vendor other than being a customer.

I was offered a gift card for this review.

On a scale of one to ten, I rate Check Point Security Management an eight.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
Systems Engineer at Service & Computer Industries
Real User
Top 5
The solution provides real visibility and secures the infrastructure effectively
Pros and Cons
  • "It's a reliable solution for security."
  • "There's a lot of logs, and I'm unsure about their validity, however, they take up a lot of space. We had to provision the virtual machine twice."

What is our primary use case?

This is the Wi-Fi documentation. I work with the service, and we are partners with Check Point. One of our clients, Parliament, required an upgrade from physical to virtual implementation. This was my first implementation. We have another client, and the plan is to do something with them this year, although I'm not sure when. I've been involved in some other things, however, this was my first implementation.

What is most valuable?

It's a reliable solution for security without mentioning its importance. We can't work without Check Point since it provides the real visibility needed to manage the environment. You can depend on it, as it assures the environment is well-secured. It's doing great work, and we can't work without SQL. We don't work with any other solution.

What needs improvement?

One case I saw was with the logs, which gave me the transfer and the vibration. There's a lot of logs, and I'm unsure about their validity, however, they take up a lot of space. We had to provision the virtual machine twice. Another reason is that the database was already large thanks to the numerous logs. I'm not sure how they can be managed comprehensively.

For how long have I used the solution?

I have done my first implementation of the solution.

What do I think about the stability of the solution?

Ever since I implemented it, we have not had any complaints from the client side. That is a good sign regarding stability.

How are customer service and support?

Check support was involved during the implementation. We had support during the migration process. The issue was the size of the partition for logs. After the support, we realized we needed to resize. The challenge was with drivers due to the size, and we had not provisioned the partition to the right size. This was resolved with support.

How would you rate customer service and support?

Neutral

How was the initial setup?

We had to determine the specifications required for the security of the virtual machine, such as memory, storage, and network setup. The provisioning of the VM depended on the available resources since the box itself had a lot of memory. Specifications are crucial for the setup, and we needed enough storage. The migration was time-consuming but manageable.

Which other solutions did I evaluate?

With Check Point, I can compare it with Fortinet. Fortinet is a bit lower, while Check Point is on a higher level in terms of visibility and reliability. I've seen recommendations for Check Point over other products.

What other advice do I have?

I would definitely recommend Check Point, especially since our client was already using it. We had considered other options, but Check Point was preferable. The implementation supports an environment with more than one hundred users. 

Overall, I would rate this product a ten out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Check Point Security Management
October 2025
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,778 professionals have used our research since 2012.
Pravir KumarSinha - PeerSpot reviewer
Information Security at Synechron
Real User
Top 5
Helps us secure our organization effectively
Pros and Cons
  • "It's already helped secure our organization effectively."
  • "The tool is cost-effective."
  • "We are not sure if there is a centralized security console available."
  • "We are not sure if there is a centralized security console available. It would be beneficial if all firewalls could be integrated under one management console."

What is our primary use case?

We work with multiple security tools, including network security and information security solutions. Our primary use case includes using Check Point and other tools like CyberArk for privilege access management, Cisco, and WebSight CloudSec.

How has it helped my organization?

The product helps in securing our complete organization. We have not received any alerts that were suspicious, which assures us that it's working as expected.

What is most valuable?

It's already helped secure our organization effectively. That said, the integration of all the firewalls should be centralized, which would make management easier.

What needs improvement?

We are not sure if there is a centralized security console available. It would be beneficial if all firewalls could be integrated under one management console.

For how long have I used the solution?

We have been using the firewall for more than ten years.

What do I think about the stability of the solution?

We are confident in the security solution as we have not faced any alerts that were suspicious.

How are customer service and support?

We have partner support that helps us mitigate vulnerabilities reported by our infrastructure team. Most of the time, we get good support.

How would you rate customer service and support?

Neutral

How was the initial setup?

The first deployment takes two to three days. After setup, maintenance and updates are straightforward.

What's my experience with pricing, setup cost, and licensing?

Since we are using it extensively, we get significant discounts during procurement. The tool is cost-effective.

What other advice do I have?

I'd rate the solution eight out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2751366 - PeerSpot reviewer
Security Support Engineer at a tech vendor with 51-200 employees
Real User
Top 5Leaderboard
User-friendly interface aids troubleshooting but licensing proves challenging
Pros and Cons
  • "I find very useful the central view offered by Check Point Security Management, as you're able to have all your gateways and policy and different policy packages."
  • "Check Point Security Management has experienced some reliability issues, but it depends on VM, appliance, and any other implementation."

What is our primary use case?

My main use case for Check Point Security Management is to troubleshoot or add policy, depending on the situation. It could be both, but mainly troubleshooting. We go and take care of the customer's management and resolve issues, create new configurations, and such.

What is most valuable?

I find very useful the central view offered by Check Point Security Management, as you're able to have all your gateways and policy and different policy packages. The maintenance and addition of new policy is fairly easy. The GUI is also very simple and user-friendly.

The logging feature in Check Point Security Management is effective because the view is one single view and you can have multiple log servers to retrieve the logs from.

What needs improvement?

The needed improvements in Check Point Security Management depend very much on the customer's infrastructure. For example, an appliance has an easier time than someone with VMs. With VMs, there can be multiple issues related to performance.

For how long have I used the solution?

I have been working in my current field for around two years.

What was my experience with deployment of the solution?

Since I mainly work on other customers, Check Point Security Management does not much affect my scenario positively, so I cannot provide specific information about deployment issues.

What do I think about the stability of the solution?

Check Point Security Management has experienced some reliability issues, but it depends on VM, appliance, and any other implementation.

What do I think about the scalability of the solution?

The scalability of Check Point Security Management for a VM depends because you can only enlarge the disk size once and then you probably have to remake it. Also, when you upgrade multiple times, you leave many files that are useless. They are dated, so it's always better to create a new machine every few versions, for example, three or four major versions.

How are customer service and support?

I reach out for help multiple times with Check Point Security Management because many issues are related to the hotfix and known issues or new issues, which we have to work with R&D. The customer support quality varies significantly depending on who you get, what you get, and what the issue is.

I would rate the customer support of Check Point Security Management around a six because recently there's been a decrease in quality.

How would you rate customer service and support?

Which solution did I use previously and why did I switch?

I am not sure if I previously used a different solution before Check Point Security Management.

How was the initial setup?

I am not aware of the specifics regarding pricing, setup cost, and licensing for Check Point Security Management, but as far as I know, licensing is quite expensive.

What about the implementation team?

My company is not a customer for Check Point Security Management specifically, but we are a partner.

What was our ROI?

I am not sure if I have seen a return on investment with Check Point Security Management.

What's my experience with pricing, setup cost, and licensing?

I am not aware of the specifics regarding pricing, setup cost, and licensing for Check Point Security Management, but as far as I know, licensing is quite expensive.

Which other solutions did I evaluate?

I evaluated other options before choosing Check Point Security Management, specifically the Panorama equivalent from Palo Alto Networks.

What other advice do I have?

The challenging part I have experienced with Check Point Security Management has been related to the central licensing. We had some issues where the license got duplicated and it's been a year going around and trying to clean it, but it also made me able to learn multiple things, which included CME and the VSec licensing.

If you have VSec licensing and you add a license that's central, you're going to be able to see it inside the CPMELG file as a VSec common.

I would advise others looking into using Check Point Security Management to put their hands on it. It's easier to learn that way. It's really something you can study, but you're going to be able to know it better when you work on the management itself. At first, people are going to make policy, which is fine. It's the beginning of the CCSA certification. That's the first step.

I was offered a gift card or incentive for this review.

On a scale of 1-10, I rate Check Point Security Management a 7.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Flag as inappropriate
PeerSpot user
Dhanaji Mali - PeerSpot reviewer
Technical Specialist at VDA Infosolutions Pvt. Ltd.
Real User
Top 5
Has reduced configuration errors and helps monitor threats in real time
Pros and Cons
  • "Check Point Security Management has positively impacted my organization because with more than one security gateway in our organization, we are easily able to manage and configure our security gateway with the help of security management."
  • "Check Point Security Management can be improved because for smaller organizations with only a single or a couple of devices, there is no need for the management. They are required to use the management system, which increases costs for smaller organizations."

What is our primary use case?

My main use case for Check Point Security Management is to manage my security gateway.

A specific example of how I use Check Point Security Management with my security gateway is that from the security management, we make changes in our security gateway. It is related to configuration, whether the security policy for the users on NATting, VPN, or security profiles. All this configuration, we push. Any modification needed in our current configuration security gateway, we normally push all this configuration from security management.

What is most valuable?

The best features that Check Point Security Management offers, which stand out to me the most, are logging and monitoring. The monitoring is exceptional as it provides consolidated logs, signals, and any alerts that come from the security gateway in real time.

The logging and monitoring help my team day to day by alerting us if any incident or event occurs, enabling us to detect and prevent threats within seconds.

Check Point Security Management has positively impacted my organization because with more than one security gateway in our organization, we are easily able to manage and configure our security gateway with the help of security management.

What needs improvement?

Check Point Security Management can be improved because for smaller organizations with only a single or a couple of devices, there is no need for the management. They are required to use the management system, which increases costs for smaller organizations. This aspect could be addressed.

For how long have I used the solution?

I have been using Check Point Security Management for more than two years.

What do I think about the stability of the solution?

In my experience, Check Point Security Management is stable as I have not encountered any issues.

What do I think about the scalability of the solution?

Check Point Security Management's scalability is good because it can handle growth easily, but it depends on the model. While I cannot say much on scalability, it is quite stable.

How are customer service and support?

The customer support for Check Point Security Management is supportive, based on my interactions with them.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We did not have any security management from another vendor before using Check Point Security Management.

What was our ROI?

Since using Check Point Security Management, I have seen a return on investment because with multiple gateways, we do not have to invest in multiple engineers. One engineer can handle multiple security gateways from the security management, saving both time and money.

What's my experience with pricing, setup cost, and licensing?

NA

Which other solutions did I evaluate?

Before choosing Check Point Security Management, we evaluated Fortinet.

What other advice do I have?

The solution has saved our time, reduced errors, and made management simpler.

My advice for others looking into using Check Point Security Management is that if anyone wants to save time and resources, they can consider this solution to configure and manage multiple gateways.

I rate Check Point Security Management an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
Technical Architect and consultant at VirginAustralia
Reseller
Top 5Leaderboard
Securely manage and deploy configurations to firewall devices with IPS protection
Pros and Cons
  • "It offers numerous features and blades, including intrusion prevention (IPS) and malware detection. It excels in network security and VPN capabilities, including IPSec VPNs. IPS is particularly powerful due to its signature-based detection, which automatically checks for and identifies malicious software."
  • "Check Point is highly regarded for its effectiveness and the three-layer architecture for security, comprising the client, Security Management, and secure management console, integrated with firewall capabilities."

What is our primary use case?

The main function is to securely manage and deploy configurations to firewall devices and logs through its security management console. We configure and test all settings within the security manager and subsequently push these configurations to the relevant firewall devices.

How has it helped my organization?

Check Point Security Management in cloud environments focuses on securing cloud services and managing traffic within the cloud environment. Network security typically involves managing Layer 3 to Layer 4 services. Access Control Lists are used to secure network access.

What is most valuable?

It offers numerous features and blades, including intrusion prevention (IPS) and malware detection. It excels in network security and VPN capabilities, including IPSec VPNs. IPS is particularly powerful due to its signature-based detection, which automatically checks for and identifies malicious software.

What needs improvement?

Check Point is highly regarded for its effectiveness and the three-layer architecture for security, comprising the client, Security Management, and secure management console, integrated with firewall capabilities. This architecture differentiates it from other security solutions like Palo Alto, Cisco, and FortiGate. Our files are more secure against potential compromises with three layers, as configurations are managed centrally on the Management servers. The SmartConsole facilitates easy configuration and management, aligning with modern automation trends. Integrating Check Point with AI and API security features enhances its effectiveness and user-friendliness. Customizable logs tailored to sources, businesses, and IPs can be automated for delivery via email, ensuring accessibility without needing to log into devices directly.

For how long have I used the solution?

I have been using Check Point Security Management as a partner for ten years.

What do I think about the stability of the solution?

The product is stable. I rate the solution’s stability a ten out of ten.

What do I think about the scalability of the solution?

600 users are using this solution.

I rate the solution’s scalability a ten out of ten.

How are customer service and support?

There are multiple ways to contact Check Point Security Management, such as phone calls, chats, and emails. We receive responses based on the ticket's priority and the business need.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup is straightforward and takes three hours to complete. I rate it a ten out of ten, where one is difficult and ten is easy.

What's my experience with pricing, setup cost, and licensing?

The product is a bit expensive. It has yearly licensing, costing around 48 bucks.

What other advice do I have?

It is very effective nowadays due to its ability to provide feedback from DDoS attacks and man-in-the-middle attacks, which are powerful and useful in today's enterprise scenarios. It integrates with various software APIs and provides web firewalls and security, which are crucial in security. These features protect against DDoS attacks, man-in-the-middle attacks, and other implementation vulnerabilities. It provides security and ensures that our services are available 24/7.

I recommend the solution because it is proactive and easy to use.

Overall, I rate the solution a nine out of ten.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Inside Sales Manager at Digitaltrack Solutions Pvt Ltd
Real User
Top 5
Centralized configuration has saved time and improved security visibility across all gateways
Pros and Cons
  • "The best feature of Check Point Security Management is centralized management and login, making it an easy job for engineers to configure and manage it."
  • "The initial configuration and setup knowledge base document for Check Point Security Management could be upgraded to make it more helpful for configuration reference."

What is our primary use case?

We are using Check Point Security Management to centrally push the configuration to our security gateway, and we are using this solution to upgrade patches and firmware updates to our security gateway devices.

We have upgraded our security gateway from central management using Check Point Security Management, eliminating the need to log in to each security gateway device individually. We simply push the upgrade firmware version from centralized management, and it upgrades from there.

With central management of Check Point Security Management, we track all employees connected to our network to prevent security breaches or issues. All these features can be implemented from centrally management with the help of visibility.

What is most valuable?

The best feature of Check Point Security Management is centralized management and login, making it an easy job for engineers to configure and manage it.

After implementing the management of devices using Check Point Security Management, it became very easy and we are getting full visibility.

Time savings have been significant because with Check Point Security Management, our engineers spend less time managing or configuring the security gateway. We simply log in from central management to push changes to multiple security gateways easily.

What needs improvement?

The initial configuration and setup knowledge base document for Check Point Security Management could be upgraded to make it more helpful for configuration reference.

Apart from the knowledge base improvements needed, everything is very useful and meaningful in Check Point Security Management.

For how long have I used the solution?

I have been using Check Point Security Management for almost three years.

What do I think about the stability of the solution?

Check Point Security Management is stable.

What do I think about the scalability of the solution?

Check Point Security Management is good in terms of scalability. We can add more gateways, and it handles them very easily.

How are customer service and support?

I have had a great experience with the support team of Check Point Security Management. They are supportive and very knowledgeable. When we face technical issues, they are ready to help us.

How would you rate customer service and support?

Positive

What's my experience with pricing, setup cost, and licensing?

Regarding pricing, setup costs, and licensing for Check Point Security Management, we have not faced any challenges. Everything was as per expectation and costing.

Which other solutions did I evaluate?

We evaluated Fortinet FortiManager before choosing Check Point Security Management.

What other advice do I have?

Anyone looking for a centralized management solution can consider Check Point Security Management as one of the most valued solutions that will really help them to centrally manage all security gateways. I rate Check Point Security Management nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Flag as inappropriate
PeerSpot user
Mohit Shah - PeerSpot reviewer
Network Security Engineer at Digitaltrack
Real User
Top 5
Centralized management has improved visibility and simplified configuration across multiple devices
Pros and Cons
  • "Once we deployed Check Point Security Management, the manageability and the reporting capabilities made our job easier."
  • "For smaller organizations, the pricing of Check Point Security Management can be more reasonable."

What is our primary use case?

We are using Check Point Security Management to manage multiple Check Point next-generation firewalls, enabling all these firewalls to be managed from the security management. For any configuration in the firewall, we manage it in Check Point Security Management console, where we configure policies, new object creation, services, ports configuration, or any VPN configuration, and we push all the configuration from the security management.

What is most valuable?

The best features Check Point Security Management offers in my experience are the user interface and the logging service.

The user interface of Check Point Security Management is very understandable, and users can easily configure it. Additionally, every activity or traffic flow from our network gets logged in our security devices.

Once we deployed Check Point Security Management, the manageability and the reporting capabilities made our job easier. We are getting better visibility, and based on this visibility, we configure the policies. Since implementing Check Point Security Management, it has saved our time, and the configuration and troubleshooting processes are easy.

What needs improvement?

For smaller organizations, the pricing of Check Point Security Management can be more reasonable.

For how long have I used the solution?

I have been using Check Point Security Management for more than three years.

What do I think about the stability of the solution?

Check Point Security Management is stable and I have not experienced any downtime or reliability issues.

What do I think about the scalability of the solution?

Check Point Security Management can easily handle the organization's growth, but it will depend on the model.

How are customer service and support?

I have a great experience with the customer support team of Check Point Security Management.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I did not previously use a different solution before Check Point Security Management.

What other advice do I have?

For any organization looking for centralized management of security, I consider Check Point Security Management a good solution. Apart from the pricing, everything about Check Point Security Management is perfect. I rate Check Point Security Management as nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.
Updated: October 2025
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.