Try our new research platform with insights from 80,000+ expert users
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Good centralization, user-friendly, and offers good flexibility
Pros and Cons
  • "It provides for capabilities and has allowed us to be more scalable."
  • "In the future, I would like the platform to be able to integrate or manage appliances or third-party equipment."

What is our primary use case?

When having multiple branches, there is the need to be able to manage several branches centrally to meet internal and external regulatory standards that become part of important criteria to manage security. 

Due to the number of branches that we must protect and safeguard, we were looking for a solution that would allow us to centralize simple and fast management that is as scalable as possible.

How has it helped my organization?

The Check Point R80 service has allowed us to unify and centralize the security policy. This makes us faster and more flexible when making a change in any of our branches. It's one of the friendliest services that can be managed and remains important in nature to our bottom line. It allows all administrators to understand and manage the communication between different sites, for example. Additionally, we have integrated these features with others that could also be used as security measures or MFA services.

What is most valuable?

One of the most important features, and one that I see as having organizational value, is the ability to enable services or communications that can be integrated with third parties. We can add additional layers of security to logins or configuration startups that we did not have before. 

It provides for capabilities and has allowed us to be more scalable. We now have greater management flexibility and the possibility to configure and connect to different branches. It has given us better centralization with greater features and security benefits.

What needs improvement?

In the future, I would like the platform to be able to integrate or manage appliances or third-party equipment. That would give us a management solution that is able to adapt to the technological changes that we have today. 

Maybe we could see if the brand or the services become commercial allies of other brands. I know that it is something that is requested a lot, however, better integration could be beneficial for the market and for users when purchasing a service in the market.

Buyer's Guide
Check Point Security Management
June 2025
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for three years.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Erick Chinchilla Mena - PeerSpot reviewer
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Real User
Good antivirus services and a fast installation with centralized management
Pros and Cons
  • "One of the most outstanding characteristics of its centralized administration is its great computing power."
  • "I would like it to be the administrator of equipment or Next Generation firewalls (which have to be managed on this platform) and to be able to manage other services (like Harmony) that also belong to Check Point."

What is our primary use case?

We wanted a centralized administration console to allow us to manage more than one team inside or outside our organization. As a result of this need, we were looking for solutions that could complement us and provide effective and functional management of more than one team inside or outside the organization. 

It was then that we came across and used Check Point, a solution that allows us to integrate and manage all these teams from one place. Check Point offered us not only a centralized administration, but it also offered us and gave us added value in different services and features that can be integrated into the centralized administration platform.

How has it helped my organization?

Check Point came to give additional value to us as administrators and our organization. It allowed us to integrate more than one characteristic service under the same administration platform, such as antivirus services, real-time emulation services, and real-time detection, characteristics that really give additional value in a centralized management console being a console and also a strategic ally in our organization. These characteristics tell us that it is not only a service to centralize the administration - it is also a service designed to implement and add value to the security of any company.

What is most valuable?

One of the most outstanding characteristics of its centralized administration is its great computing power. The ease of being able to integrate more than one computer and manage and orchestrate them simultaneously and individually creates security layers for each one of them or different approaches based on the needs of the branches. We have an installation that is fast with an execution that is simple. It is easy to manage what each organization needs. 

What needs improvement?

I would like it to be the administrator of equipment or Next Generation firewalls (which have to be managed on this platform) and to be able to manage other services (like Harmony) that also belong to Check Point. We'd like to be able to manage them from the same platform. Although they are within the same portal right now, they are not managed in the same way nor are they from the same teams. It could be a very innovative future integration and will help to centralize this section while having the characteristics under the same management.

For how long have I used the solution?

I've used the solution for about a year.

What do I think about the stability of the solution?

It is very stable lately. We've seen that the updates have made the solution apply changes faster and find it is more complete.

What do I think about the scalability of the solution?

The platform has somewhat complex scalability. That said, it is still efficient - mainly when we have management or administration in what is known as HA or cluster.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Security Management
June 2025
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Good centralization, rules management, and automation
Pros and Cons
  • "Check Point Security Management has a great feature that allows you to automate the request of the automated server."
  • "The web administration tool that allows administration in the browser must be developed even more."

What is our primary use case?

One of our company's priorities was to have centralization of all the equipment in a single firewall. With the tools provided by Check Point, we were able to achieve it, and in this way we were able to centralize all the records.

With this implementation, we were able to make more centralized management and of all the rules. It was very comfortable to be able to configure them and manage them and thus be able to make the whole implementation more orderly and be able to carry out our organization along a good path of security administration

How has it helped my organization?

Check Point Security Management came to help us a lot. With this implementation, we were able to generate a firewall rule centralization and management. This helped our IT department to have an order in security and thus be able to centralize it.

By having this implemented, our facilities' security has improved a lot since both employees and external users are audited before entering the network through Check Point Security Management and the rules that make these security filters possible.

What is most valuable?

Check Point Security Management has a great feature that allows you to automate the request of the automated server. This helps us reduce the administrative effort of the IT department and thus give priority to other things like the security of the company or with the characteristic It provides us with centralization, which helps us with management.

The SmartConsole has provided us with excellent help with the application. It communicates with the administrator and allows us to create policies and also look at the traffic log.

What needs improvement?

The web administration tool that allows administration in the browser must be developed even more. When one tries to enter the panel, the loading delays us. 

They can also implement version updating. 

Another feature that could be improved is the export of configurations to .CSV. This would further simplify the management and compliance with rules.

For how long have I used the solution?

This solution has been used for approximately two year in the company.

What do I think about the stability of the solution?

The solution has excellent stability.

What do I think about the scalability of the solution?

It is quite a scalable product.

How are customer service and support?

The support experience has not been very good. We have had some problems with cases and meetings coordination.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

There was no type of tool that would supply these qualities in the company previously.

How was the initial setup?

The installation is easy. It is plug-and-play. However, the configuration must be done carefully.

What about the implementation team?

The implementation was handled with the help of an engineer who had prior knowledge of the product. 

What was our ROI?

The ROI is there. Making an investment in security is always a very good idea.

What's my experience with pricing, setup cost, and licensing?

Check Point offers a good price for its products. It is worth making the investment since this can prevent vulnerabilities.

Which other solutions did I evaluate?

Check Point was always our first option in terms of product choice. 

What other advice do I have?

It is an excellent tool to implement in the organization.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
LucianoMiguel - PeerSpot reviewer
Security Consultant at a consultancy with 501-1,000 employees
Real User
Top 5
A highly accessible and fast tool that provides a very good technical support
Pros and Cons
  • "Regarding the tool's valuable features, I would say that Check Point is a very accessible and fast tool, especially when dealing with logs for the first time."
  • "I guess it lacks in providing visibility of the many incidents."

What is our primary use case?

I use it for managing ten clusters in our on-premise environment. With this kind of management, it's possible to question its policy and change many configurations in the files. With its management, we got all the logs from the environment. With Check Point Security Management, we get the benefits of deploying the configuration.

How has it helped my organization?

Owing to the availability of many kinds of incidents, I can say that the solution has served to improve my organization.

What is most valuable?

Regarding the tool's valuable features, I would say that Check Point is a very accessible and fast tool, especially when dealing with logs for the first time. It is a perfect solution for me.

What needs improvement?

From the Check Point Security Management solution, it's possible to get the situation of my clusters. I guess it lacks in providing visibility of the many incidents. Hence, the visibility of incidents is an area where I want the solution to improve.

For how long have I used the solution?

I have been using Check Point Security Management since 2005, so I have used it for maybe twenty years. Also, I am using Check Point Security Management E84.20.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a ten out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a ten out of ten.

How are customer service and support?

The solution's technical support is very good. Hence, I rate the technical support a ten out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The solution's initial setup was easy.

What was our ROI?

It took a year to see a return on investment. I did experience a return on investment using the solution.

What's my experience with pricing, setup cost, and licensing?

Price-wise, it is an expensive solution.

What other advice do I have?

I recommend the solution to those planning to use it.

I rate the overall product between nine to ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
It gives us complete visibility into our security operations, allowing administrators to identify and address problem areas, reduce unnecessary costs, and improve efficiency
Pros and Cons
  • "Security Management gives us complete visibility into our security operations, allowing administrators to identify and address problem areas, reduce unnecessary costs, and improve efficiency. It offers detailed reports on network usage and security, which helps my company to monitor and control its security expenses."
  • "Check Point's hybrid cloud integration needs significant improvements. These resources need to evolve as data transfers to the cloud increase, so hybrid cloud models are easier to implement. Better hybrid cloud integration would improve how we manage our security logs and provide our administrators with a low-cost solution that enables them to meet all our essential requirements."

What is our primary use case?

We needed a solution that had the things required to keep the company secure, like confidentiality, centralization, and a range of technological services. 

There weren't many other leading solutions that allowed us to achieve our goal of centralizing most security resources in one place to achieve rapid, unified management and control of our assets, achieve our annual goals, and provide the best service. 

How has it helped my organization?

Security Management gives us complete visibility into our security operations, allowing administrators to identify and address problem areas, reduce unnecessary costs, and improve efficiency. 

It offers detailed reports on network usage and security, which helps my company to monitor and control its security expenses. 

What is most valuable?

Many excellent solutions can be plugged into Security Management to help us prevent threats and manage network security, such as the firewall. The firewall is one of the most powerful because it enables us to guard against attacks and threats on our perimeter in real-time and centrally manage everything to maintain a robust security posture. 

What needs improvement?

Check Point's hybrid cloud integration needs significant improvements. These resources need to evolve as data transfers to the cloud increase, so hybrid cloud models are easier to implement. Better hybrid cloud integration would improve how we manage our security logs and provide our administrators with a low-cost solution that enables them to meet all our essential requirements. 

For how long have I used the solution?

I have used Securit Management for a year.

What do I think about the scalability of the solution?

Check Point Security Management is highly scalable. It can adapt to the changing needs of your business, allowing your business to maintain a set spend without going over it annually.

What other advice do I have?

I rate Check Point Security Management eight out of 10. 

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1855164 - PeerSpot reviewer
Network Engineer at CMA CGM
Real User
Good centralized management and monitoring with helpful templates
Pros and Cons
  • "We are now able to monitor the different VPN communities in real-time."
  • "We would like to improve the upgrade process in order to do mass upgrades to firewalls and to be able to upgrade target firewalls at the same time."

What is our primary use case?

We are managing Check Point firewalls worldwide, and establishing VPNs between the main data centers in geographic regions and the other agencies worldwide.

We also establish VPNs between agencies and customers depending on the need. Several different VPN communities are used. We also establish VPNs with customers and partners with different firewall brands (Cisco, Fortinet, Juniper, etc.).

We manage security policies for more than 300 hundred Check Point firewalls by using security policy templates and models.

How has it helped my organization?

Check Point Security Management has improved the way to manage several VPN communities depending on the needs.

We now have the ability to centralize the management and administration of about 300 Check Point firewalls all over the world. We are now able to interconnect easily those firewalls by establishing VPN communities.

We are now also able to monitor the different VPN communities in real-time.

We can use a security policies template to apply to our 300 firewalls and this is really time-saving.

What is most valuable?

The ability to easily mount VPN between firewalls, depending on the needs (star, meshed, or combined architecture) and depending on the type of firewall has been helpful.

We appreciate the fact that we can monitor the version of the managed firewalls in order to plan the firewall upgrades over time.

I like that I have the ability to apply a security policy model and template to many firewalls, depending on the firewall usage and architecture (DMZ firewall, LAN firewall, etc.).

We also like the way we can monitor the firewall traffic and we use this feature very often to troubleshoot user traffic.

What needs improvement?

We would like to improve the upgrade process in order to do mass upgrades to firewalls and to be able to upgrade target firewalls at the same time.

I would like to be able to use Check Point Security Management in a way where it is hosted on the cloud. I'd like secured Security Management directly reachable from wherever you are with no need to install the Check Point client software on the laptop.

I would also like to have the ability to easily export the Check Point security policies in order to exploit the data in other applications and have more compatibility with other applications.

For how long have I used the solution?

I've used the solution for 12 years.

What do I think about the stability of the solution?

The solution is highly stable.

What do I think about the scalability of the solution?

The solution is quite scalable.

How are customer service and support?

They have good support that is reactive.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I also use Fortinet due to Check Point legal restrictions. Check Point is banned in some countries.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

We implemented it through a vendor team with a very good level of expertise.

What was our ROI?

We have a good ROI.

Which other solutions did I evaluate?

We also looked into Palo Alto, Fortinet, and Cisco.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Associate Consult at Atos
Vendor
Great Log monitoring and alert configuration with helpful technical support
Pros and Cons
  • "The SSL VPN monitoring based on users and tunnel monitoring are great value-added features present in the management console."
  • "SD-WAN functionality could be added."

What is our primary use case?

We use the solution for a distributed lean IT environment where there's a need to monitor logs, threats, and events, or requires configuring security policies within a single dashboard.

It's great for customers who are searching for an upgraded top to bottom yet simple and improved log management solution. In such cases, Check Point Management works perfectly.

Wherever we have provided such a solution, it has become very easy for IT administrators to manage not only a single location but also geographically distributed workplaces.

It works similarly to other management software in the industry, but Check Point is far beyond all others due to its management log monitoring functionality.

How has it helped my organization?

After integration with the R80 series, Check Point has made most organizations become relatively secure as configuration with security policies, IPS, and log management extend to the maximum ability.

Previously, we needed to monitor all logs related to network traffic and threats and had to audit logs in different dashboards which sometimes felt time and memory consuming.

With the R80 management consoles, all tasks become very easy - starting from gateway management, log monitoring, IPS configuration, global properties configuration, etc.

What is most valuable?

Some of the great aspects of the solution include:

1. Smart Event is a great feature of the Check Point management console. It gives a complete graphical view of more than a year of traffic flow including botnet traffic, malicious host present in-network, compromised hosts, and many more.

2. Object (based on IP, hostname, domain name) configuration.

3. Application and URL filtering configuration.

4. Log monitoring and alert configuration.

5. IPS configuration with improved performance.

6. Applying filters based on source, destination, port, application, etc. which is easy compared to all other vendors in the market.

7. Managing clustering for gateways - including their live health check performance - can be done on the dashboard itself.

8. The SSL VPN monitoring based on users and tunnel monitoring are great value-added features present in the management console.

What needs improvement?

The solution could be improved in these ways:

1. In order to work the management console properly we're required to have more memory and CPU on the system where we need to install a setup.

2. Due to the large size of logs generated for daily traffic, even when old logs purging is enabled, we need to delete old logs manually or else it causes errors while publishing policies which slow down the process.

3. SD-WAN functionality could be added.

4. The required license addition for every blade is a bit of a complicated task for normal IT admins to understand.

For how long have I used the solution?

I've used the solution for more than four years.

What do I think about the stability of the solution?

Stability is always improving day by day with Hotfixes they are releasing.

What do I think about the scalability of the solution?

We can scale up to a maximum limit.

How are customer service and technical support?

The technical support is very knowledgeable.

Which solution did I use previously and why did I switch?

We have good relations with Check Point. This is the main reason we have always preferred it. The technical support offered by Check Point is always a top priority.

Customer from Sophos to Check Point and ASA to Check Point has migrated to our centralized management from Check Point.

How was the initial setup?

The initial setup is straightforward, however, it can get a little complex for migration from another vendor to Check Point.

What about the implementation team?

We had the assistance of vendor support during the implementation.

What's my experience with pricing, setup cost, and licensing?

Check Point licenses work very differently compared to other vendors. We need to purchase each blade in order to make it work, but we can easily obtain a trial (evaluation) license from Check Point to get visibility for the blade.

Check Point tries to maintain relationships with customers and they try to match their price with customer expectations.

Which other solutions did I evaluate?

Palo Alto is most preferred NGFW compared to Check Point, due to having a large market share.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1626507 - PeerSpot reviewer
Senior Infrastructure Services Specialist at St.George Bank Limited
User
Easy to set up with great support and good central management
Pros and Cons
  • "The solution is ideal for use and deployment in a large infrastructure environment."
  • "If the SmartView monitor can be integrated in the R80.40 and R81 versions, that would be ideal in understanding the trends and graphs of how traffic is observed hitting the different Check Point Firewall Gateways that the Security Management controls."

What is our primary use case?

As part of the Bank's Network Security Infrastructure team, it is our responsibility to manage different security products and devices that lay the foundation of the Bank's Security infrastructure network. Part of that responsibility also includes the implementation and policy update request arising from different business and support teams to make sure that application services comply with the security standards to protect all services of the bank and maintain reliability of the services across environment.

With a centralized Check Point Security Management solution, it makes it easier for our day-to-day operations to manage all Security Gateway Firewalls across the bank.

How has it helped my organization?

The Check Point Security Management has improved the management of all our Security Check Point Gateway Firewalls across the bank. 

With Security Management we are able to simplify our response and support for all our security network devices, which, compared to other products that need to be managed individually, the Check Point solution is far better and less daunting. 

The Security Management also includes the management of logs that is far more efficient, as it provides all the needed information required to investigate and understand how the gateways are accepting or blocking traffic from the gateways.

What is most valuable?

The Main Domain Log Management Server is what I find to be the most valuable feature for the Security Management of our environment. 

With the Main Domain Log Management Server, support teams are able to check and verify the information required in order to determine if any traffic is getting blocked or denied due to specific policy rule implementation, or even identify any traffic getting spoof or any other related events on the gateways. 

It has a central management log server that helps us to easily identify faults and issues in the environment, especially during outages and incidents during the implementation of policy rules.

What needs improvement?

It would be great if the SmartView Monitor could become integrated into the SmartView Console Platform. As it stands, performing a smart view monitor will still open the old R77 SmartView monitor session, which is a bit flaky and slow. If the SmartView monitor can be integrated in the R80.40 and R81 versions, that would be ideal in understanding the trends and graphs of how traffic is observed hitting the different Check Point Firewall Gateways that the Security Management controls. It will also help support teams to identify capacity limitations and have a foresight of what's happening in the environment at any given point in time.

For how long have I used the solution?

I've been using the solution for 4 Years.

What do I think about the stability of the solution?

The solution is ideal for use and deployment in a large infrastructure environment.

What do I think about the scalability of the solution?

The solution is very efficient. You can add more gateways in the environment and manage on the same management server as it has a centralized design.

How are customer service and technical support?

We have diamond support and they are very helpful and detailed during explanations for any issues we are facing. The diamond support that we get definitely provides full life cycle support. It brings reliability to the product when you have great support from Check Point.

Which solution did I use previously and why did I switch?

At the moment, we have a co-existing infrastructure with other security network devices, and we can definitely see the benefit of having the Check Point Security Management application in our infrastructure.

How was the initial setup?

The setup was straightforward as the SmartConsole associated with the Security Management is GUI-friendly and anyone can easily access and manage it.

What about the implementation team?

One of the Professional Service members we work with is very attentive to detail and ready to support our team during difficult times - including the implementation and consultation of the Check Point Products. The professional service on offer is really great as you do not often get someone from a vendor that knows the inside and out of the product dedicated to your own infrastructure.

What's my experience with pricing, setup cost, and licensing?

I would advise others that it's definitely a great investment to have Security Management across your infrastructure.

Which other solutions did I evaluate?

We have other options with other vendors such as Juniper, with their Security Director, and JSpace, but nothing can compare with how the Check Point Security Management performs.

What other advice do I have?

If you have a manageable security infrastructure, the cost, pricing, or licensing will be far outweighed by the reliability and stability of how a properly managed environment is.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.