We utilize Check Point Security Management for our daily security operations, including managing firewall rules, reviewing alerts, and generating reports on a weekly basis.
Alert classifications help prioritize critical issues
Pros and Cons
- "The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as TLS violations or content violations."
- "Check Point EDR has room for improvement, especially in the area of Data Loss Prevention where it currently lacks functionality."
What is our primary use case?
How has it helped my organization?
We've integrated Check Point Security Management with some of our business associates' portals for HR, finance, and payroll activities, which are outsourced. Check Point alarms us about any version changes on these sites, allowing us to block unauthorized changes. So far, we haven't encountered any serious incidents that require immediate action. We receive incident reports, but they usually involve blocked or quarantined threats rather than major security breaches. Additionally, our internal management console provides us with alerts, adding another layer of security monitoring.
What is most valuable?
Over the past 1.5 years, we've started monitoring it more regularly, analyzing alerts closely. The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as TLS violations or content violations.
While we use a cloud-based Security Control console, we primarily conduct in-depth analysis of reports on a weekly basis to enhance our security posture.
What needs improvement?
Check Point EDR has room for improvement, especially in the area of Data Loss Prevention where it currently lacks functionality.
I'd also like to see enhancements in content filtering and categorization features.
I would appreciate the ability to restrict forwarding of confidential documents to specific groups, ensuring tighter security measures.
Buyer's Guide
Check Point Security Management
October 2025
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,655 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Check Point Security Management for the past 1.5 years.
What do I think about the stability of the solution?
I would rate the stability 9 out of 10.
What do I think about the scalability of the solution?
I would rate the scalability 8 out of 10.
How was the initial setup?
We faced issues, but with the help of tech support, it was solved. It took almost one week approximately to set the solution through firewall.
What about the implementation team?
We rely on tech support to enhance our capabilities.
We have a small, focused team of four engineers.
What was our ROI?
Currently, we only use Check Point and are satisfied with its benefits in terms of time-saving and security performance, estimating a 30% time savings.
What's my experience with pricing, setup cost, and licensing?
The pricing can be estimated around 3 or 4 out of 10 in terms of expense.
Which other solutions did I evaluate?
I have evaluated another product before Check Point but found the local account manager to be more aggressive.
What other advice do I have?
I would rate the product overall at 8 out of 10, mentioning that while functionalities are there, improvements could be made to make it more user-friendly for laymen, such as incorporating drag-and-drop functionality.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
It Security Engineer at TSYS
Enterprise level scalability and meeting all the PCI guidelines regulating financial market players
Pros and Cons
- "The support is pretty incredible. Check Point has support rep programs that go all the way up to putting one of their own people in your business to help you. Then, they have support programs. If you're an expert, you just need to be able to download updated files and stuff. They have support programs like that, too."
- "There is room for improvement in reliability."
What is our primary use case?
Our use cases are protection infrastructure in a financial corporate environment.
How has it helped my organization?
Check Point firewalls meet all the PCI guidelines that regulate players in the financial market.
What is most valuable?
The support is pretty incredible.
What needs improvement?
There is room for improvement in reliability.
For how long have I used the solution?
I have been using this solution for ten years. I worked from version 840 to 8120.
What do I think about the stability of the solution?
I would rate the stability a six out of ten.
What do I think about the scalability of the solution?
It is very scalable. I would rate the scalability for this solution a ten out of ten.
Which solution did I use previously and why did I switch?
I initially took Cisco training for routers, switches, and firewalls. I did actually work up the Cisco firewalls long enough to convert them to Check Point.
How was the initial setup?
The initial setup was complex. But that was really the fault of Check Point just because we deployed it into the Google Cloud environment, and their environment is a little different.
We have security management deployed on-premises and on the cloud.
What's my experience with pricing, setup cost, and licensing?
The pricing is about par for the enterprise-class firewalls.
Which other solutions did I evaluate?
Palo Alto and Cisco. And the reason for going with this solution was the price. So, with Cisco, it was priced. We actually checked the overall price of the cost of ownership. When you talk about support costs and everything else, was cheaper than Cisco. And with Palo Alto, also had reliability issues that could not be overcome by their support.
What other advice do I have?
I definitely recommend it, but unless you're fully trained and experienced on Check Point, you should get the better support program.
Check Point has support rep programs that go all the way up to putting one of their own people in your business to help you. Then, they have support programs. If you're an expert, you just need to be able to download updated files and stuff. They have support programs like that, too. The worst possible situation is if somebody isn't really skilled with the thing and they cheap out on the support program, and they'll just flounder.
Overall, I would rate the solution an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Security Management
October 2025
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,655 professionals have used our research since 2012.
System Engineer at Willson International Limited
Great DDoS protection, high availability, and useful firewall rule implementation
Pros and Cons
- "The firewall cleverly handles such attacks without compromising on performance."
- "We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners."
What is our primary use case?
We use the product as a primary gateway firewall for all offices at different locations.
We have deployed their high-end firewall UTMs to medium business grade devices 1400 series. They are easy to manage either centrally or as separate devices. We are using them for Network security including firewall rules, NATTing, Web application access, IPSec VPN tunneling between offices and cloud services, user VPN clients for access from home, data encryption, anti-malware/anti-virus solutions, and as network gateway devices for routing and DNS.
How has it helped my organization?
We have seen tremendous improvement in the overall security of the organization's IT assets. We performed Pen Tests and External vulnerability audits on our network and we always scored top-rated thanks to Check Point.
Their management portal and firmware are very stable and don't require frequent maintenance. Their IPSec tunneling is very stable, especially with Azure and AWS networks.
Access to detailed network logs in real time helps us decide and take prompt action to block/fix threats.
What is most valuable?
The most valuable aspects of the solution include:
- IPSec VPN Tunneling: they are easy to configure and offer multiple options to set them up with Cloud services and other vendor firewall products over certificates, shared keys etc.
- DDoS Protection: Firewall cleverly handles such attacks without compromising on performance.
- HA and Clustering: Seamless load management and High Availability between nodes of firewall clusters.
- Firewall Rules: You have access to set up rules at a very granular level and all are accessible through the GUI platform as well as over CMDLET.
What needs improvement?
We didn't find any major feature missing or lacking in Check Point products that we used. We'd just like them to continue to improve their products with new features and updates.
We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners.
The Check Point SandBlast platform could also be merged with the Check Point GAIA platform for a central management console and easier controls.
For how long have I used the solution?
I've used the solution for more than ten years.
What do I think about the stability of the solution?
The solution is very stable compared to peers.
What do I think about the scalability of the solution?
The solution is highly scalable.
How are customer service and support?
Technical support is satisfactory, however, it takes some time to escalate your ticket.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did use Sophos and Cisco ASA, however, they were either complicated products to manage or lacked features.
How was the initial setup?
The initial setup wasn't difficult after you attended free platform support sessions by Check Point.
What about the implementation team?
We handled the initial setup in-house.
Which other solutions did I evaluate?
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Has improved response time through real-time monitoring and centralized administration
Pros and Cons
- "Real-time monitoring helps me solve issues, for example, when I have a problem with the VPN; I need to view different traffic and identify different calls about the problem, or when I need to view when I have different user a problem with into others networks or something else."
- "The documentation of Check Point Security Management is not intuitive because it is for advanced technical support, and when I need to deploy different features, it is complicated for junior support or technical personnel."
What is our primary use case?
My main use case for Check Point Security Management is to control my gateways and the other Check Point security tools.
In this case, I use Check Point Security Management for controller, admin, change different topics in my gateways; my gateways are in Azure and this gateway has only a gateway, with no specific controlling because for this I use Check Point Security Management in other service, specifically in Infinity Portal.
I have no additional information to add about how I use Check Point Security Management in my environment, particularly with Infinity Portal or Azure gateways.
What is most valuable?
I love the real-time monitoring feature of Check Point Security Management because when I need to see different problems or block different traffic, I need to use a tool with real-time capabilities for troubleshooting or the other documentations with the real issue.
Real-time monitoring helps me solve issues, for example, when I have a problem with the VPN; I need to view different traffic and identify different calls about the problem, or when I need to view when I have different user a problem with into others networks or something else.
Check Point Security Management positively impacts my organization as it is a great tool for completing the security checkpoints tools, making it possible to create this solution in different sites, for example, in Azure and on-premise, with the same impact or application.
What needs improvement?
The documentation of Check Point Security Management is not intuitive because it is for advanced technical support, and when I need to deploy different features, it is complicated for junior support or technical personnel.
I would like to see more intuitive documentation or easier documentation for Check Point Security Management.
For how long have I used the solution?
I have been using this solution for two years in my current field.
What do I think about the stability of the solution?
Check Point Security Management is stable in my experience.
What do I think about the scalability of the solution?
Check Point Security Management is very scalable and handles growth or changes in my organization well.
How are customer service and support?
My experience with customer support for Check Point Security Management has been very good.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I did not previously use a different solution before Check Point Security Management.
What about the implementation team?
This is a great tool for admin or controlling your gateway.
What was our ROI?
I have not seen a return on investment from using Check Point Security Management; however, it provides better time response.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing is great because I need to put the licensing in the different tools over or around Check Point. I don't know the price because it's in a different area, not the support area.
Which other solutions did I evaluate?
I did not evaluate other options before choosing Check Point Security Management.
What other advice do I have?
I rate Check Point Security Management a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Oct 27, 2025
Flag as inappropriateSr. Technical Support Executive at Digitaltrack
Centralized interface has improved daily administration and reduced human error
Pros and Cons
- "Check Point Security Management has positively impacted our organization by providing better administration control and a unified central pane of glass for daily configuration."
- "Check Point Security Management can be improved as it requires significant resources, particularly in larger deployments."
What is our primary use case?
Our main use case for Check Point Security Management is for unified management of our security devices, so our administration can control everything from one centralized interface.
A specific example of how we use Check Point Security Management for shipment security management and administration control is that we have multiple security gateways integrated with security management. For any required configuration, we use the console on security management to implement all changes.
What is most valuable?
The best features Check Point Security Management offers are Smart Logging and Smart Console, which are helpful for log searching and analysis. While we have raw data, these two tools provide better visibility on incident trends and ensure GDPR compliance.
Smart Log and Smart Console help with visibility and compliance by capturing all events and traffic flow from central management. All users and events are captured in security management, providing full visibility.
Check Point Security Management has positively impacted our organization by providing better administration control and a unified central pane of glass for daily configuration.
A specific outcome demonstrating how Check Point Security Management has helped our organization is the reduction in human error through centralized policy management.
What needs improvement?
Check Point Security Management can be improved as it requires significant resources, particularly in larger deployments.
For how long have I used the solution?
We have been using Check Point Security Management for more than three years.
What do I think about the stability of the solution?
Check Point Security Management is stable.
What do I think about the scalability of the solution?
Check Point Security Management demonstrates good scalability.
How are customer service and support?
The customer support for Check Point Security Management is excellent, as the support engineers are supportive and have excellent knowledge in troubleshooting.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are using Check Point Security Management exclusively and have not previously used a different solution.
What was our ROI?
We have seen a return on investment through reduced cost and time.
Which other solutions did I evaluate?
Before choosing Check Point Security Management, we evaluated FortiManager.
What other advice do I have?
My advice for anyone looking into using Check Point Security Management is to look for the centralized single pane of glass to manage security devices.
I rate Check Point Security Management 8 out of 10 because of its unified console, usability, and proper reporting capabilities.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Oct 27, 2025
Flag as inappropriateNetwork Security Engineer at NTT Security
Access to detailed network logs in real time helps us decide and take prompt action to block and fix threats
Pros and Cons
- "Check Point's management portal and firmware are very stable and don't require frequent maintenance. Their IPSec tunneling is very stable, especially with Azure and AWS networks."
- "License update and upgrade processes can be made a little easier."
What is our primary use case?
We use the product as a perimeter and core firewall for multiple clients at different locations.
We have physical Smart-1 appliances and virtual appliances in our environment. We merged all of the old managers into these managers and managed to centralize the management of firewalls and see the logs altogether.
We are using management API for large configs, and clear rules, blocking malicious IP addresses with SAM rules, and migrating the VLANs with it.
We have deployed Check Point high-end firewall UTMs to medium business-grade devices with different models. We also have a cloud-based Check Point firewall for one of our clients. It's easy to manage either centrally or as separate devices. We use them for network security including firewall rules, NATTing, Web application access, IPSec VPN tunneling between offices and cloud services, user VPN clients for access from home, data encryption, anti-malware/anti-virus solutions, and as network gateway devices for routing and DNS.
How has it helped my organization?
Check Point's management portal and firmware are very stable and don't require frequent maintenance. Their IPSec tunneling is very stable, especially with Azure and AWS networks.
Access to detailed network logs in real time helps us decide and take prompt action to block and fix threats.
Centralized management is great. With this, we manage all of Check Point products from one central management, we can apply rules, and NATS and manage app and URL Policies, threat prevention, and IPS protection rules.
Secondly, centralized log and report management is important. We can distribute logs to our log appliances with centralized management and view logs without logging additional devices.
HA Structure provides good coverage and works fine. With the HA structure, we can manage two data centers as one, and this is helping much.
We can keep old revisions, and with that, we can check or revert to one when needed.
What is most valuable?
The most valuable aspects of the solution include:
- IPSec VPN Tunneling,
- DDoS Protection,
- HÀ and Clustering,
- Firewall Rules,
- Proxy support,
- Revision history
- Detailed audit log,
- Smart Event
- Filter syntax.
These features are easy to configure and offer multiple options to set them up with cloud services and other vendor firewall products.
We can always feel secure if some things go wrong, I'm sure that we can restore to the old one.
We can apply centralized proxy settings to get additional databases when we need them.
We can get a graphical view of the traffic and provide history when we need it.
What needs improvement?
We didn't find any major feature missing or lacking in Check Point products that we used. We'd just like them to continue to improve their products with new features and updates.
However, license update and upgrade processes can be made a little easier.
Also, I'd like to see more integration possibilities between Check Point and other vendor security solutions.
The Check Point SandBlast platform could also be merged with the Check Point GAIA platform for a central management console and easier controls.
For how long have I used the solution?
I have been using Check Point for more than 10 years for different clients.
What do I think about the scalability of the solution?
The solution is highly scalable.
How are customer service and support?
Check Point's knowledge base is very vast and provides lots of information if we need some help. The community is very helpful as well.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have multiple clients and use different technologies, so we work on other vendor products also.
How was the initial setup?
We have a professional service team that we work together for setup-related work to Check Point appliances.
What about the implementation team?
We handle the initial setup in-house.
Which other solutions did I evaluate?
We have multiple clients and use different technologies, so we work on other vendor products also like Cisco ASA, FTD, Palo Alto, FortiGate etc.
What other advice do I have?
Overall I am fully satisfied with Check Point
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Head, Partner Management - Asia Pacific Middle East and Africa at a tech vendor with 10,001+ employees
Good support, minimizes threats, and offers complete endpoint security
Pros and Cons
- "It's a great complete endpoint security solution that prevents the most imminent threats to the endpoint such as ransomware, phishing, or malware."
- "While the console and administration work well, they have to work on performance since it consumes a lot of CPU and memory."
What is our primary use case?
One of the recent use cases for this solution has been related to a power company, which was facing issues but was able to get its infrastructure secured and get back its business continuity and growth. In addition, its management was able to get back its confidence with solutions or services provided by Check Point.
The client was able to quantify its security elements. As a result, a strong defensive framework was developed. Deployment of Check Point's solution resulted in the evasion of any existing and potential threats.
How has it helped my organization?
Check Point is not just a firewall. They deliver everything including IPS, application control, threat emulation and extraction, identity awareness, and more. In line with the quantum security gateways, other elements and services as provided by Check Point have also proven to be very helpful and reliable in keeping the company environment secured. The organization has also gone a great mile to tag itself as a proactive threat elimination expert in the industry viz a viz its competitors.
What is most valuable?
Harmony Endpoint is one of the great solutions by Check Point; it ensures compliance with policies and minimizes the risk of threats entering through endpoints.
It's a great complete endpoint security solution that prevents the most imminent threats to the endpoint such as ransomware, phishing, or malware.
It has proved to be very successful in identifying ransomware behaviors such as file encryption or attempts to compromise operating system backups and safely restore ransomware-encrypted files automatically.
What needs improvement?
While the console and administration work well, they have to work on performance since it consumes a lot of CPU and memory. There is also latency in the administrative panel when entering. There has been a problem with updating licenses as well. There is ground-level feedback based on interaction with the relevant stakeholders that states implementing it would make a major difference in the overall experience.
For how long have I used the solution?
I've used the solution for two years.
What do I think about the stability of the solution?
The solution has not caused major deviations and the historical experience has been quite good. The stability and reliability of the solution is pretty much appreciated
What do I think about the scalability of the solution?
The overall impression of the scalability is good and impressive.
How are customer service and support?
Technical support has been pretty good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have been involved with a lot of other partners in parallel, depending on the requirements of the customers.
How was the initial setup?
I am not directly involved in the setup and deployment of the product.
What about the implementation team?
The implementation was handled by an in-house team.
What was our ROI?
I've witnessed an ROI of 25% to 30%.
What's my experience with pricing, setup cost, and licensing?
Users should actively evaluate the existing options available in the market and finalize the one that matches their requirements, budget, and priorities. Check Point can definitely be considered based on my personal experience.
Which other solutions did I evaluate?
The choice to evaluate would not be my personal decision but the requirement raised by the customers.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
Team Lead - Network and Security at Digitaltrack Solution Private Limited
Centralized logging and management with easy enabling/disabling features
Pros and Cons
- "The centralized logs and management are helpful."
- "As per personal experience and based on many organizations, Check Point needs to improve PS services."
What is our primary use case?
The Security Management server provides centralized management to manage all the security gateways.
Many organizations will have more than one firewall. This may be in the same location or in a different location. Users can manage all the firewalls from a single location.
It provides centralized logging for all incoming and outgoing traffic.
How has it helped my organization?
The solution centralizes licensing and auto-licensing with smart updating.
In organizations where there are many firewalls, one firewall license may expire. We can easily update licenses from the smart console from the same location or from different locations.
It also provides centralized logging that helps during troubleshooting - which provides detailed logging of access rules, NAT rules, application filters, VPNs, etc.
What is most valuable?
The centralized logs and management are helpful. All of the logs are stored in an external server or within the Management Server. All of the logs are very easy to understand and provide detailed information about the instance.
Through the Management Server we can easily enable all the features and easily disable them as well.
What needs improvement?
Check Point offers PS services in India. As per personal experience and based on many organizations, Check Point needs to improve PS services.
For how long have I used the solution?
For the past one and a half years, I have been using a Check Point Firewall and Check Point Management Server.
What do I think about the stability of the solution?
The stability is the best.
What do I think about the scalability of the solution?
I am satisfied with the scalability.
How are customer service and support?
So far, there is no point reach out to technical support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
No, we have not selected any other solution.
How was the initial setup?
As a Check Point implementation engineer, I found the setup process easy.
What about the implementation team?
The vendor expertise is very good.
What's my experience with pricing, setup cost, and licensing?
The licensing price is a bit expensive. However, it provides very good security at the perimeter level.
Which other solutions did I evaluate?
No, we have not evaluated other options.
What other advice do I have?
They just need to improve PS service in India.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros
sharing their opinions.
Updated: October 2025
Product Categories
Log Management Advanced Threat Protection (ATP) Threat Intelligence Platforms (TIP)Popular Comparisons
Splunk Enterprise Security
IBM Security QRadar
Elastic Security
Security Onion
Graylog Enterprise
LogRhythm SIEM
Recorded Future
Fortinet FortiAnalyzer
VMware Aria Operations for Logs
ArcSight Logger
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- When evaluating Log Management tools and software, what aspect do you think is the most important to look for?
- Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
- Which Windows event log monitoring tool do you recommend?
- What is the difference between log management and SIEM?
- Splunk vs. Elastic Stack
- How can Cloudtrail logs be used effectively to improve log monitoring?
- Why hot data and cold data differences in SIEM solutions are not discussed sufficiently?
- When evaluating Log Management solutions, what aspect do you think is the most important to look for?
- When evaluating Log Management solutions, what aspects do you think are the most important to look for?
- Why are Log Management tools important for companies?

















