We use Check Point Security Management for firewall management.
Network Security Architect at a consultancy with 10,001+ employees
An expensive solution with easy life cycle management
Pros and Cons
- "The solution is easy to use and comes with few vulnerabilities. You don't have to worry about release upgrades. Life cycle management is very easy."
- "Check Point Security Management lacks some of the competitor features."
What is our primary use case?
What is most valuable?
The solution is easy to use and comes with few vulnerabilities. You don't have to worry about release upgrades. Life cycle management is very easy.
What needs improvement?
Check Point Security Management lacks some of the competitor features.
For how long have I used the solution?
I have been using the solution for six years.
Buyer's Guide
Check Point Security Management
August 2025

Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,483 professionals have used our research since 2012.
What do I think about the stability of the solution?
Check Point Security Management is stable.
What do I think about the scalability of the solution?
We have around 4,500 users for the product.
How are customer service and support?
Check Point Security Management doesn't have good support since it is difficult to get the right person.
How would you rate customer service and support?
Neutral
What's my experience with pricing, setup cost, and licensing?
The solution is expensive.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Information Technology Technician at Smoothtel & Data Solutions Ltd
Provides security and reliability, integrates well with other products, and the exceptions work well
Pros and Cons
- "We can easily push the policies to any of our gateways."
- "The tool is expensive."
What is our primary use case?
We use the solution mostly for policy pushing to other gateways.
How has it helped my organization?
We deployed the tool for a customer. They faced an attack, but Check Point did not allow it. Check Point does not allow unauthorized access to the network. It just sends a message to the person saying they are not authorized to access the network. The exceptions work very well. Most of the attacks go through the web path. The tool does a good job of securing the web path.
What is most valuable?
We can easily push the policies to any of our gateways. The solution manages the gateways. It works well with other products. It integrates well with Cisco products, too.
What needs improvement?
The tool is expensive.
For how long have I used the solution?
I have been using the solution for the last two years.
What do I think about the stability of the solution?
The tool is very stable. The equipment is never down.
What do I think about the scalability of the solution?
We have more than ten customers.
How are customer service and support?
The support is very good. We get a response immediately whenever we enter a support request on the website. We do not have to wait for one or two hours. The team also offers remote support. The support provided by Check Point is one of the best in the market.
How was the initial setup?
We have most of the products on-premise. We have only one client on a VM. Check Point offers training for their products. They usually send us a link every time they launch a new feature. Unless we go through the tutorials, it will be difficult for us to deploy the solution. However, it is easy to deploy when you know how to do it. It is easy to navigate if we have read about the gadget.
What's my experience with pricing, setup cost, and licensing?
The tool is expensive. However, if we buy Check Point Security Management, we do not have to buy anything else. We get all the features we need in a single solution. We get value for our money.
What other advice do I have?
If we want to troubleshoot, we just have to log in to the SMS. Everything is listed there. We just have to log in to the gateway we have an issue with. We need not go to the server rooms. I see no improvements needed in the product. The other gateways and SD-WAN could be improved. If someone wishes to use the product, they have chosen the best option. It provides security, reliability, and support. Though it is expensive, it is the best. It has all the features we need. The product is absolutely excellent. Overall, I rate the tool a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Check Point Security Management
August 2025

Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,483 professionals have used our research since 2012.
Senior Technical Consultant at International Turnkey Systems - ITS
Clear network visibility, reliable, but scalability could improve
Pros and Cons
- "The most valuable feature of Check Point Security Management is the high level of visibility"
- "Check Point could improve by enhancing the networking in their solution in order to align it with the existing network architecture."
What is our primary use case?
The Check Point Security Management is designed with a strong focus on cybersecurity, providing customers with detailed information on attacks and high-visibility threats. This is a major benefit, as it allows customers to stay informed on a daily basis.
What is most valuable?
The most valuable feature of Check Point Security Management is the high level of visibility
What needs improvement?
Check Point could improve by enhancing the networking in their solution in order to align it with the existing network architecture.
To perform a service cutover, such as migrating from one firewall to another or bringing up a new firewall, it is essential to thoroughly study and understand the customer's network architecture. This is a complex and challenging process that requires careful deployment and configuration. However, once the firewall is successfully connected to the environment, it becomes very robust and provides comprehensive cybersecurity that meets the needs of the customer.
For how long have I used the solution?
I have been using Check Point Security Management for approximately 10 years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
Due to its complexity and the distributed nature of its solution, Check Point Security Management still faces significant challenges in terms of scalability. The networking port weakness previously mentioned also has an impact in this area. In order to address these gaps, enhancements need to be made to the product's scalability. For example, when performing software upgrades, the distributed solution can make even minor upgrades challenging due to the many components involved, such as servers, gateways, and management servers. It is crucial to make improvements in scalability to ensure that Check Point Security Management can meet the needs of customers who may require a larger or more complex solution.
They are selling multiple solutions that need to have their software maintained and their scalability at the same time with the advantage of the centralized consolidated unit, reflects poorly on the scalability. It's not only one solution. There are a lot of factors to consider in order to upgrade or add a new firewall to the lineup.
How are customer service and support?
Their support could improve.
I rate the support from Check Point Security Management a six out of ten.
Which solution did I use previously and why did I switch?
I have used Fortinet and other competitors.
How was the initial setup?
The solution can be somewhat complex. It can be challenging to use, particularly during deployment. This is due to its use of distributed deployment, which requires the purchase of several components including security gateways, SMS servers, and a management server. While this may seem complex, the benefit is greater visibility.
What's my experience with pricing, setup cost, and licensing?
The solution is expensive and there is an annual license.
What other advice do I have?
Top companies in the firewall and software market include Check Point, which recently entered the hardware manufacturing sector. However, this move did not significantly impact its market share as other competitors were already offering more powerful hardware. As a result, the product became more complex, requiring separate handling of hardware and firewall components within the product. This adds additional layers, including network settings, connectivity, and firewall, which can make deployment and configuration more challenging for network engineers. Despite these challenges, Check Point is known for its stability and advanced threat prevention techniques, making it a valuable choice for cybersecurity.
We recommend smaller businesses explore alternative security partners, such as Fortineteen. Fortinet offers an affordable solution with all the necessary security features that customers need, making it a cost-effective option. For larger-sized companies we recommend Check Point Security Management to have visibility of their infrastructure.
I rate Check Point Security Management a seven out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Soporte técnico superior at Acobo
Good centralization, user-friendly, and offers good flexibility
Pros and Cons
- "It provides for capabilities and has allowed us to be more scalable."
- "In the future, I would like the platform to be able to integrate or manage appliances or third-party equipment."
What is our primary use case?
When having multiple branches, there is the need to be able to manage several branches centrally to meet internal and external regulatory standards that become part of important criteria to manage security.
Due to the number of branches that we must protect and safeguard, we were looking for a solution that would allow us to centralize simple and fast management that is as scalable as possible.
How has it helped my organization?
The Check Point R80 service has allowed us to unify and centralize the security policy. This makes us faster and more flexible when making a change in any of our branches. It's one of the friendliest services that can be managed and remains important in nature to our bottom line. It allows all administrators to understand and manage the communication between different sites, for example. Additionally, we have integrated these features with others that could also be used as security measures or MFA services.
What is most valuable?
One of the most important features, and one that I see as having organizational value, is the ability to enable services or communications that can be integrated with third parties. We can add additional layers of security to logins or configuration startups that we did not have before.
It provides for capabilities and has allowed us to be more scalable. We now have greater management flexibility and the possibility to configure and connect to different branches. It has given us better centralization with greater features and security benefits.
What needs improvement?
In the future, I would like the platform to be able to integrate or manage appliances or third-party equipment. That would give us a management solution that is able to adapt to the technological changes that we have today.
Maybe we could see if the brand or the services become commercial allies of other brands. I know that it is something that is requested a lot, however, better integration could be beneficial for the market and for users when purchasing a service in the market.
For how long have I used the solution?
I've used the solution for three years.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Good antivirus services and a fast installation with centralized management
Pros and Cons
- "One of the most outstanding characteristics of its centralized administration is its great computing power."
- "I would like it to be the administrator of equipment or Next Generation firewalls (which have to be managed on this platform) and to be able to manage other services (like Harmony) that also belong to Check Point."
What is our primary use case?
We wanted a centralized administration console to allow us to manage more than one team inside or outside our organization. As a result of this need, we were looking for solutions that could complement us and provide effective and functional management of more than one team inside or outside the organization.
It was then that we came across and used Check Point, a solution that allows us to integrate and manage all these teams from one place. Check Point offered us not only a centralized administration, but it also offered us and gave us added value in different services and features that can be integrated into the centralized administration platform.
How has it helped my organization?
Check Point came to give additional value to us as administrators and our organization. It allowed us to integrate more than one characteristic service under the same administration platform, such as antivirus services, real-time emulation services, and real-time detection, characteristics that really give additional value in a centralized management console being a console and also a strategic ally in our organization. These characteristics tell us that it is not only a service to centralize the administration - it is also a service designed to implement and add value to the security of any company.
What is most valuable?
One of the most outstanding characteristics of its centralized administration is its great computing power. The ease of being able to integrate more than one computer and manage and orchestrate them simultaneously and individually creates security layers for each one of them or different approaches based on the needs of the branches. We have an installation that is fast with an execution that is simple. It is easy to manage what each organization needs.
What needs improvement?
I would like it to be the administrator of equipment or Next Generation firewalls (which have to be managed on this platform) and to be able to manage other services (like Harmony) that also belong to Check Point. We'd like to be able to manage them from the same platform. Although they are within the same portal right now, they are not managed in the same way nor are they from the same teams. It could be a very innovative future integration and will help to centralize this section while having the characteristics under the same management.
For how long have I used the solution?
I've used the solution for about a year.
What do I think about the stability of the solution?
It is very stable lately. We've seen that the updates have made the solution apply changes faster and find it is more complete.
What do I think about the scalability of the solution?
The platform has somewhat complex scalability. That said, it is still efficient - mainly when we have management or administration in what is known as HA or cluster.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Information Security Specialist at AKBANK TAS
Good documentation and proxy support with a helpful community available for troubleshooting
Pros and Cons
- "HA Structure provides good coverage and works fine."
- "In order to work management console, you need some good appliance or you need to provide more CPU and Memory to the appliance."
What is our primary use case?
We have physical Smart-1 appliances and virtual appliances in our environment. We merged all of the old managers into these managers and managed to centralize the management of firewalls and see the logs altogether.
We are using management API to apply large configs, clear rules, block malicious IP addresses with SAM rules, and migrate the VLANs with it.
We deployed a management HA to provide rulebase synchronization to our DRC firewall segments. We also distributed logs to different Smart-1 appliances to gain performance.
How has it helped my organization?
First of all, centralized management is great. With this, we are managing all of Check Point products from one central management. Applying rules, nats and managing app&URL Policies, threat prevention, and IPS protection rules.
Secondly, centralized log and report management. We can distribute logs to our log appliances with centralized management and view logs without logging additional devices.
HA Structure provides good coverage and works fine. With HA structure, we can manage two data centers as one, and this is helping much.
We can keep old revisions, and with that, we can check or revert to one when needed.
What is most valuable?
It's useful that we can find unused objects. This helps us to get rid of unused objects in our database,
Proxy support is valuable for us. We can apply centralized proxy settings to get additional databases when we need them.
Revision history and detailed audit log is a good feature with this we can always feeling safe if somethings go wrong, I'm sure that I can go back the old one.
Smart Event is a very good feature. It provides a graphical view of the traffics and provides history.
The filter syntax is very good and helps control when we need it.
What needs improvement?
I am happy with Check Point Security Management. However:
1- In order to work management console, you need some good appliance or you need to provide more CPU and Memory to the appliance.
2-If you overload your appliance with detailed log, you need additional appliances. For big companies even smart 5150 kinda devices is not enough.
3-I normally had trouble updating licenses automatically. We always need to add manually and this is tiresome.
5- API seems to be fine but need some improvements and Check Point should provide scripts to its customers for tiresome jobs.
For how long have I used the solution?
I've been using Check Point Security Management for about five years.
What do I think about the stability of the solution?
Most of the time, it works well. However, if you overload appliances with old policy revisions, objects and rules, install times will vary. You will have a slow GUI interface and have trouble viewing logs.
What do I think about the scalability of the solution?
For virtual appliances, you have the option to increase your disk, CPU, and memory for your needs. This will provide a very good opportunity to improve the performance of the Security Management.
How are customer service and support?
Most of the time, technical support is good. We can easily open a case, and they can assign an engineer quickly. However, you will have problems if something is very odd. You may need to connect with R&D to address the issue and get a custom fix.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
For Check Point, I did not use something different. However, for Palo Alto firewalls, I am using Panorama, and it's also doing its job very well.
What about the implementation team?
We have a professional service provider that we work together with to apply changes to Check Point appliances. Also, Check Point's knowledge base is very vast and provides lots of information if you need some help. The community is very helpful as well.
What's my experience with pricing, setup cost, and licensing?
You should analyze your needs and purchase regarding to that analysis. Most of the time, you want to use only some features. Don't pay too much.
Which other solutions did I evaluate?
For Check Point firewalls you don't have any alternative.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
TOC Architect at Infopercept Consulting Limited
Provides multifactor authentication, IPS protection, and threat emulation
Pros and Cons
- "It's very easy for management to understand workflow and everything."
- "Check Point Tech Support will not assist with new configurations if we encounter any issues during the configuration process."
What is our primary use case?
We use the solution for VPN with multifactor authentication, IPS protection, and threat emulation. We have deployed the product in the cloud data center.
What is most valuable?
It's very easy for management to understand workflow and everything.
What needs improvement?
Check Point Tech Support will not assist with new configurations if we encounter any issues during the configuration process. They only provide support if there are issues with existing configurations.
For how long have I used the solution?
I have been using Check Point Security Management for four years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
It is 100% scalable. Behind the firewalls, around 25 web applications are accessed daily. Each application can be accessed by up to one lakh people every day.
How are customer service and support?
Support is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, I worked with FortiGate, and integrating that product with cloud platforms was very difficult. The workflows were overly complex, and the documentation was inadequate.
Check Point is superior to other security vendors. Their signature database, which includes antivirus, IPS, and anti-malware, is highly advanced. The system is easy to understand, and deployment via the web interface is also straightforward.
For example, during the COVID-19 pandemic, a new vulnerability known as Log4j emerged. While many vendors were unaware of this vulnerability, Check Point promptly emailed all its customers to inform them. They reassured customers that their gateways already had predefined prevention signatures to protect against this threat, requiring no additional action.
How was the initial setup?
The initial setup is straightforward. Fresh deployment and creating the gateways will take approximately three to four hours.
With Fortinet, managing the product through cloud formation can be difficult to implement in a cloud environment because it's not straightforward. First, we need to spin up some VMs and configure everything manually. In contrast, Check Point provides a more seamless cloud formation process. With Check Point, you click on the cloud formation option, and the VMs and necessary configurations are automatically set up. You will get GUI access quickly.
Only two resources are required. One knows Check Point, and another guy knows the cloud platform where they want to deploy the gateway.
What other advice do I have?
The integration process is straightforward. If you have some knowledge of your cloud service provider, you can easily integrate with it.
It has improved over the past four years. Previously, pushing any policy from the management server to the security gateway could take around ten to fifteen minutes. However, this task is now completed in about one minute with the new firmware version. This improvement demonstrates the substantial advancements made in the Management of Check Point products. It continuously updates its products to align with security standards and market awareness. They implement these updates in their own unique way. It is a strong player in the security market and has a long-standing presence. Their solutions are reliable and trusted for real security needs.
Maintenance is very easy.
First, we will thoroughly understand their requirements. Once we understand clearly, we will design tailored solutions for them. Next, we will present these solutions to the customer for review and discussion. Following their approval, we will run POC, collect evidence as required, and submit the comprehensive report.
Overall, I rate the solution a ten out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company has a business relationship with this vendor other than being a customer. Implementer
Consultant at ITQS
Good centralization, rules management, and automation
Pros and Cons
- "Check Point Security Management has a great feature that allows you to automate the request of the automated server."
- "The web administration tool that allows administration in the browser must be developed even more."
What is our primary use case?
One of our company's priorities was to have centralization of all the equipment in a single firewall. With the tools provided by Check Point, we were able to achieve it, and in this way we were able to centralize all the records.
With this implementation, we were able to make more centralized management and of all the rules. It was very comfortable to be able to configure them and manage them and thus be able to make the whole implementation more orderly and be able to carry out our organization along a good path of security administration
How has it helped my organization?
Check Point Security Management came to help us a lot. With this implementation, we were able to generate a firewall rule centralization and management. This helped our IT department to have an order in security and thus be able to centralize it.
By having this implemented, our facilities' security has improved a lot since both employees and external users are audited before entering the network through Check Point Security Management and the rules that make these security filters possible.
What is most valuable?
Check Point Security Management has a great feature that allows you to automate the request of the automated server. This helps us reduce the administrative effort of the IT department and thus give priority to other things like the security of the company or with the characteristic It provides us with centralization, which helps us with management.
The SmartConsole has provided us with excellent help with the application. It communicates with the administrator and allows us to create policies and also look at the traffic log.
What needs improvement?
The web administration tool that allows administration in the browser must be developed even more. When one tries to enter the panel, the loading delays us.
They can also implement version updating.
Another feature that could be improved is the export of configurations to .CSV. This would further simplify the management and compliance with rules.
For how long have I used the solution?
This solution has been used for approximately two year in the company.
What do I think about the stability of the solution?
The solution has excellent stability.
What do I think about the scalability of the solution?
It is quite a scalable product.
How are customer service and support?
The support experience has not been very good. We have had some problems with cases and meetings coordination.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
There was no type of tool that would supply these qualities in the company previously.
How was the initial setup?
The installation is easy. It is plug-and-play. However, the configuration must be done carefully.
What about the implementation team?
The implementation was handled with the help of an engineer who had prior knowledge of the product.
What was our ROI?
The ROI is there. Making an investment in security is always a very good idea.
What's my experience with pricing, setup cost, and licensing?
Check Point offers a good price for its products. It is worth making the investment since this can prevent vulnerabilities.
Which other solutions did I evaluate?
Check Point was always our first option in terms of product choice.
What other advice do I have?
It is an excellent tool to implement in the organization.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Popular Comparisons
Splunk Enterprise Security
IBM Security QRadar
Elastic Security
Security Onion
Recorded Future
LogRhythm SIEM
Fortinet FortiAnalyzer
VMware Aria Operations for Logs
ManageEngine EventLog Analyzer
ArcSight Logger
SlashNext Complete
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- When evaluating Log Management tools and software, what aspect do you think is the most important to look for?
- Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
- Which Windows event log monitoring tool do you recommend?
- What is the difference between log management and SIEM?
- Splunk vs. Elastic Stack
- How can Cloudtrail logs be used effectively to improve log monitoring?
- Why hot data and cold data differences in SIEM solutions are not discussed sufficiently?
- When evaluating Log Management solutions, what aspect do you think is the most important to look for?
- When evaluating Log Management solutions, what aspects do you think are the most important to look for?
- Why are Log Management tools important for companies?