Try our new research platform with insights from 80,000+ expert users
LucianoMiguel - PeerSpot reviewer
Security Consultant at a consultancy with 501-1,000 employees
Real User
A highly accessible and fast tool that provides a very good technical support
Pros and Cons
  • "Regarding the tool's valuable features, I would say that Check Point is a very accessible and fast tool, especially when dealing with logs for the first time."
  • "I guess it lacks in providing visibility of the many incidents."

What is our primary use case?

I use it for managing ten clusters in our on-premise environment. With this kind of management, it's possible to question its policy and change many configurations in the files. With its management, we got all the logs from the environment. With Check Point Security Management, we get the benefits of deploying the configuration.

How has it helped my organization?

Owing to the availability of many kinds of incidents, I can say that the solution has served to improve my organization.

What is most valuable?

Regarding the tool's valuable features, I would say that Check Point is a very accessible and fast tool, especially when dealing with logs for the first time. It is a perfect solution for me.

What needs improvement?

From the Check Point Security Management solution, it's possible to get the situation of my clusters. I guess it lacks in providing visibility of the many incidents. Hence, the visibility of incidents is an area where I want the solution to improve.

Buyer's Guide
Check Point Security Management
October 2025
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,706 professionals have used our research since 2012.

For how long have I used the solution?

I have been using Check Point Security Management since 2005, so I have used it for maybe twenty years. Also, I am using Check Point Security Management E84.20.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a ten out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a ten out of ten.

How are customer service and support?

The solution's technical support is very good. Hence, I rate the technical support a ten out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The solution's initial setup was easy.

What was our ROI?

It took a year to see a return on investment. I did experience a return on investment using the solution.

What's my experience with pricing, setup cost, and licensing?

Price-wise, it is an expensive solution.

What other advice do I have?

I recommend the solution to those planning to use it.

I rate the overall product between nine to ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
MGMT Security Tool easy control, policies and security.
Pros and Cons
  • "The control is granular, so you can set policy profiles for different organizational profiles."
  • "Some costs are ridiculously high."

What is our primary use case?

Thanks to the new Check Point management, we were able to manage our environments decentrally with a server or from the Check Point Infinity Portal. This management is handled separately and provides greater ease of implementation and backups. You can have your gateways separated from the control server. You can even lose the management server, and easily, with a previous backup, you can restore all the policies that had been generated so that you never lose the operation of the GW.

Our Check Point implementations are quite important in our environment. With them, we were able to shield our infrastructure from modern vulnerabilities.

How has it helped my organization?

The separate management provides greater security and peace of mind. In the face of events in which we can lose communication with the management server, the operation of the Check Point gateways continues unaffected.

We also like the ease and intuitiveness of the management server since it allows you to generate policies in a straightforward way. Its logs and monitoring provide the necessary information so that those responsible for security can make decisions and improve security even more.

The control is intuitive, it's an excellent tool.

What is most valuable?

The monitoring is excellent. It helps a lot in making decisions.

Finally, the additional tools or blades implemented in this console are great. You can go from basic security implementation to a fairly advanced one with all the blades you have available.

The separate environment of the Check Point gateways is one of the most important features. The separate management allows for the continued use of the gateways.

What needs improvement?

As for the support, it is not the best. 

The hours are different from those in America. They generally respond to us at dawn. They are not as fast or efficient, and they could improve in this area.

Every manufacturer must have enough documentation for client implementations and proof of concept. However, Check Point has many outdated manuals. These should be simpler for users and help them to manage their environments with the best practices.

They should improve the ease of licensing.

For how long have I used the solution?

We've used the solution for more than three years. We started using Check Point Security Management and have had very good results in a manufacturer's architecture with excellent performance.

Which solution did I use previously and why did I switch?

Previously, we had WatchGuard to provide security. However, it does not meet the parameters required for our organization.

What's my experience with pricing, setup cost, and licensing?

It is important to value the support of a Check Point partner to validate the tools, in addition to seeing the product more closely.

Which other solutions did I evaluate?

We researched to find the security tool that best suits our requirements.

What other advice do I have?

For us, there are more benefits than failures; it really is an exceptional tool, and I recommend it.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Security Management
October 2025
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,706 professionals have used our research since 2012.
SameerMogale - PeerSpot reviewer
Independent Business Owner at 3Kay Solutions
Real User
Top 5
It integrates well with my other solutions, but it may be difficult for the average person to use
Pros and Cons
  • "The company uses software called Harmony. Check Point integrates nicely, whether on an endpoint or mobile device. It integrates well with the firewall and can give me reports that I can check without going to an online portal."
  • "You need some technical expertise to use the solution. I don't think it's accessible to the typical end-user. You need to access the box and use some command lines or the web interface. It would be nice to have a user-friendly dashboard and comprehensive reporting."

What is our primary use case?

I am using Check Point to secure my home office because I'm doing all my work from home. 

What is most valuable?

The company uses software called Harmony. Check Point integrates nicely, whether on an endpoint or mobile device. It integrates well with the firewall and can give me reports that I can check without going to an online portal.

What needs improvement?

You need some technical expertise to use the solution. I don't think it's accessible to the typical end-user. You need to access the box and use some command lines or the web interface. It would be nice to have a user-friendly dashboard and comprehensive reporting. 

For how long have I used the solution?

I started using Check Point last year.

How are customer service and support?

I contacted Check Point because the device wasn't logging into the portal to download the license I purchased. It took them about three days to answer.

Which solution did I use previously and why did I switch?

I was using Untangled and switched to Sophos. I decided after a year that Sophos wasn't for me, so I tried Check Point. 

How was the initial setup?

It took me about two hours to do the initial installation, but the total deployment took a day. I did it myself and found it somewhat complicated. You need to know what you're doing. Check Point doesn't provide enough guidance and assumes you know everything. 

What's my experience with pricing, setup cost, and licensing?

I pay for a yearly license, but you have the option of a three-year or a five-year license. 

What other advice do I have?

I rate Check Point Security Management seven out of 10. I recommend it if you're a technical person experienced in WFM security devices. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2000274 - PeerSpot reviewer
Software Engineer at CloudSense
User
Good malware detection with helpful threat prevention tools and an excellent reporting system
Pros and Cons
  • "The reporting system provides real-time insights into the security situation and shows measures that can be taken to protect our data."
  • "Sometimes the security system slows down when it is overloaded."

What is our primary use case?

The security management platform monitors the performance of applications and the security demands that can secure our data. 

Check Point Security Management has helped us to set secure points across all sectors to filter out harmful content that can destroy confidential information. 

The software has given the IT team access control in setting firewalls and securing cloud-based servers efficiently. 

This product provides comprehensive security coverage services that reduce operational costs. 

This tool has educated our teams and advanced our knowledge of setting effective security.

How has it helped my organization?

This software has improved the security situation in the organization and guarded the most confidential information against landing in unsafe areas. 

Check Point Security Management is the leading threat prevention system that ensures the networking system is protected from external attacks. 

All the departments can easily access security situations on set programs and come up with a suitable strategic plan. 

The reporting system provides real-time insights into the security situation and measures that can be taken to protect our data.

What is most valuable?

The set threat prevention tools have advanced the security monitoring systems and set up reliable data management platforms. 

Security analysis has helped teams in the organization plan and deploy the best security systems for protecting data. 

The malware detection feature has enabled the organization to block unauthorized attacks that can destroy data and leak confidential information.

Check Point Security Management has reduced operational costs and improved overall data security performance. 

Most set features have contributed to security stability in the organization, and I highly recommend this platform to other organizations.

What needs improvement?

This security control system has efficient features that have transformed the company to help it achieve set international standards. 

Most of the features provide excellent services that cannot be extracted from other platforms. 

It can be scaled down to provide services based on the company's demands and lowers operational costs. 

Sometimes the security system slows down when it is overloaded. Poor configurations have led to data leakages and weakened security signals. 

The overall performance has impressed all the team members and provided a secure environment for better workflows.

For how long have I used the solution?

I've been using the solution for 12 months.

What do I think about the stability of the solution?

This platform is highly stable and I recommend it to others.

What do I think about the scalability of the solution?

Check Point Security Management is excellent for setting security plans.

How are customer service and support?

The customer service team has performed well since we started engaging with them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with other similar solutions.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

Implementation was done through the vendor.

What was our ROI?

Our ROI has increased from 45% to 65% since we deployed this application.

What's my experience with pricing, setup cost, and licensing?

The setup cost is efficient.

Which other solutions did I evaluate?

I have not examined other related applications.

What other advice do I have?

I have observed great performance since we deployed this platform.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2040309 - PeerSpot reviewer
Property Accountant at a real estate/law firm with 201-500 employees
User
Reduces costs, has deep learning threat prevention, and improves internet browsing security
Pros and Cons
  • "Each department can easily share data with the management without fear of data compromise."
  • "It sometimes blocks safe sites when I am researching, affecting the overall output and wasting time."

What is our primary use case?

The application intervenes in security situations in the organization and launches advanced threat prevention measures. 

It has automated security controls that can predict and block malware attacks. 

It is backed by AI deep learning that offers intelligent information and scales performance to unlock hidden malicious behaviors. 

Data fraud cases have reduced since we set up this product as the main security assessment platform. 

Employees can safely browse and share files with their colleagues without fear of external interference.

How has it helped my organization?

We are satisfied with this application as it improves internet browsing security across the organization. 

Each department can easily share data with the management without fear of data compromise. 

It is more flexible than other solutions in the market as it can be deployed in both cloud and on-premise. 

It prevents members from logging in to unsecured sites and running links that may spread viruses to clean data. 

The set features are updated regularly to meet company demands and comply with set community guidelines.

What is most valuable?

The advanced security operational features help the business to identify weak points that can leak data to unauthorized personnel and take necessary precautions. 

Autonomous IoT Security monitors the performance of applications and equips them with safety measures to prevent risks and attacks. 

Deep learning threat prevention has blocked unsafe sites and phishing attacks from cyber attackers. 

It has audited the entire network and removed threat barriers that are used to slow down workflows. 

The cost of running this software has been reduced due to the modern automated version that can work faster without human intervention.

What needs improvement?

Overloading and access to many members simultaneously slow down performance, which can lead to security threats. 

New users working with this software find it hard to integrate effectively with other applications without the input of the customer support staff. 

It sometimes blocks safe sites when I am researching, affecting the overall output and wasting time. 

If the authorization commands are not well set, it slows down the working capacity of the Operating System. 

I love the current version with upgraded features that can block more attacks and protect our work environment.

For how long have I used the solution?

I've used the solution for nine months.

What do I think about the stability of the solution?

The innovative security enhancement models have helped us in curbing most online threats.

What do I think about the scalability of the solution?

There is improved security in communication and internet browsing.

How are customer service and support?

We have achieved most of the set goals due to customer service team transparency and assistance.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This solution has been awesome and offers excellent functionalities.

How was the initial setup?

The setup was relatively complex. That said, the customer service team provided enough assistance.

What about the implementation team?

The vendor team was responsible for setting up everything.

What was our ROI?

The measured ROI has improved from 30% to 55% from the deployment period.

What's my experience with pricing, setup cost, and licensing?

The setup and pricing costs are favorable to many business enterprises.

Which other solutions did I evaluate?

I have no interest in other applications.

What other advice do I have?

This is the best platform for reducing phishing and blocking malware attacks.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro
Real User
User-friendly with remote management capabilities and great for hybrid setups
Pros and Cons
  • "Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it."
  • "Among the things that I would like in the future is for the solution to have its application on Android and iOS, as many of the administrators have adopted remote administration positions due to what has happened since the pandemic. This would help us to have an easier and simpler administration."

What is our primary use case?

We needed a solution that would be in the cloud or on-premise, that would centralize the equipment, and that would help us comprehensively manage each of the appliances that we were going to place in the four branches that we manage. Starting from that premise, we started with Check Point Security Management being the number one solution as it was pioneering in managing multiple computers simultaneously. This tool helped us to be more efficient and better at controlling risk with our hybrid cloud.

How has it helped my organization?

Starting from the need for our teams to be in the cloud and on-premises data centers, we decided on centrally securing and managing all these environments, making them easier, and more user-friendly, and their policy configuration, management of blades in the appliances, and management completely remote. 

Among its value, we can say that it helps us administrators have less administrative management burden in each appliance that must be configured and managed. Another fact is that its version can be on-premise or cloud and this cloud version helps us lower costs.

What is most valuable?

Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it. 

Among its advantages and features that add value is managing teams both on-premise and in the cloud, regardless of the type of cloud. It helps to have and use a solution that adapts to environments and is easy to manage and configure. 

What needs improvement?

Among the things that I would like in the future is for the solution to have its application on Android and iOS, as many of the administrators have adopted remote administration positions due to what has happened since the pandemic. This would help us to have an easier and simpler administration. I believe that these mobile solutions are part of the technological evolution and the promising future that new technologies bring us; this will help us with future innovation and management.

For how long have I used the solution?

I've used the solution for one year. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Top 20
Expands quickly, offers good management capabilities, and is very powerful
Pros and Cons
  • "Check Point management is one of the most complete solutions for managing Check Point Firewall appliances."
  • "I would like this solution to be integrated directly into the Cluster XL equipment."

What is our primary use case?

In recent years, management was to have an additional server in our data center or virtual machine that demanded resources locally. Today we have the possibility to have virtual teams in the cloud or on-premise and do not have the need to create that machine. We take that server to the Check Point cloud as a management cloud where we can have each subscription and be able to manage everything with the same account. It allows you to manage from anywhere and makes it easier for you to manage additional teams.

How has it helped my organization?

Check Point management is one of the most complete solutions for managing Check Point Firewall appliances. 

Since it is so powerful, we can manage more than one appliance with this same tool and create policies per appliance, and integrate different branches. 

One of the great benefits is being able to centralize all our branches under a single management server, thus being able to manage each of the created policy layers from a single place.

What is most valuable?

Among the most valuable features is the ability to manage everything simultaneously. It can integrate with the Check Point Infinity Cloud. 

The costs of acquiring a server for this task is of value. Each of us who are administrators can continuously manage the security of companies. This management manages not only Firewall-type appliances but also Cloudguard IaaS-type appliances.

What needs improvement?

I would like this solution to be integrated directly into the Cluster XL equipment. We'd like something that is all in one. The implementation becomes quite complex due to the extensive and not very graphic guides that we can find on their portal. 

For how long have I used the solution?

I've used the solution for two years. 

What do I think about the stability of the solution?

It is very stable. You can have it in high availability services.

What do I think about the scalability of the solution?

The scalability is fast and easy.

Which solution did I use previously and why did I switch?

We previously used Fortinet as a firewall and management solution.

What's my experience with pricing, setup cost, and licensing?

The cost of having cloud management lowers the monthly bill. That must be considered when acquiring these solutions.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1805079 - PeerSpot reviewer
Network Engineer at Fujairah Port
User
Great performance, easy to push configuration changes, and good logging
Pros and Cons
  • "We can track logs of each firewall which is very helpful."
  • "They need to make a Mac version of the SmartConsole, in my opinion."

What is our primary use case?

We deployed the Check Point firewall for protecting our web servers and intranet servers. We used a management server as a centralized device for Check Point Gateway firewalls.

The best aspect about the notion is that we can push policy, IPs, or any other functionality to all or a subset of gateways. Alternatively, creating a distinct tab for each gateway gives a clear idea of the configuration changes and makes them less complicated.

Check Point's solution cuts down on the time it takes to manage multiple firewall devices.

How has it helped my organization?

Our organization has faced multiple attackers daily which causes high-impact performance, even though the previous firewall blocks. This leads to an impact on customer satisfaction with our services.

However, after deploying Check Point firewalls in our organization we found drastic changes in the performance of our network   

The management server helps us to reduce the time to manage multiple firewalls.

It's easy to push configuration changes to each of the gateways.

We can track logs of each firewall which is very helpful.

What is most valuable?

The importance of centralized administration cannot be overstated. As a network security engineer, I must mention that it allows us to manage all of our Check Point devices from a centralized point. 

Although there is certainly room for improvement in the UI, I am pleased that Check Point continues to correct and enhance. 

Furthermore, they provide some new features that will revolutionize security administration.

What needs improvement?

Initially, I was not a huge fan of Check Point's SmartConsole; I'm not sure why; perhaps it was because I was used to using only the web interface in other vendor firewalls like Palo Alto, Fortigate, and so on.

Now that I've tried it, I have to say that it's the greatest way to handle firewalls. There are some flaws, however, Check Point is working to correct them with each version.

They need to make a Mac version of the SmartConsole, in my opinion.

Aside from that, I'm satisfied with Check Point solutions.

For how long have I used the solution?

I've used the solution for two years.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.
Updated: October 2025
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.