Try our new research platform with insights from 80,000+ expert users
reviewer2040309 - PeerSpot reviewer
Property Accountant at a real estate/law firm with 201-500 employees
User
Reduces costs, has deep learning threat prevention, and improves internet browsing security
Pros and Cons
  • "Each department can easily share data with the management without fear of data compromise."
  • "It sometimes blocks safe sites when I am researching, affecting the overall output and wasting time."

What is our primary use case?

The application intervenes in security situations in the organization and launches advanced threat prevention measures. 

It has automated security controls that can predict and block malware attacks. 

It is backed by AI deep learning that offers intelligent information and scales performance to unlock hidden malicious behaviors. 

Data fraud cases have reduced since we set up this product as the main security assessment platform. 

Employees can safely browse and share files with their colleagues without fear of external interference.

How has it helped my organization?

We are satisfied with this application as it improves internet browsing security across the organization. 

Each department can easily share data with the management without fear of data compromise. 

It is more flexible than other solutions in the market as it can be deployed in both cloud and on-premise. 

It prevents members from logging in to unsecured sites and running links that may spread viruses to clean data. 

The set features are updated regularly to meet company demands and comply with set community guidelines.

What is most valuable?

The advanced security operational features help the business to identify weak points that can leak data to unauthorized personnel and take necessary precautions. 

Autonomous IoT Security monitors the performance of applications and equips them with safety measures to prevent risks and attacks. 

Deep learning threat prevention has blocked unsafe sites and phishing attacks from cyber attackers. 

It has audited the entire network and removed threat barriers that are used to slow down workflows. 

The cost of running this software has been reduced due to the modern automated version that can work faster without human intervention.

What needs improvement?

Overloading and access to many members simultaneously slow down performance, which can lead to security threats. 

New users working with this software find it hard to integrate effectively with other applications without the input of the customer support staff. 

It sometimes blocks safe sites when I am researching, affecting the overall output and wasting time. 

If the authorization commands are not well set, it slows down the working capacity of the Operating System. 

I love the current version with upgraded features that can block more attacks and protect our work environment.

Buyer's Guide
Check Point Security Management
August 2025
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,483 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for nine months.

What do I think about the stability of the solution?

The innovative security enhancement models have helped us in curbing most online threats.

What do I think about the scalability of the solution?

There is improved security in communication and internet browsing.

How are customer service and support?

We have achieved most of the set goals due to customer service team transparency and assistance.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This solution has been awesome and offers excellent functionalities.

How was the initial setup?

The setup was relatively complex. That said, the customer service team provided enough assistance.

What about the implementation team?

The vendor team was responsible for setting up everything.

What was our ROI?

The measured ROI has improved from 30% to 55% from the deployment period.

What's my experience with pricing, setup cost, and licensing?

The setup and pricing costs are favorable to many business enterprises.

Which other solutions did I evaluate?

I have no interest in other applications.

What other advice do I have?

This is the best platform for reducing phishing and blocking malware attacks.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro
Real User
User-friendly with remote management capabilities and great for hybrid setups
Pros and Cons
  • "Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it."
  • "Among the things that I would like in the future is for the solution to have its application on Android and iOS, as many of the administrators have adopted remote administration positions due to what has happened since the pandemic. This would help us to have an easier and simpler administration."

What is our primary use case?

We needed a solution that would be in the cloud or on-premise, that would centralize the equipment, and that would help us comprehensively manage each of the appliances that we were going to place in the four branches that we manage. Starting from that premise, we started with Check Point Security Management being the number one solution as it was pioneering in managing multiple computers simultaneously. This tool helped us to be more efficient and better at controlling risk with our hybrid cloud.

How has it helped my organization?

Starting from the need for our teams to be in the cloud and on-premises data centers, we decided on centrally securing and managing all these environments, making them easier, and more user-friendly, and their policy configuration, management of blades in the appliances, and management completely remote. 

Among its value, we can say that it helps us administrators have less administrative management burden in each appliance that must be configured and managed. Another fact is that its version can be on-premise or cloud and this cloud version helps us lower costs.

What is most valuable?

Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it. 

Among its advantages and features that add value is managing teams both on-premise and in the cloud, regardless of the type of cloud. It helps to have and use a solution that adapts to environments and is easy to manage and configure. 

What needs improvement?

Among the things that I would like in the future is for the solution to have its application on Android and iOS, as many of the administrators have adopted remote administration positions due to what has happened since the pandemic. This would help us to have an easier and simpler administration. I believe that these mobile solutions are part of the technological evolution and the promising future that new technologies bring us; this will help us with future innovation and management.

For how long have I used the solution?

I've used the solution for one year. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Security Management
August 2025
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,483 professionals have used our research since 2012.
reviewer1805079 - PeerSpot reviewer
Network Engineer at Fujairah Port
User
Great performance, easy to push configuration changes, and good logging
Pros and Cons
  • "We can track logs of each firewall which is very helpful."
  • "They need to make a Mac version of the SmartConsole, in my opinion."

What is our primary use case?

We deployed the Check Point firewall for protecting our web servers and intranet servers. We used a management server as a centralized device for Check Point Gateway firewalls.

The best aspect about the notion is that we can push policy, IPs, or any other functionality to all or a subset of gateways. Alternatively, creating a distinct tab for each gateway gives a clear idea of the configuration changes and makes them less complicated.

Check Point's solution cuts down on the time it takes to manage multiple firewall devices.

How has it helped my organization?

Our organization has faced multiple attackers daily which causes high-impact performance, even though the previous firewall blocks. This leads to an impact on customer satisfaction with our services.

However, after deploying Check Point firewalls in our organization we found drastic changes in the performance of our network   

The management server helps us to reduce the time to manage multiple firewalls.

It's easy to push configuration changes to each of the gateways.

We can track logs of each firewall which is very helpful.

What is most valuable?

The importance of centralized administration cannot be overstated. As a network security engineer, I must mention that it allows us to manage all of our Check Point devices from a centralized point. 

Although there is certainly room for improvement in the UI, I am pleased that Check Point continues to correct and enhance. 

Furthermore, they provide some new features that will revolutionize security administration.

What needs improvement?

Initially, I was not a huge fan of Check Point's SmartConsole; I'm not sure why; perhaps it was because I was used to using only the web interface in other vendor firewalls like Palo Alto, Fortigate, and so on.

Now that I've tried it, I have to say that it's the greatest way to handle firewalls. There are some flaws, however, Check Point is working to correct them with each version.

They need to make a Mac version of the SmartConsole, in my opinion.

Aside from that, I'm satisfied with Check Point solutions.

For how long have I used the solution?

I've used the solution for two years.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Technical Manager at M.Tech
Real User
Easy management, helpful support, and great for tracking logs
Pros and Cons
  • "The log dashboard in the SmartConsole is very useful and convenient for monitoring and tracking."
  • "Installing a policy takes a very long time to complete."

What is our primary use case?

With Security Management solution, we can manage and distribute security policies to firewall gateways. In large environment where there are dozens of Check Point appliances from Headquarter to branches, I deployed the Security Management with thousands of rules for an enterprise. I created different security packages for each gateway/cluster pair for administration purpose while maintaining separation and ease of policy installation. With every change request, we just need to configure the relating package and install to right gateways. Besides log dashboard in smartconsole is very useful and convenient for monitoring and tracking. It provides intuitive interface to search log, operation to filter is very to understand

How has it helped my organization?

With Check Point Security Management, we can:

- Manage and configure cluster for Check Point Gateways. Define security zones (internal, dmz, external) on interfaces.

- Add, modify, delete security rules, objects and install to gateways.

- Activate or de-activate blades like Mobile Access, IPS, URL Filtering, Application Control, Identity Awareness, Antivirus,... to the selected gateways and configure the security settings on them.

- Track and monitor security logs.

- send commands to the Management API. Supporting Management API helps automated tasks for daily operation or integrate with third-party solution SIEM/SOAR.

What is most valuable?

The most valuable feature is Management API. It has been supported since R80 and above. Why? For firewall administrators who handle many tasks daily on not only Check Point systems. They are flooded with their boring manual tasks but always got stuck with request tickets. For security analysts who work with numerous logs from many sources and take actions to stop attacks. Can analysist and protection be highly effective if they must take much time in implementing policies? All limitations above can be solved with Check Point Management API. The administrators can automate and improve their productivity in operation by scripting. The security analysts can immediately apply security settings on the firewall while saving their time and concentrate on their research job. This feature is very useful and Check Point works great job to support many security aspects with easy-to-understand guide.

What needs improvement?

In complex environment, the Security Management system manages many firewall gateways. There are thousands of security rules in the server and there are also other security settings about Check Point blades. Database in the server becomes large. Hence installing policy takes very long time to complete. Imagine that the administrators must process their daily tickets. They make configuration changes in Smart Console of Management Server for the first ticket, and while waiting for installation completion, then they receive the second ticket, a critical case, what should they do? This is only one of the situations that the administrators are facing in operation. Hope that Check Point can improve the processing time of installation.

For how long have I used the solution?

More than 5 years

How are customer service and support?

Check Point TAC team is very professional.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Only manage Check Point gateways by using Check Point Management Server. I used other firewall vendors like Cisco, Fortinet but Check Point is much better about stability and performance. So using central management for Check Point is best choice.

How was the initial setup?

Easy of setup

What about the implementation team?

I always implement by myself because it's very easy to implement.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1858884 - PeerSpot reviewer
Network Administrator at a computer software company with 1,001-5,000 employees
User
Top 20
Good dashboards and nice SmartView monitor but the SmartConsole doesn't work with Mac OS
Pros and Cons
  • "The compliance is great."
  • "Being a security appliance, there should be the ability for the Security Management server to send email alerts via authenticated email."

What is our primary use case?

Check Point Security Management is primarily used for managing our security gateways that are deployed in multiple offices around the world. We have 20+ gateways in total. 

Security management also has reporting functionality which can be passed off to our internal security team as well as our senior leadership team. 

SmartView is also a handy utility that allows our system admins to have insight into the network traffic which reduces the need to contact the network support team each time something is not functioning.

How has it helped my organization?

Check Point Security Management has improved the organization and it assists with easy manageability of all of our globally deployed gateways which if they were not centrally managed, would be very time-consuming to manage. 

The compliance blade provides detailed reports in regards to our policy configuration and global configuration of the gateways which can be easily read to determine if something needs to be actioned. It also contains multiple different other reports that can be utilized by various other departments.

What is most valuable?

The compliance is great. It verifies the overall compliance of all of the gateways and attached policies against standards. It offers ready-to-use reports that are detailed.

The SmartView monitor is helpful. Having the ability to give read-only access to our system admins where they can look into the firewall logs is a huge plus and reduces the load on the dependency of the network admins. Also, it is very handy in that it is a web console and not an application that needs to be installed on your computer to view the logs. 

It displays very nice dashboards.

What needs improvement?

Being a security appliance, there should be the ability for the Security Management server to send email alerts via authenticated email. One of our requirements from the organization is to not use unauthenticated email and to only use authenticated email which this does not support.

SmartConsole should be available for MacOS machines. Not every Network/Security administrator utilizes a Windows machine. Being a Mac user, I need to have a VM with SmartConsole installed in order to be able to manage my gateways. I have heard the newer versions allow management through a web version however I have not tested it as of this moment.

For how long have I used the solution?

I've been using the solution for more than three years.

What do I think about the stability of the solution?

The solution is very stable.

What do I think about the scalability of the solution?

In terms of scalability, the licensing is restrictive and are cookie-cutter solutions for a number of gateways.

How are customer service and support?

The L1/L2 agents seem inexperienced. Cases often need to be escalated. 

How would you rate customer service and support?

Negative

Which solution did I use previously and why did I switch?

Yes, we did use something else. We switched as we were looking for something that had a bigger feature set.

Which other solutions did I evaluate?

We looked into SonicWall and Palo Alto.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Systems Engineer at Starlabs Limited
Real User
Great smart event feature and smart console with an easy to use interface
Pros and Cons
  • "The interface also makes it easy for us to configure the VPN from the GUI rather than the command line, which makes it easy even for less experienced engineers to work with."
  • "It could improve by showing DNS-specific information for connections to unknown public IPs."

What is our primary use case?

The solution is used to manage security gateways. We use the management server to manage our firewalls, one at DR and the other at HQ. 

The Management servers are also used to manage security policies to determine who or what system should connect to what. This allows us to block applications that are not needed per department. For example, Facebook is blocked for everyone except the marketing team. This helps keep people more productive. We also use the rules to prevent users from visiting dangerous and illegal sites.  

How has it helped my organization?

It has helped improve work in our organization. Check Point Management tracks a lot of activities on the network such as who is connecting to what sites and applications. 

It has also provided visibility into who is connecting to the corporate network via VPN and at what time which helps us keep unauthorized users away. 

The interface also makes it easy for us to configure the VPN from the GUI rather than the command line, which makes it easy even for less experienced engineers to work with. 

The management also gives visibility into licenses and device-related information to help track how long you have till licenses expire and the software and hardware health of devices. 

What is most valuable?

The smart event feature is the most valuable. The consolidated logs give full network visibility. 

The smart console has been able to provide us with good detailed information and reports ranging from bandwidth, risky applications, IPS reports, VPN reports, and infected hosts on the network. 

Reports help determine which machines may be infected with bots if they indicate that they were trying to connect to command and control servers, smart event helps determine these machines by IP address or username. 

The IPS also indicates what attacks and from where we're trying to hit our organization which helps us twerk our settings accordingly to have the most security we can get. 

What needs improvement?

It could improve by showing DNS-specific information for connections to unknown public IPs. 

Check Point could also improve management by not having applications for each version released because we have to install a new application for every version it is not very nice. They could do that by moving management to the web so that we do not have to install a client for every version. 

The fact that you have to connect to two different applications for management, does not make it the most usable. It could be great to have a system setting and policy setting done from one interface. 

For how long have I used the solution?

I've been using the solution for four years.

What do I think about the stability of the solution?

It's a very stable solution and Check Point is always doing proactive support to avoid any future problems or failures. Checkpoint support fixes bugs that they discover before the implemented production systems are affected. By logging a call with the customer and helping them remediate problems before they occur. 

What do I think about the scalability of the solution?

It is reasonably scalable as you are able to manage five gateways with one management server at entry-level.

How are customer service and support?

The solution offers very good customer support. The engineers respond on time and are available to help even if it means setting up a call to help you in implementing the given instructions.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup was straightforward. The prompt to install and the setup guide will get you through the process. When you're unclear, there are plenty of online resources to help.

What about the implementation team?

We did the implementation in-house.

What was our ROI?

The solution is definitely worth it as it helps put policies that help people focus more on work than play to use company resources more efficiently.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. We manage checkpoint products for 10 of our customers and we are checkpoint partners
PeerSpot user
reviewer1721694 - PeerSpot reviewer
Network Security Engineer at Atlantic Data Security
User
Good performance monitoring with good configuration capabilities and the ability to view logs
Pros and Cons
  • "We love the ability to monitor performance in real-time, and gather critical information about network flows and traffic."
  • "Check Point could possibly lighten up the software code so that it is not as resource-intensive and will run more smoothly on a variety of hardware and cloud or virtual machine platforms."

What is our primary use case?

We work with multiple clients managing their network firewalls. This includes many multi-national networks as well as local systems in the U.S.A. 

We primarily are utilizing these products for managing customer/client environments to modify access rules and other policies for controlling traffic to and from both internal and external networks as well as cloud-based Azure systems. 

Check Point management products are in use in all these networks, including both standard Single Management Servers as well as Multi-Domain Management servers.

How has it helped my organization?

Check Point Security Management has always made it simple and easy to manage all our firewall systems and firewall policies. 

Check Point Security Management systems, both standard Single Management Servers as well as Multi-Domain Management servers, have made it very simple and easy to perform daily functions such as adding new user hosts or destination servers to existing firewall policy rules and successfully managing large corporate networks easily from both our office space or from remote worker systems.

What is most valuable?

We love the ability to monitor performance in real-time, and gather critical information about network flows and traffic. 

The controls for creating, modifying, and editing firewall policies, firewall configurations, and other system operations are very simple and seamless. Accessing and viewing logging from many firewalls worldwide is also made very simple and intuitive with the ability to see both an overall picture of the logging, as well as the ability to filter down to the most specific traffic flows.

What needs improvement?

Sometimes there are some performance issues that cause certain operations to run slowly, however, that may just be due to the hardware it is running on needing to be stronger. Check Point could possibly lighten up the software code so that it is not as resource-intensive and will run more smoothly on a variety of hardware and cloud or virtual machine platforms. 

More ability for users to generate reports for traffic flows, firewall performance factors like CPU, memory usage, total bandwidth consumption, and tracing heavy traffic (elephant) flows would also be great.

For how long have I used the solution?

I've used the solution for over seven years.

What do I think about the stability of the solution?

So far, we have not experienced really serious issues with the stability of the platform.

What do I think about the scalability of the solution?

Check Point Security Management is pretty robust at allowing the management of large numbers of firewalls - especially the Multi-Domain systems.

How are customer service and support?

Though we do not need to utilize the support services often, they have always been prompt and courteous, and definitely knowledgeable.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Some of our clients have switched from other firewall solutions such as Fortinet or Palo Alto, however, they were not happy with these systems for various reasons.

How was the initial setup?

These systems are pretty straightforward to install and implement.

What's my experience with pricing, setup cost, and licensing?

Check Point seems to be reasonable with its pricing, and competitive in the market.

Which other solutions did I evaluate?

Sometimes our clients look at other options such as Palo Alto, or even a blend of these and Check Point.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1658724 - PeerSpot reviewer
Assistant Manager IT Operation at a tech services company with 10,001+ employees
Real User
Great for securing our network perimeter with good scalability and stability on offer
Pros and Cons
  • "Mobile access has helped us cater to more than 4000 users so that they can work from home."
  • "It would be helpful if we could enable URL and application traffic control remote access."

What is our primary use case?

We use Check Point Security Gateway GAIA R 80.40 as our secure gateway firewall. We have configured two gateways as active-passive in cluster mode. We also use R 80.40 as our security management server to configure the policies on the firewall. We use it primarily to control traffic and secure our network perimeter against unknown attacks. The different rules and policies for the SSL VPN connections are configured on the mobile access blade. We use the policies to segregate and filter the traffic flow. 

How has it helped my organization?

Check Point Security Management GAIA R 80.40 tremendously helped us in securing our network perimeter against various threats. 

We have used the access rules and application/URL filtering blades to filter and restrict unwanted traffic. 

The IPS blade, Antivirus blade, Anti-bot blade, Threat Emulation blade, and Threat Prevention blades are helping us tremendously in preventing attacks and thus take care of the threats at the gateways themselves. 

At the time of COVID, the Mobile Access blade has helped greatly in the smooth running of production.

What is most valuable?

We have found all the security blades very helpful. The IPS blade, Antivirus blade, Anti-bot blade, Threat Emulation blade, and Threat Prevention blades have been most useful in securing the network. 

With the antivirus, IPS, and Anti-bot blades signatures being automatically updated regularly on a daily/hourly basis, the network is always safe. 

The URL and Application Filter blade offers a daily update of the database which helps us control the traffic. 

Mobile access has helped us cater to more than 4000 users so that they can work from home.

What needs improvement?

The Security Management server could be improved. If it provided an inbuilt authenticator for multifactor authentication, that would be ideal. Currently, we have to depend on a third party for multifactor authentication. 

It would help us greatly in securing the remote access users if Mac binding can be done for remote access VPN users in mobile. It would be helpful if we could enable URL and application traffic control remote access. 

The logging and reporting are good, but it would be helpful if more report templates were available.

For how long have I used the solution?

I have been using Check Point Security Gateway for more than 7 years.

What do I think about the stability of the solution?

The stability is great.

What do I think about the scalability of the solution?

The scalability is great.

How are customer service and support?

Technical support is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

The company has been using Check Point for a long time. It's been more than 10 years. I have been with the company for past 7 Years.

How was the initial setup?

The initial setup is straightforward.

What about the implementation team?

We had assistance from our Vendor Team (ISecurenet). They are very good.

What was our ROI?

Our ROI has been above expectations.

What's my experience with pricing, setup cost, and licensing?

The price is high but worth it.

What other advice do I have?

Check Point is one of the top leaders in security solutions.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.
Updated: August 2025
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.