Try our new research platform with insights from 80,000+ expert users
reviewer1853907 - PeerSpot reviewer
Sr. Security Infrastructure Engineer at a computer software company with 1,001-5,000 employees
Real User
May 9, 2022
Fast installation, good logs, and quick to learn
Pros and Cons
  • "The rulebase management and the shared layers concept is implemented well."
  • "The upgrade procedure already made huge improvements, yet it remains more challenging compared to other products."

What is our primary use case?

As a consultant for a security infrastructure consulting firm, I install and integrate this solution at client premises. There are many types of client domains, such as financials, government, healthcare, etc. 

It's a stable and complete product that is easy to use and capable of managing their next-gen firewall infra around the globe without compromises. 

Once the Check Point infra is up and running, clients really appreciate its capabilities of centrally managing security rules, making traffic flows visible, and quick detection and response capabilities in case of issues.

How has it helped my organization?

It allows clients to quickly learn about the product and its capabilities and thus focus quickly on what really matters, security. 

The concepts are easy to understand but powerful. As the management is easy and fast, the workload is less compared to other products. Access can be restricted granularly so different types of profiles can access the management solution without the risk of breaking anything. The helpdesk people can investigate the first line and provide findings to other teams for solution implementation. 

What is most valuable?

The rulebase management and the shared layers concept are implemented well. It avoids double work and reduces the risk of human errors. It makes the management solution very scalable.

Working with multiple administrators is possible. Changes are visible to others once you publish changes.

Investigating logs is easy and fast. The search results are provided with all details, so an in-depth analysis of problematic flows is easier.

Installation of policies is fast. For R81.10+ releases, it's a matter of seconds (compared to many minutes in the past).

What needs improvement?

The upgrade procedure already made huge improvements, yet it remains more challenging compared to other products. However, everything is well documented and the Check Point support is very skilled, so risks are rather limited. 

As this is probably the most complete product within its segment, no huge improvements are required from my point of view. Another problematic point, the policy installation duration time is solved since version R8x, so that's good. Clients always tell me: "Check Point is the Rolls Royce within this segment, it is outstanding". 

Buyer's Guide
Check Point Security Management
January 2026
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
879,899 professionals have used our research since 2012.

For how long have I used the solution?

I've been using the Check Point Management solution for more than 15 years.

What do I think about the stability of the solution?

It's very stable with no remarks. Fixes are provided on a regular basis and are easy to install. 

What do I think about the scalability of the solution?

Scalability is very good. Hardware appliances are available and virtual instances can be installed. It is possible to install, for huge deployments, the multi-domain Server. Multiple instances can be installed for redundancy purposes. 

How are customer service and support?

They have excellent support which has improved a lot during the last years.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We implement other solutions, such as the Fortigate (Fortinet), PAN, and Cisco Secure Firewall (Firepower) with FMC.

How was the initial setup?

The initial setup and installation are easy.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. We at NTT are a reseller of security products, including Check Point.
PeerSpot user
PeerSpot user
Contracted IT Staff at a government with 501-1,000 employees
Real User
May 9, 2022
Good functionality with a strong user community and fair pricing
Pros and Cons
  • "The layered architecture is really understandable and easy to use."
  • "Policy installation time can be reduced."

What is our primary use case?

Security Management Server is easy to configure. We have more than six security gateways in different locations. It is easy to manage security gateways separately from Security Management Server. 

Also, we use a security management server as a log collector. Security Management Server is easy to configure. 

How has it helped my organization?

We can separately manage and install policies for all gateways. It has separated by blades. It is so flexible. Jumping from one blade to another is really simple. R80.x versions are better than R77.x versions. 

What is most valuable?

The log section is really good to understand and is really fast. 

The layered architecture is really understandable and easy to use. 

Event correlation function is really brilliant. 

Check Point provides one application with all your needs with the management system.

I do not need to log in to another application or website to see inputs and outputs. 

The monitoring is the best.

The solution offers:

  • Strong user community
  • Product functionality and performance
  • Financial/organizational viability
  • Strong services expertise

What needs improvement?

Policy installation time can be reduced. Proof of concept really matters on this subject. Every organization's needs are different and unique. Therefore, before you purchase the product, use proof of concept as much as you can. 

For how long have I used the solution?

I have been using Check Point Security Management for more than seven years.

What's my experience with pricing, setup cost, and licensing?

The pricing is not bad.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Security Management
January 2026
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
879,899 professionals have used our research since 2012.
Senior Systems Engineer at a energy/utilities company with 51-200 employees
Real User
Mar 4, 2022
Great single management interface with helpful technical support and easy monitoring
Pros and Cons
  • "The product has done a great job in protecting our business network and SCADA systems."
  • "Some of the configuration elements could be improved."

What is our primary use case?

We use the solution for cybersecurity.  

We use a Check Point internet security appliance and have recently purchased their endpoint security solution.  

We have found the systems easy to manage and monitor. These systems are providing critical security to our computing systems. Past systems have required multiple products from multiple vendors. The Check Point solution provides multiple products under a single interface, greatly simplifying my job.  

We have yet to implement all of the blades/features of the Check Point solution, however, we are very happy with those we have used.

How has it helped my organization?

The product has done a great job in protecting our business network and SCADA systems.  

The single management interface has simplified our procedures. Training has been easier since there is only one interface to learn, not multiple interfaces from multiple vendors.  

As we implement more features of the security appliance, we find more value in it. Our cybersecurity posture is stronger than it has ever been with the addition of the Check Point appliance. 

We look forward to implementing additional features of the system.

What is most valuable?

The single interface to manage multiple cybersecurity platforms is great. In the past, we had multiple security appliances from multiple vendors. Each of these had their own interfaces and their own peculiarities. Staff had to learn multiple interfaces to provide our systems with cybersecurity. Additionally, when there was an issue, multiple systems needed to be checked to clarify and remedy the situation. If something was getting blocked incorrectly, we had to search for which systems was blocking it and then determine whether the block was legitimate. With the Check Point appliance, all of the blades are accessible through a single interface. We can easily track the reason for a block.

What needs improvement?

Some of the configuration elements could be improved. 

More automation of the tasks that now need to be performed at the level of the operating system could be made more streamlined. For example, we've often had issues where the log space has filled up. It would really be nice to have a feature in the GUI that addresses the cleanup of old files/logs. This is very much a manual process now. I have to get a putty or WinSCP session to the device and dig through the directory structure to find old files that are safe to delete. Luckily, I haven't accidentally deleted any critical files (so far).

For how long have I used the solution?

I've used the solution for more than five years.

What do I think about the stability of the solution?

We have found the Check Point device to be very stable.  We rarely have to restart the device and have never experienced a hardware issue.  

What do I think about the scalability of the solution?

The scalability is seamless.  

How are customer service and support?

Customer service and support have always been very responsive.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used a Netscreen firewall.   

The Netscreen firewall was limited and we had to rely on other appliances from other vendors to augment its capabilities.

How was the initial setup?

It was a straightforward implementation. We did have a consultant help us in the initial setup of the systems.

What about the implementation team?

The level of expertise of our vendor team was very high.

What was our ROI?

Our ROI is the peace of mind that our systems are well protected.

What's my experience with pricing, setup cost, and licensing?

The Check Point solution is pricy, however, for what you get for your money, it is well worth it.  

The setup is pretty easy and licensing is straightforward.

Which other solutions did I evaluate?

We asked for a recommendation from a security consultant. They indicated that Check Point was the premier vendor of security appliances.

What other advice do I have?

I'm glad we made the decision to use a Check Point appliance and am sure that we will stick with Check Point when we replace our current system.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
LucianoMiguel - PeerSpot reviewer
Security Consultant at a consultancy with 501-1,000 employees
Real User
Jun 30, 2023
A highly accessible and fast tool that provides a very good technical support
Pros and Cons
  • "Regarding the tool's valuable features, I would say that Check Point is a very accessible and fast tool, especially when dealing with logs for the first time."
  • "I guess it lacks in providing visibility of the many incidents."

What is our primary use case?

I use it for managing ten clusters in our on-premise environment. With this kind of management, it's possible to question its policy and change many configurations in the files. With its management, we got all the logs from the environment. With Check Point Security Management, we get the benefits of deploying the configuration.

How has it helped my organization?

Owing to the availability of many kinds of incidents, I can say that the solution has served to improve my organization.

What is most valuable?

Regarding the tool's valuable features, I would say that Check Point is a very accessible and fast tool, especially when dealing with logs for the first time. It is a perfect solution for me.

What needs improvement?

From the Check Point Security Management solution, it's possible to get the situation of my clusters. I guess it lacks in providing visibility of the many incidents. Hence, the visibility of incidents is an area where I want the solution to improve.

For how long have I used the solution?

I have been using Check Point Security Management since 2005, so I have used it for maybe twenty years. Also, I am using Check Point Security Management E84.20.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a ten out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a ten out of ten.

How are customer service and support?

The solution's technical support is very good. Hence, I rate the technical support a ten out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The solution's initial setup was easy.

What was our ROI?

It took a year to see a return on investment. I did experience a return on investment using the solution.

What's my experience with pricing, setup cost, and licensing?

Price-wise, it is an expensive solution.

What other advice do I have?

I recommend the solution to those planning to use it.

I rate the overall product between nine to ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Top 5
Feb 20, 2023
MGMT Security Tool easy control, policies and security.
Pros and Cons
  • "The control is granular, so you can set policy profiles for different organizational profiles."
  • "Some costs are ridiculously high."

What is our primary use case?

Thanks to the new Check Point management, we were able to manage our environments decentrally with a server or from the Check Point Infinity Portal. This management is handled separately and provides greater ease of implementation and backups. You can have your gateways separated from the control server. You can even lose the management server, and easily, with a previous backup, you can restore all the policies that had been generated so that you never lose the operation of the GW.

Our Check Point implementations are quite important in our environment. With them, we were able to shield our infrastructure from modern vulnerabilities.

How has it helped my organization?

The separate management provides greater security and peace of mind. In the face of events in which we can lose communication with the management server, the operation of the Check Point gateways continues unaffected.

We also like the ease and intuitiveness of the management server since it allows you to generate policies in a straightforward way. Its logs and monitoring provide the necessary information so that those responsible for security can make decisions and improve security even more.

The control is intuitive, it's an excellent tool.

What is most valuable?

The monitoring is excellent. It helps a lot in making decisions.

Finally, the additional tools or blades implemented in this console are great. You can go from basic security implementation to a fairly advanced one with all the blades you have available.

The separate environment of the Check Point gateways is one of the most important features. The separate management allows for the continued use of the gateways.

What needs improvement?

As for the support, it is not the best. 

The hours are different from those in America. They generally respond to us at dawn. They are not as fast or efficient, and they could improve in this area.

Every manufacturer must have enough documentation for client implementations and proof of concept. However, Check Point has many outdated manuals. These should be simpler for users and help them to manage their environments with the best practices.

They should improve the ease of licensing.

For how long have I used the solution?

We've used the solution for more than three years. We started using Check Point Security Management and have had very good results in a manufacturer's architecture with excellent performance.

Which solution did I use previously and why did I switch?

Previously, we had WatchGuard to provide security. However, it does not meet the parameters required for our organization.

What's my experience with pricing, setup cost, and licensing?

It is important to value the support of a Check Point partner to validate the tools, in addition to seeing the product more closely.

Which other solutions did I evaluate?

We researched to find the security tool that best suits our requirements.

What other advice do I have?

For us, there are more benefits than failures; it really is an exceptional tool, and I recommend it.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
SameerMogale - PeerSpot reviewer
Independent Business Owner at a tech company with self employed
Real User
Top 5
Feb 18, 2023
It integrates well with my other solutions, but it may be difficult for the average person to use
Pros and Cons
  • "The company uses software called Harmony. Check Point integrates nicely, whether on an endpoint or mobile device. It integrates well with the firewall and can give me reports that I can check without going to an online portal."
  • "You need some technical expertise to use the solution. I don't think it's accessible to the typical end-user. You need to access the box and use some command lines or the web interface. It would be nice to have a user-friendly dashboard and comprehensive reporting."

What is our primary use case?

I am using Check Point to secure my home office because I'm doing all my work from home. 

What is most valuable?

The company uses software called Harmony. Check Point integrates nicely, whether on an endpoint or mobile device. It integrates well with the firewall and can give me reports that I can check without going to an online portal.

What needs improvement?

You need some technical expertise to use the solution. I don't think it's accessible to the typical end-user. You need to access the box and use some command lines or the web interface. It would be nice to have a user-friendly dashboard and comprehensive reporting. 

For how long have I used the solution?

I started using Check Point last year.

How are customer service and support?

I contacted Check Point because the device wasn't logging into the portal to download the license I purchased. It took them about three days to answer.

Which solution did I use previously and why did I switch?

I was using Untangled and switched to Sophos. I decided after a year that Sophos wasn't for me, so I tried Check Point. 

How was the initial setup?

It took me about two hours to do the initial installation, but the total deployment took a day. I did it myself and found it somewhat complicated. You need to know what you're doing. Check Point doesn't provide enough guidance and assumes you know everything. 

What's my experience with pricing, setup cost, and licensing?

I pay for a yearly license, but you have the option of a three-year or a five-year license. 

What other advice do I have?

I rate Check Point Security Management seven out of 10. I recommend it if you're a technical person experienced in WFM security devices. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2000274 - PeerSpot reviewer
Software Engineer at a tech vendor with 201-500 employees
User
Jan 5, 2023
Good malware detection with helpful threat prevention tools and an excellent reporting system
Pros and Cons
  • "The reporting system provides real-time insights into the security situation and shows measures that can be taken to protect our data."
  • "Sometimes the security system slows down when it is overloaded."

What is our primary use case?

The security management platform monitors the performance of applications and the security demands that can secure our data. 

Check Point Security Management has helped us to set secure points across all sectors to filter out harmful content that can destroy confidential information. 

The software has given the IT team access control in setting firewalls and securing cloud-based servers efficiently. 

This product provides comprehensive security coverage services that reduce operational costs. 

This tool has educated our teams and advanced our knowledge of setting effective security.

How has it helped my organization?

This software has improved the security situation in the organization and guarded the most confidential information against landing in unsafe areas. 

Check Point Security Management is the leading threat prevention system that ensures the networking system is protected from external attacks. 

All the departments can easily access security situations on set programs and come up with a suitable strategic plan. 

The reporting system provides real-time insights into the security situation and measures that can be taken to protect our data.

What is most valuable?

The set threat prevention tools have advanced the security monitoring systems and set up reliable data management platforms. 

Security analysis has helped teams in the organization plan and deploy the best security systems for protecting data. 

The malware detection feature has enabled the organization to block unauthorized attacks that can destroy data and leak confidential information.

Check Point Security Management has reduced operational costs and improved overall data security performance. 

Most set features have contributed to security stability in the organization, and I highly recommend this platform to other organizations.

What needs improvement?

This security control system has efficient features that have transformed the company to help it achieve set international standards. 

Most of the features provide excellent services that cannot be extracted from other platforms. 

It can be scaled down to provide services based on the company's demands and lowers operational costs. 

Sometimes the security system slows down when it is overloaded. Poor configurations have led to data leakages and weakened security signals. 

The overall performance has impressed all the team members and provided a secure environment for better workflows.

For how long have I used the solution?

I've been using the solution for 12 months.

What do I think about the stability of the solution?

This platform is highly stable and I recommend it to others.

What do I think about the scalability of the solution?

Check Point Security Management is excellent for setting security plans.

How are customer service and support?

The customer service team has performed well since we started engaging with them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with other similar solutions.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

Implementation was done through the vendor.

What was our ROI?

Our ROI has increased from 45% to 65% since we deployed this application.

What's my experience with pricing, setup cost, and licensing?

The setup cost is efficient.

Which other solutions did I evaluate?

I have not examined other related applications.

What other advice do I have?

I have observed great performance since we deployed this platform.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2040309 - PeerSpot reviewer
Property Accountant at a real estate/law firm with 201-500 employees
User
Dec 2, 2022
Reduces costs, has deep learning threat prevention, and improves internet browsing security
Pros and Cons
  • "Each department can easily share data with the management without fear of data compromise."
  • "It sometimes blocks safe sites when I am researching, affecting the overall output and wasting time."

What is our primary use case?

The application intervenes in security situations in the organization and launches advanced threat prevention measures. 

It has automated security controls that can predict and block malware attacks. 

It is backed by AI deep learning that offers intelligent information and scales performance to unlock hidden malicious behaviors. 

Data fraud cases have reduced since we set up this product as the main security assessment platform. 

Employees can safely browse and share files with their colleagues without fear of external interference.

How has it helped my organization?

We are satisfied with this application as it improves internet browsing security across the organization. 

Each department can easily share data with the management without fear of data compromise. 

It is more flexible than other solutions in the market as it can be deployed in both cloud and on-premise. 

It prevents members from logging in to unsecured sites and running links that may spread viruses to clean data. 

The set features are updated regularly to meet company demands and comply with set community guidelines.

What is most valuable?

The advanced security operational features help the business to identify weak points that can leak data to unauthorized personnel and take necessary precautions. 

Autonomous IoT Security monitors the performance of applications and equips them with safety measures to prevent risks and attacks. 

Deep learning threat prevention has blocked unsafe sites and phishing attacks from cyber attackers. 

It has audited the entire network and removed threat barriers that are used to slow down workflows. 

The cost of running this software has been reduced due to the modern automated version that can work faster without human intervention.

What needs improvement?

Overloading and access to many members simultaneously slow down performance, which can lead to security threats. 

New users working with this software find it hard to integrate effectively with other applications without the input of the customer support staff. 

It sometimes blocks safe sites when I am researching, affecting the overall output and wasting time. 

If the authorization commands are not well set, it slows down the working capacity of the Operating System. 

I love the current version with upgraded features that can block more attacks and protect our work environment.

For how long have I used the solution?

I've used the solution for nine months.

What do I think about the stability of the solution?

The innovative security enhancement models have helped us in curbing most online threats.

What do I think about the scalability of the solution?

There is improved security in communication and internet browsing.

How are customer service and support?

We have achieved most of the set goals due to customer service team transparency and assistance.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This solution has been awesome and offers excellent functionalities.

How was the initial setup?

The setup was relatively complex. That said, the customer service team provided enough assistance.

What about the implementation team?

The vendor team was responsible for setting up everything.

What was our ROI?

The measured ROI has improved from 30% to 55% from the deployment period.

What's my experience with pricing, setup cost, and licensing?

The setup and pricing costs are favorable to many business enterprises.

Which other solutions did I evaluate?

I have no interest in other applications.

What other advice do I have?

This is the best platform for reducing phishing and blocking malware attacks.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2026
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.