Our company works in developing and delivering online gambling platforms. The Check Point Gateways are the core security solution we use to protect our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two Check Point HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management server on a Virtual Machine (KVM), all running on R80.10 with the latest Jumbo Hotfix Accumulators installed (Take 275). The Security Management server has the following blades activated - Network Policy Management, Logging & Status, User Directory, Compliance, SmartEvent Server, Provisioning.
Senior Network and Security Engineer at a computer software company with 201-500 employees
Everything is configured in one place in the unified SmartConsole, which helps me save working time
Pros and Cons
- "As the security administrator, who is responsible for the day-to-day tasks (e.g. creating new firewall rules, monitoring the security alerts and incidents etc.) and the maintenance (e.g. installing the new Jumbo Hotfixes), I find the Check Point Security Management R80.10 to be the great solution."
- "I like that the Compliance software blade is available for free with the Security Management server purchase, but it is free for only one year - after that you have to buy an additional license to continue using it. I think such an important feature is vital for the management server, and should not be licensed separately."
What is our primary use case?
How has it helped my organization?
The overall security of the environment has been greatly improved by the Check Point solution. Before implementing that, we have to rely on the Cisco ACLs and Zone-Based firewall that we had configured on the switches and routers, which in fact was just a simple stateful firewall, and all the devices had to be managed locally via SSH. Now, with the Check Point Security Management server in place, we have a central endpoint to manage all the security aspects for the environment - the SmartConsole. That helped to decrease the management overhead, as well as to improve the usability and feasibility of the security.
What is most valuable?
As the security administrator, who is responsible for the day-to-day tasks (e.g. creating new firewall rules, monitoring the security alerts and incidents etc.) and the maintenance (e.g. installing the new Jumbo Hotfixes), I find the Check Point Security Management R80.10 to be the great solution.
Now everything is configured in one place - the unified SmartConsole, which helps me in saving the working time and not jumping from one console or dashboard to another constantly. The interface is cozy and modern. I especially like built-in searching capabilities - you may not just find the objects, but also see where exactly it is used across the whole security policy. Also, now the latest logs may be seen in the security policy as well, per matched rule.
What needs improvement?
I like that the Compliance software blade is available for free with the Security Management server purchase, but it is free for only one year - after that, you have to buy an additional license to continue using it. I think such an important feature is vital for the management server, and should not be licensed separately.
Also, the SmartConsole application used for management is currently available only for Microsoft Windows OSes. I think many administrators use macOS and Linux, so it would be nice to have native apps for these platforms as well.
Buyer's Guide
Check Point Security Management
June 2025

Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
For how long have I used the solution?
My current company has been using the Check Point Security Management for about three years, starting late 2017.
What do I think about the stability of the solution?
The Check Point Security Management server version R80.10 we use is stable and mature solution.
What do I think about the scalability of the solution?
One virtual machine we use for the Security Management is enough for managing 2 clusters, and there is a huge "space" if we decide to scale the DataCenter up.
How are customer service and support?
We have had several support cases opened with the Check Point, but none of them was connected with the Security Management. In. general, I think some cases took to long to be resolved by the Check Point support team - up to one month.
Which solution did I use previously and why did I switch?
We used local ACLs and Zone-Based firewall on Cisco switches and routers, that's incompatible with the centralized management solution like Check Point Security Management.
How was the initial setup?
The setup was straightforward, and the configuration part was easy and understandable - we didn't use any consulting services for that.
What about the implementation team?
The solution has been implemented by in-house team, since we have the Check Point Certified engineer among the technical team.
What's my experience with pricing, setup cost, and licensing?
The Check Point solutions in general are not cheap, so your company should have a dedicated budget for security.
Which other solutions did I evaluate?
We didn't evaluate other vendors.
What other advice do I have?
There's a demo of the Security Management available for free - just download and install the SmartConsole application, and you could see the interface and most of the features available.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Cyber Security Engineer at a tech services company with 11-50 employees
Centralized management, intuitive user interface, and comprehensive security features
Pros and Cons
- "Check Point Security Management Server offers a wide range of security features, including firewall, intrusion prevention, VPN, application control, and threat prevention capabilities."
- "It also offers compatibility with third-party security solutions, however, it is not a lot. This needs to be improved."
What is our primary use case?
Check Point Security Management Server is a comprehensive solution designed to streamline and centralize the management of security policies across an organization's network infrastructure.
One of the standout features of the Check Point Security Management Server is its ability to manage security policies across multiple Check Point security gateways centrally. This centralized approach simplifies policy deployment, monitoring, and updates, making it easier for administrators to maintain a consistent security posture.
How has it helped my organization?
The Check Point Security Management Server has the ability to centrally manage security policies across multiple Check Point security gateways. This centralized approach simplifies policy deployment, monitoring, and updates, making it easier for administrators to maintain a consistent security posture.
It offers high-performance capabilities to handle large volumes of traffic while maintaining low latency, ensuring minimal impact on network performance. This product greatly improved our company customers and allowed us to implement the solution easily.
What is most valuable?
The most valuable aspects of the solution are:
1. Centralized Management: It can centrally manage security policies across multiple Check Point security gateways. This centralized approach simplifies policy deployment, monitoring, and updates, making it easier for administrators to maintain a consistent security posture.
2. Intuitive User Interface: The management console provides an intuitive user interface that allows administrators to configure and monitor security policies with ease. The interface is well-designed, with clear navigation and comprehensive options for managing security rules, network objects, and logs.
3. Comprehensive Security Features: Check Point Security Management Server offers a wide range of security features, including firewall, intrusion prevention, VPN, application control, and threat prevention capabilities. These features work together to provide multi-layered protection against various cyber threats.
What needs improvement?
Check Point Security Management Server integrates seamlessly with other Check Point security products, providing a cohesive security ecosystem for organizations. It also offers compatibility with third-party security solutions, however, it is not a lot. This needs to be improved.
Check Point offers comprehensive product support and documentation, including online resources, knowledge bases, and technical support services. This ensures that administrators have access to the assistance they need to deploy and maintain the Security Management Server effectively, but when customers raise issues, the support is not satisfactory and timely.
For how long have I used the solution?
I've used the solution for more than one and a half years.
Disclosure: My company has a business relationship with this vendor other than being a customer: My company resell's and implement this product means it's a partner of checkpoint.
Buyer's Guide
Check Point Security Management
June 2025

Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
Consultant, Reseller and IT Infrastructure Projects at Elytelec
Enhanced security with centralized control for threat prevention
Pros and Cons
- "It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering."
- "They could offer educational courses to help individuals improve their knowledge and skills."
What is our primary use case?
Check Point plays a crucial role in enhancing our security firewall solution in our company. It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering.
What is most valuable?
The most valuable feature for me is the firewall. Whether it's five stars or even higher, the analytics reports it provides are truly impressive. They offer valuable Key Performance Indicators (KPIs) that shed light on various situations and different logs.
What needs improvement?
They could offer educational courses to help individuals improve their knowledge and skills.
For how long have I used the solution?
I have been working with it for two years now.
What do I think about the stability of the solution?
It provides good stability features. I would rate it eight out of ten.
What do I think about the scalability of the solution?
I would rate its scalability capabilities nine out of ten.
Which solution did I use previously and why did I switch?
In my previous company, I had experience using Fortinet and Palo Alto.
How was the initial setup?
I find that the setup process is somewhat distinct from other solutions. I believe that having some guidance from the website or tutorials would make it easier.
What other advice do I have?
I strongly recommend this solution because it's a highly effective and reliable choice. I would rate it nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior cyber security specialist at Optiv
Good network and endpoint security with good connectivity
Pros and Cons
- "The cluster solution made our job easier any fault to the device will not halt entire internet connectivity."
- "The application filtering and URL filtering could be better."
What is our primary use case?
We use the solution for ensuring the on-premise and cloud-based infrastructure through the Check Point gateway solution. We're applying the solution to the endpoint and running all threat prevention technologies simultaneously, including full SSL traffic inspection, without compromising on security or performance.
As compared to the other vendors like CISCO ASA, Juniper, and other vendors it's nice to see maximum futures in the single firewall. The site and remote VPN deployment are very easy and troubleshooting the issues is also very easy.
How has it helped my organization?
The cluster solution made our job easier any fault to the device will not halt entire internet connectivity. In that case of the performance, we have zero-downtime upgrades and VPN solution deployments.
Check Point Software Technologies (Check Point for short) is a company operating exclusively in the field of Information Security and covering four main areas:
- Network Security on the perimeter and inside Data Centers.
- Cloud Security: Public, Private, and Hybrid.
- Endpoint Security for both Windows and Macs.
- Mobile Security for Android and iOS devices.
What is most valuable?
The solution offers ClusterXL, Secure XL, and Core XL.
When working with it, you will encounter three main components: Security gateway, security management server, and Smart Console.
Customer support is very good and they have depth knowledge on the particular technology which helps us in fixing the problems ASAP.
Remote and site-site VPNs we can easily deployable and maintenance upgrade of the tunnel parameters becomes very easy as this is having the simple smart console access to the gateways.
Also the multi-domain smart dashboard is another capability to manage multiple firewall through the single console.
What needs improvement?
The application filtering and URL filtering could be better.
They need to improve on this kind of technology as the Palo alto is ahead of the application-based and zero-trust-based approach also the cloud-based application control also user identification through the LDAP and other user directory settings to provide the proper solution.
Check Point has a complex range of reporting tools, some of which can take time to learn and be comfortable with.
It is advised to make the processes simpler.
Need to have simple scripting and automation methodology to automate the networking operations.
For how long have I used the solution?
I've used the solution for more than six years.
What do I think about the stability of the solution?
It's stable.
What do I think about the scalability of the solution?
It's a good product that's scalable.
How are customer service and support?
Technical support is nice.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
How was the initial setup?
The solution is straightforward.
What about the implementation team?
We implemented it with the help of a vendor.
What was our ROI?
The ROI is good
Which other solutions did I evaluate?
I did evaluate ASA, Palo Alto, and Firepower solutions.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Head of IT Director at Cosyn Limited
Effective threat management and comprehensive protection against vulnerabilities
Pros and Cons
- "Check Point has been very effective in terms of threat management and comprehensive protection against vulnerabilities, and it has given us confidence that our data is not going anywhere."
- "The tracking of new threats could be improved."
What is our primary use case?
I mainly use this solution for endpoint security, to capture data with a secure approach.
How has it helped my organization?
Our data is the most important thing, therefore, it's essential that it be secured. Checkpoint has been very effective in terms of threat management and comprehensive protection against vulnerabilities, and it has given us confidence that our data is not going anywhere.
What needs improvement?
The tracking of new threats could be improved.
For how long have I used the solution?
I've been working with this solution for a couple of years.
What do I think about the stability of the solution?
Check Point's stability is good.
How are customer service and support?
My experience with technical support has been good.
How was the initial setup?
The initial setup is straightforward.
What was our ROI?
The return on investment is that our data is safe, Check Point offer upgrades, and we get the best possible cost-effective price.
Which other solutions did I evaluate?
I looked at Sophos, but Check Point's security coverage is better.
What other advice do I have?
I would definitely recommend this solution to anybody thinking of implementing it. I would give it a rating of nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Systems Administrator with 201-500 employees
Affordable, easily deployable, user-friendly security management
Pros and Cons
- "This solution is easy to install and deploy. It is also user-friendly."
- "I would like for users to have more control over the platform in the next release. Right now, the system is very central and general requiring new rules to be created that better-suite our requirements."
What is our primary use case?
This solution is used to control OPC's. You are also able to generate reports with it.
How has it helped my organization?
Our organization is now able to easily see if our computers are running smoothly or not.
What is most valuable?
This solution is easy to install and deploy. It is also user-friendly.
What needs improvement?
I would like for users to have more control over the platform in the next release. Right now, the system is very central and general requiring new rules to be created that better-suite our requirements.
For how long have I used the solution?
I have been using this solution since 1993.
What do I think about the stability of the solution?
This is a stable solution.
What do I think about the scalability of the solution?
This is a scalable solution, we currently have three to four hundred users.
How are customer service and support?
We hardly contact Check Point support thanks to help from our partner. However, if there is an issue neither of us can resolve, we open a case with Check Point and they are able to resolve the issue quickly.
Which solution did I use previously and why did I switch?
We were using Symantec for its antivirus and backup capabilities, but now that Check Point offers antivirus, we are only using Symantec for backups. And Check Point is one fourth of the price!
How was the initial setup?
The initial setup was not complex. There was still a bit to learn with the program, but it was not complex. Initial installation took about a day and a half and it took one week for deployment in total after running some tasks.
What about the implementation team?
We had support from a Check Point partner perform the initial setup. We now have four members of our technical group maintaining the solution.
What's my experience with pricing, setup cost, and licensing?
Check Point is much cheaper than the competition ($4/server as compared to $17/server).
What other advice do I have?
I would rate this solution an eight out of ten (nine for its antivirus capabilities).
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
ICT at a manufacturing company with 501-1,000 employees
Allows for easy filtering, is easy to manage, and has a beautiful interface
Pros and Cons
- "Check Point Security Management has improved our organization because all corporate firewalls can be managed with a single interface."
- "The graphical interface is nice but it is a bit heavy."
What is our primary use case?
We use this solution to manage and configure all of our firewalls distributed across multiple remote locations. We can do it with a single interface where policies are created, managed, and distributed across all locations.
How has it helped my organization?
Check Point Security Management has improved our organization because all corporate firewalls can be managed with a single interface. Many objects are common in the policies of the various sites, thus saving time when it is necessary to create or modify access policies.
What is most valuable?
Check Point Security Management has a beautiful interface for viewing logs and access reports. You can create many filters and run queries from a modern graphical interface without resorting to shell commands.
What needs improvement?
The graphical interface is nice but it is a bit heavy. Even installing the policies is often a very slow activity. Sometimes it happens that the rules are scattered in several points such as global properties, security policy, and/or application policy and it is difficult to find the point where to intervene
For how long have I used the solution?
I've been using Check Pont for 15 years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Works at a financial services firm with 5,001-10,000 employees
Good access control, security control, and threat prevention, but needs better support and a workflow for user authorization
Pros and Cons
- "It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution. Check Point is effective when it comes to security control and threat prevention."
- "Support is the main area that they need to improve. Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region. I would like a feature where there is a workflow to provide authorization to some users before they're able to create and apply rules. Such a feature should be integrated with the management. It should not be in the box that comes with it."
What is our primary use case?
We use it for both perimeter and internal defense.
What is most valuable?
It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution. Check Point is effective when it comes to security control and threat prevention.
What needs improvement?
Support is the main area that they need to improve. Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region.
I would like a feature where there is a workflow to provide authorization to some users before they're able to create and apply rules. Such a feature should be integrated with the management. It should not be in the box that comes with it.
For how long have I used the solution?
I have been working on the protection network since 2014. It has been around seven years.
What do I think about the stability of the solution?
So far, it has been stable, but stability also depends on your design and deployment. You might have a performance issue, especially when you have to deal with a lot of traffic. You also need to factor in maintenance in terms of the upgrades, patches, and hotfixes that you need to do regularly. When you're able to do that and take care of the maintenance, you'll have stability.
What do I think about the scalability of the solution?
Scalability depends on your design. You have to properly scope your environment to know the amount of traffic that is expected to go through, pass, or transmit through the firewall. After you have a proper scope, you won't have any problems. Otherwise, you'll definitely be experiencing issues.
How are customer service and technical support?
Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region.
How was the initial setup?
As compared to other security and firewall solutions, its deployment is not that easy. The deployment duration depends on your project plan. It also depends on whether you are working just on the deployment, and there are no distractions.
What about the implementation team?
In terms of those who manage the rules and administer the system, we have about ten people. They are administrators, and they create rules, manage the system, and provide support.
Which other solutions did I evaluate?
I wasn't a part of the team that did the evaluation.
What other advice do I have?
I would advise others to properly apply good design concepts by engaging professionals. They should properly scope their environment to ensure that they are deploying the solution to optimized standards. They should also ensure that they train their personnel to be able to handle the first level and even second level support when it comes to the management of Check Point.
I would rate Check Point Security Management a seven out of ten considering the skills that are required and the ease of use and management.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Popular Comparisons
Splunk Enterprise Security
IBM Security QRadar
Elastic Security
Security Onion
LogRhythm SIEM
Fortinet FortiAnalyzer
VMware Aria Operations for Logs
ManageEngine EventLog Analyzer
ArcSight Logger
SlashNext Complete
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- When evaluating Log Management tools and software, what aspect do you think is the most important to look for?
- Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
- Which Windows event log monitoring tool do you recommend?
- What is the difference between log management and SIEM?
- Splunk vs. Elastic Stack
- How can Cloudtrail logs be used effectively to improve log monitoring?
- Why hot data and cold data differences in SIEM solutions are not discussed sufficiently?
- When evaluating Log Management solutions, what aspect do you think is the most important to look for?
- When evaluating Log Management solutions, what aspects do you think are the most important to look for?
- Why are Log Management tools important for companies?