Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Technology consultant at a tech services company with 501-1,000 employees
Real User
Easy to set up, helpful support, but the stability needs to be improved
Pros and Cons
  • "The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration."
  • "For those not familiar with the Command Line interface, there should be an option in the GUI for operating backups."

What is our primary use case?

We have a Check Point firewall to secure our perimeter as well as on the internal network. We also have our Security Management server on VM. Both perimeter & internal sets are managed via the same Security Management system.

Two separate packages are created for both perimeter & internal sets.

We are also managing a SandBlast device via Security Management.

Even though all of the work is performed by the gateway, Security Management plays a vital role in a three-tier architecture. Here, our primary use case is to push security policies & manage logs.

How has it helped my organization?

Check Point Security Management is one-stop for all operation-related activity on the Check Point Security Gateway (firewalls).

We have completed one-time implementation configurations, like clustering, using this tool.

Check Point has a very sophisticated log monitor, where troubleshooting is very simple. We just have to put the desired filter, and Check Point generates the reports that help us to understand the overall picture in our network.

We have created multiple users, and they each have a smart dashboard install on their machine.

What is most valuable?

The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration. Logs are collected at the management server, hence we can preserve those as well. 

We can keep on adding new devices that can all be managed from a single security management server.

After the upgrade to R80, we have a single interface for all activities. Previously, we needed to configure using different applications.   

What needs improvement?

It is very difficult to recover policies from the gateway in case if you lose your security management server, and don't have a backup.

The backup functionality (Migrate export command), which covers policies, can not be operated from the GUI. Instead, we have to log into the CLI and generate a file then take it out. For those not familiar with the Command Line interface, there should be an option in the GUI for operating backups. There should also be an option to automatically schedule the backup. 

The smart dashboard is a very heavy application. If we could directly connect & manage firewalls from the Management server itself then it would make it very easy.

Buyer's Guide
Check Point Security Management
June 2025
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.

For how long have I used the solution?

I have been working with Check Point Security Management for more than three years.

What do I think about the stability of the solution?

The stability needs to be improved.

What do I think about the scalability of the solution?

Scalability-wise, it is very good, as it was deployed on VM.

How are customer service and support?

TAC is very supportive but we face many issues with this product.

Which solution did I use previously and why did I switch?

Previously, we had only firewalls & not a management device. 

How was the initial setup?

The initial setup is not very complex & can be done easily.

What about the implementation team?

We are the ones who implemented it.

What's my experience with pricing, setup cost, and licensing?

This product can be used for 25 security gateways on a basic license. I think that this is good value for the money.

Which other solutions did I evaluate?

We wanted to implement Check Point and hence, we did not evaluate others.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
ICT Officer at Kenyatta National Hospital
Real User
Top 20
Has good identification capabilities that link with the Active Directory
Pros and Cons
  • "I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation. These allow me to select to whom to do what, and when."
  • "In future releases I'd like to see better integration with other applications and solutions. Also, the cost of the license is too high, it's too expensive."

What is our primary use case?

We use it for the firewall and the filtration. The accounts are put on a server and even the SmartConsole is installed on a server environment.

What is most valuable?

In terms of most valuable features, I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation. These allow me to select to whom to do what, and when.

What needs improvement?

As for improvement, again, the bandwidth regulation is an issue - it is not up to my expectations. If they could improve that it would be good.

In future releases I'd like to see better integration with other applications and solutions.

Also, the cost of the license is too high, it's too expensive.

For how long have I used the solution?

I have been using Check Point Security Management for the last five or six years.

How are customer service and technical support?

I used to contact customer service, but nowadays, I'm authorized to handle that. We have our own internal team in the company to maintain this solution on our own. I know a few people at Check Point so we work together.

Which solution did I use previously and why did I switch?

Yes, we were using Dell SonicWall.

How was the initial setup?

In terms of initial setup, at the beginning when I was not an expert, it was difficult but now that I'm an expert it is no longer difficult at all.

I don't know how long the setup was the first time since it was done by a client. But nowadays, because I'm an expert, it doesn't take long. It takes about an hour or two and I've done everything.

What other advice do I have?

On a scale of one to ten, I'd give Check Point Security Management a nine because it is not yet available in our country.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Check Point Security Management
June 2025
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
Network Administrator at N S PHARMACY SDN.BHD.
Real User
Good interface, excellent technical support, and very helpful additional features
Pros and Cons
  • "The additional features offered by the solution are excellent. We didn't have a lot fo these on a previous solution, and they've proven to be an advantage for us."
  • "The reporting should be improved in future releases. It needs to be very explicit. This is very important."

What is our primary use case?

We primarily use the solution based on the results that are provided. We've tried others previously and they didn't give us the results we receive on this particular product.

What is most valuable?

The additional features offered by the solution are excellent. We didn't have a lot of these on a previous solution, and they've proven to be an advantage for us.

Based on my personal use of the system, the interface is quite good.

What needs improvement?

It depends on the user, but all of the checkpoints need improvement. The only place I need a bit of an update, for example, is in the endpoint management. There are some policies that are embedded that you have to examine if you have sensitive users. 

For some applications, the default acts as a manager. However, in a system with a history of being breached or where users are given access based on their job function, we seem to have issues particularly there.

The reporting should be improved in future releases. It needs to be very explicit. This is very important.

For how long have I used the solution?

I've been using the solution for about a year.

What do I think about the stability of the solution?

Over the past nine or ten months that we've been using the solution we've found it to be very stable. We haven't had any issues at all. Since we have a monetary drive to enforce stability, when we see a flagged issue we will address it immediately.

What do I think about the scalability of the solution?

The scalability of the solution is excellent. We haven't faced any negative aspects when trying to scale up.

How are customer service and technical support?

The technical support of the solution has been very good. They are much better than what I previously had. I find that we get attention within 24 hours if we flag something. We are purchasing the support so it may be the reason we get such a quick and helpful response.

Which solution did I use previously and why did I switch?

We did previously use a different solution. They didn't have support locally in my country and this was difficult for us. Everything was done via mail or phone and it was not helpful. With this solution, if the situation cannot be remotely addressed within 48 hours, they will come to my office in person and attend to me. It's much better.

How was the initial setup?

The initial setup is very straightforward. Deployment takes about three working days. In our case, we had to import policies from SonicWall but not on the same platform, so we had some little challenges like that, however, overall it was quite straightforward.

We have an in-house team that handles maintenance.

What about the implementation team?

We had an integrator that assisted us with the implementation of the product. We use them for support as well.

What other advice do I have?

We're still in the testing phase in terms of using the solution. Soon, it will be one year since we have fully deployed it. So far, it's been very good. I would rate it eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Mohammed Semmour - PeerSpot reviewer
Scaling Engineer at Lutessa 2S
Real User
A very good management solution with a straightforward setup and good scalability
Pros and Cons
  • "It's a great solution for management. We can manage a lot at the same time with one security management system. Also, each gateway depends on the other, which is helpful."
  • "In the last version from 80.20, there are some issues around SSNA Diction. I would like this to be improved."

What is most valuable?

One of the most valuable features is the console application.

It's a great solution for management. We can manage a lot at the same time with one security management system. Also, each gateway depends on the other, which is helpful.

What needs improvement?

The client of the management needs to be improved. 

The solution is a bit slow. The speed should be improved. 

If there is a possibility to use the URL instead of client management in a future release, that would be ideal.

In the last version from 80.20, there are some issues around SSNA Diction. I would like this to be improved.

For how long have I used the solution?

I've been using the solution for one year.

What do I think about the scalability of the solution?

The solution is scalable.

How are customer service and technical support?

I haven't contacted technical support a lot. I have a colleague that's had issues with a certain version of the solution, and they have made contact. They've had issues, but for me, technical support has always been fine.

How was the initial setup?

The initial setup is not too complex, but those setting it up should have knowledge of Unix as well as some knowledge in Linux command lines. 

What about the implementation team?

We're a partner. We help clients implement the solution.

What other advice do I have?

We are using the on-premises deployment model.

I would rate the solution eight out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1181253 - PeerSpot reviewer
System and Network Engineer at a non-tech company with 1,001-5,000 employees
Real User
Good scalability and a straightforward setup, but the solution needs performance tuning options
Pros and Cons
  • "The firewall's blades are the solution's most valuable feature."
  • "We sometimes have trouble with the performance of the solution. Maybe some performance tuning options could be added in a future release. There should be more visibility about which blade in your firewall is causing the latency."

What is our primary use case?

We are primarily using the solution as a firewall, and for some IPS features as well.

What is most valuable?

The firewall's blades are the solution's most valuable feature.

What needs improvement?

We had a lot of problems with the VPN blade on the solution.

We sometimes have trouble with the performance of the solution. Maybe some performance tuning options could be added in a future release. There should be more visibility about which blade in your firewall is causing the latency. That would be nice as well.

For how long have I used the solution?

I've been using the solution for five years.

What do I think about the stability of the solution?

The stability of the file blade is good. However, there are a lot of blades, and some of the blades have bugs. For example, the VPN is not so stable. Aso, sometimes when we have high loads on our firewall because we have 20,000 users, the Firewall blade also has trouble.

What do I think about the scalability of the solution?

The scalability of the solution is good. However, we have four or five firewalls and that's more than enough, so we don't need to increase the usage. We have about 20,000 users that go through the firewall at this time.

How are customer service and technical support?

We don't go through technical support if we need assistance. We instead go to our consultants which assist us if we run into any issues. The consultants may sometimes open cases, but we have no direct contact with Check Point.

Which solution did I use previously and why did I switch?

We didn't previously use a different solution.

How was the initial setup?

In general, the initial setup was straightforward. Deployment for us took quite long because we migrated in small steps. That was our choice and had nothing to do with Check Point. We have five people managing the solution, and we have two consultants that sometimes help us with some troubleshooting and features.

What about the implementation team?

We used a consultant to assist with the implementation.

Which other solutions did I evaluate?

Before choosing Check Point, we evaluated FortiGate from FortiNet, Sonicwall from Dell and Cisco FW products.

What other advice do I have?

We're using the on-premises deployment model.

I'd rate the solution seven out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Head of IT with 201-500 employees
Real User
Web filtering and built-in VPN are key features, but the user interface is overly complicated
Pros and Cons
  • "Key features include the ability to include logs for everything that you do for admin. Also, it has web filtering built in and VPN."
  • "I would like the ability to have an overview, cross-site: One portal that does all firewalls. Also, the user interface is overly complicated."

What is our primary use case?

Perimeter protection. It has performed well. It's good.

How has it helped my organization?

It hasn't really improved the way our organization functions. It has just provided that extra functionality. That is something we now demand of all firewalls.

What is most valuable?

The ability to include logs for everything that you do for admin. Also, it has web filtering built in and VPN. Those are the main features we use.

What needs improvement?

I would like the ability to have an overview, cross-site: One portal that does all firewalls.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

The stability is good, but that's because we've got a high-availability configuration.

What do I think about the scalability of the solution?

It is scalable, but, as I said before, you are not able to connect across multiple sites for a similar firewall.

How are customer service and technical support?

I would say tech support is about a six out of 10.

Which solution did I use previously and why did I switch?

There was no previous solution. I inherited this one.

When selecting a vendor, the most important criteria are history, reputation, and looking at the industry ratings.

How was the initial setup?

Although I wasn't involved in the initial setup, I believe it was quite complicated.

What other advice do I have?

Do the homework because Check Point is rather expensive. There are better firewalls on the market now that are cheaper and provide better functionality and security.

I rate it a six out of 10 because the user interface is overly complicated.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Security Specialist at a insurance company with 501-1,000 employees
Consultant
URL filtering helps us control what people are accessing
Pros and Cons
  • "URL filtering is a very important feature."
  • "The usability of the solution could be improved."

What is our primary use case?

This solution is used to validate the firewalls, and it performs this function very well.

How has it helped my organization?

It helps us control what people are accessing, inside the company.

What is most valuable?

URL filtering is a very important feature.

What needs improvement?

The usability of the solution could be improved.

What do I think about the stability of the solution?

I think stability is good. We haven't had any trouble.

What do I think about the scalability of the solution?

The scalability looks fine.

How are customer service and technical support?

My company has used technical support, but I have not.

Which solution did I use previously and why did I switch?

In the past, we had a type of proxy for our URL filtering. The idea was to have everything packaged in the same solution. We removed the proxy and started to use just the firewall to control URL filtering and normal firewall rules in the same solution.

When selecting a vendor, we always check the industry reviews. Then, we analyze the features and, after that, the price-feature combination is the most important factor: which one has the best price and has the features we need.

What other advice do I have?

Pay attention to the stability of the solution because it's very critical.

I would rate this solution a nine out of 10. They need to improve the usability. It's good but it can always be better. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Real User
Top 5Leaderboard
Easy to open and edit policies, search within them, and view logs
Pros and Cons
  • "Check Point Security Management excels over Forti Management in daily operations, policy management, and graphical interface. It is easy to open and edit policies, search within them, and view logs."

    What is our primary use case?

    We utilize the security management solution to oversee all our Check Point products, including firewall, IPS, and antivirus policies. It serves as our primary tool for managing all Check Point devices.

    What is most valuable?

    Check Point Security Management excels over Forti Management in daily operations, policy management, and graphical interface. It is easy to open and edit policies, search within them, and view logs.

    What needs improvement?

    The only issue is that, you need to install an application instead of managing it through a browser. Thus, it requires installation. Additionally, it can be slow when multiple users access the manager simultaneously. Even with increased CPU and memory resources, some performance issues may still occur when multiple users check simultaneously.

    For how long have I used the solution?

    I have been using Check Point Security Management for ten years.

    What do I think about the stability of the solution?

    Sometimes, we encounter crashes while working on Check Point Security Management, necessitating application restarts. We also face connectivity issues with certain firewalls, making it less stable than other products.

    What do I think about the scalability of the solution?

    The solution’s scalability is good ; adding more CPUs and memory can give you more gateways.

    20 managers are using this solution.

    I rate the solution’s scalability a nine out of ten.

    How are customer service and support?

    We currently have at least two or three cases open, and some are regarding demand. We struggle to find a good engineer who can truly help us instead of just sending some comments for us to run and provide feedback. They need to improve, especially in their initial client support.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The initial setup is complex.

    Compared to Forti Management, Check Point Security Management involves much more work and is more difficult. You need to establish connections to all the firewalls manually, one by one. However, with the function manager, you point the firewall to the manager and accept it on the Management, and it's done. Additionally, you need to manage certificates on Check Point, making the process less straightforward than FortiManager. 

    You depend entirely on the manager to edit the security gateway policies. If the manager encounters an issue with Fortinet, you can still access the FortiGate and delete policies. In Check Point, you cannot delete firewall policies directly on the firewall itself if you encounter a Management issue.

    Deployment, including firewall synchronization, takes about four days to complete.

    You usually need to create and use the VM Manager VM. So, you need to deploy the VM, configure the IPs, and install the Check Point console software. Then, you need to perform an SIP IT connection to all the firewalls to manage them. After that, you need to configure the firewall networks and public IPs. 

    I rate the initial setup as seven out of ten, where one is difficult, and ten is easy.

    What's my experience with pricing, setup cost, and licensing?

    The product is more expensive than Fortinet. We need to pay the license for the Management. I rate the product’s pricing a seven out of ten, where one is cheap and ten is expensive.

    What other advice do I have?

    It enhances our daily operational efficiency. Therefore, all management personnel prioritizing working on Check Point policies over Fortinet would benefit. However, maintenance upgrades, backups, snapshots, and synchronization between primary and secondary management can become cumbersome. These tasks tend to be more challenging and time-consuming.

    The learning curve for Check Point is quite steep. Sometimes, when we recruit new members to our company, they take a lot of time to understand how our Check Point system works, including the connection between the Management and the firewall, among other components. With Fortinet, it takes only two or three weeks for them to get acquainted with everything. With Check Point, they need at least three months to become accustomed to upgrades, managing policies, and maintenance of the Management system. So, it takes at least three or four times longer than with Fortinet.

    AI is essential for correlating logs and presenting the ones that matter. They could strengthen how they present logs by giving more attention to the ones that matter most.

    Check Point is easy to use, allowing users to drag and drop objects effortlessly. However, it's essential to note that deploying and maintaining the solution may require a bit more expertise than some competitors.

    Overall, I rate the solution an eight out of ten.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.
    Updated: June 2025
    Buyer's Guide
    Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.