Try our new research platform with insights from 80,000+ expert users
reviewer1250127 - PeerSpot reviewer
Systems Administrator with 201-500 employees
Real User
Affordable, easily deployable, user-friendly security management
Pros and Cons
  • "This solution is easy to install and deploy. It is also user-friendly."
  • "I would like for users to have more control over the platform in the next release. Right now, the system is very central and general requiring new rules to be created that better-suite our requirements."

What is our primary use case?

This solution is used to control OPC's. You are also able to generate reports with it.

How has it helped my organization?

Our organization is now able to easily see if our computers are running smoothly or not.

What is most valuable?

This solution is easy to install and deploy. It is also user-friendly.

What needs improvement?

I would like for users to have more control over the platform in the next release. Right now, the system is very central and general requiring new rules to be created that better-suite our requirements.

Buyer's Guide
Check Point Security Management
October 2025
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,706 professionals have used our research since 2012.

For how long have I used the solution?

I have been using this solution since 1993.

What do I think about the stability of the solution?

This is a stable solution.

What do I think about the scalability of the solution?

This is a scalable solution, we currently have three to four hundred users.

How are customer service and support?

We hardly contact Check Point support thanks to help from our partner. However, if there is an issue neither of us can resolve, we open a case with Check Point and they are able to resolve the issue quickly.

Which solution did I use previously and why did I switch?

We were using Symantec for its antivirus and backup capabilities, but now that Check Point offers antivirus, we are only using Symantec for backups. And Check Point is one fourth of the price!

How was the initial setup?

The initial setup was not complex. There was still a bit to learn with the program, but it was not complex. Initial installation took about a day and a half and it took one week for deployment in total after running some tasks.

What about the implementation team?

We had support from a Check Point partner perform the initial setup. We now have four members of our technical group maintaining the solution.

What's my experience with pricing, setup cost, and licensing?

Check Point is much cheaper than the competition ($4/server as compared to $17/server).

What other advice do I have?

I would rate this solution an eight out of ten (nine for its antivirus capabilities).

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1591110 - PeerSpot reviewer
ICT at a manufacturing company with 501-1,000 employees
Real User
Top 20
Allows for easy filtering, is easy to manage, and has a beautiful interface
Pros and Cons
  • "Check Point Security Management has improved our organization because all corporate firewalls can be managed with a single interface."
  • "The graphical interface is nice but it is a bit heavy."

What is our primary use case?

We use this solution to manage and configure all of our firewalls distributed across multiple remote locations. We can do it with a single interface where policies are created, managed, and distributed across all locations.

How has it helped my organization?

Check Point Security Management has improved our organization because all corporate firewalls can be managed with a single interface. Many objects are common in the policies of the various sites, thus saving time when it is necessary to create or modify access policies.

What is most valuable?

Check Point Security Management has a beautiful interface for viewing logs and access reports. You can create many filters and run queries from a modern graphical interface without resorting to shell commands.

What needs improvement?

The graphical interface is nice but it is a bit heavy. Even installing the policies is often a very slow activity. Sometimes it happens that the rules are scattered in several points such as global properties, security policy, and/or application policy and it is difficult to find the point where to intervene

For how long have I used the solution?

I've been using Check Pont for 15 years.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Security Management
October 2025
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,706 professionals have used our research since 2012.
reviewer1578726 - PeerSpot reviewer
Works at a financial services firm with 5,001-10,000 employees
Real User
Good access control, security control, and threat prevention, but needs better support and a workflow for user authorization
Pros and Cons
  • "It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution. Check Point is effective when it comes to security control and threat prevention."
  • "Support is the main area that they need to improve. Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region. I would like a feature where there is a workflow to provide authorization to some users before they're able to create and apply rules. Such a feature should be integrated with the management. It should not be in the box that comes with it."

What is our primary use case?

We use it for both perimeter and internal defense.

What is most valuable?

It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution. Check Point is effective when it comes to security control and threat prevention.

What needs improvement?

Support is the main area that they need to improve. Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region.

I would like a feature where there is a workflow to provide authorization to some users before they're able to create and apply rules. Such a feature should be integrated with the management. It should not be in the box that comes with it.

For how long have I used the solution?

I have been working on the protection network since 2014. It has been around seven years.

What do I think about the stability of the solution?

So far, it has been stable, but stability also depends on your design and deployment. You might have a performance issue, especially when you have to deal with a lot of traffic. You also need to factor in maintenance in terms of the upgrades, patches, and hotfixes that you need to do regularly. When you're able to do that and take care of the maintenance, you'll have stability.

What do I think about the scalability of the solution?

Scalability depends on your design. You have to properly scope your environment to know the amount of traffic that is expected to go through, pass, or transmit through the firewall. After you have a proper scope, you won't have any problems. Otherwise, you'll definitely be experiencing issues.

How are customer service and technical support?

Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region.

How was the initial setup?

As compared to other security and firewall solutions, its deployment is not that easy. The deployment duration depends on your project plan. It also depends on whether you are working just on the deployment, and there are no distractions.

What about the implementation team?

In terms of those who manage the rules and administer the system, we have about ten people. They are administrators, and they create rules, manage the system, and provide support.

Which other solutions did I evaluate?

I wasn't a part of the team that did the evaluation.

What other advice do I have?

I would advise others to properly apply good design concepts by engaging professionals. They should properly scope their environment to ensure that they are deploying the solution to optimized standards. They should also ensure that they train their personnel to be able to handle the first level and even second level support when it comes to the management of Check Point.

I would rate Check Point Security Management a seven out of ten considering the skills that are required and the ease of use and management.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Technology consultant at a tech services company with 501-1,000 employees
Real User
Easy to set up, helpful support, but the stability needs to be improved
Pros and Cons
  • "The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration."
  • "For those not familiar with the Command Line interface, there should be an option in the GUI for operating backups."

What is our primary use case?

We have a Check Point firewall to secure our perimeter as well as on the internal network. We also have our Security Management server on VM. Both perimeter & internal sets are managed via the same Security Management system.

Two separate packages are created for both perimeter & internal sets.

We are also managing a SandBlast device via Security Management.

Even though all of the work is performed by the gateway, Security Management plays a vital role in a three-tier architecture. Here, our primary use case is to push security policies & manage logs.

How has it helped my organization?

Check Point Security Management is one-stop for all operation-related activity on the Check Point Security Gateway (firewalls).

We have completed one-time implementation configurations, like clustering, using this tool.

Check Point has a very sophisticated log monitor, where troubleshooting is very simple. We just have to put the desired filter, and Check Point generates the reports that help us to understand the overall picture in our network.

We have created multiple users, and they each have a smart dashboard install on their machine.

What is most valuable?

The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration. Logs are collected at the management server, hence we can preserve those as well. 

We can keep on adding new devices that can all be managed from a single security management server.

After the upgrade to R80, we have a single interface for all activities. Previously, we needed to configure using different applications.   

What needs improvement?

It is very difficult to recover policies from the gateway in case if you lose your security management server, and don't have a backup.

The backup functionality (Migrate export command), which covers policies, can not be operated from the GUI. Instead, we have to log into the CLI and generate a file then take it out. For those not familiar with the Command Line interface, there should be an option in the GUI for operating backups. There should also be an option to automatically schedule the backup. 

The smart dashboard is a very heavy application. If we could directly connect & manage firewalls from the Management server itself then it would make it very easy.

For how long have I used the solution?

I have been working with Check Point Security Management for more than three years.

What do I think about the stability of the solution?

The stability needs to be improved.

What do I think about the scalability of the solution?

Scalability-wise, it is very good, as it was deployed on VM.

How are customer service and technical support?

TAC is very supportive but we face many issues with this product.

Which solution did I use previously and why did I switch?

Previously, we had only firewalls & not a management device. 

How was the initial setup?

The initial setup is not very complex & can be done easily.

What about the implementation team?

We are the ones who implemented it.

What's my experience with pricing, setup cost, and licensing?

This product can be used for 25 security gateways on a basic license. I think that this is good value for the money.

Which other solutions did I evaluate?

We wanted to implement Check Point and hence, we did not evaluate others.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Real User
Top 5Leaderboard
Helps our security team create policies in a centralized way
Pros and Cons
  • "The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other."
  • "The migration from R77 Manager to R80 is a major upgrade. It's not very easy to do. There should be some kind of Wizard for a direct upgrade from the R77 to the R80. There should be an easy way for the customers to do the upgrade."

What is our primary use case?

Our primary use case is to have a centralized server to manage all of our Check Point firewalls, which are around 30 clusters of firewalls. We also use it to have a place where we can see, call, and centralize the logs.

How has it helped my organization?

Every day we have new projects and new applications that need to be delivered. We need to open flows on the firewall from one point to the other. Check Point helps our security team to create the policies in a centralized way, where we can even copy policies from one firewall to the other.

It saves us a lot of time, and it's very easy to use. We can clone objects and drag and drop. It's much easier than a few years ago where we used to have Cisco firewalls and we needed to do it on the command line. Check Point is much easier. We can very quickly place trainees to work in policy creation.

What is most valuable?

The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other. We have a centralized point of managing the firewall in terms of firewall policy and in terms of threat prevention policy where we can easily review the antivirus policy. It has a good description of which protection we are applying to the IPS on the antivirus. It's very clear and easy to use.

The SmartConsole chooses which application communicates with the manager and allows us to create the policies and also look at the log of the traffic that is crossing all the firewalls. We can manage and also see the logs of what is happening on the firewalls.

What needs improvement?

I would like for Check Point to add some features like the Smart Monitor on the R77 that are available on the SmartConsole of the R80. Now, we need to open a different application to have access to it. There are some applications that worked in the past but were not too integrated with a new application that communicates with the manager. There are some applications that should be integrated into the SmartConsole. I don't know if they will be, but everything should be on the SmartConsole and we shouldn't need to open another application.

The migration from R77 Manager to R80 is a major upgrade. It's not very easy to do. There should be some kind of Wizard for a direct upgrade from the R77 to the R80. There should be an easy way for the customers to do the upgrade.

For how long have I used the solution?

We have been using Check Point Security Management for three years. 

What do I think about the stability of the solution?

It has been very stable. We don't have many complaints about stability. Once every three months or so, there are some processes on the management server that we get stuck on and we need to restart the services. After we restart, we get back to normal.

What do I think about the scalability of the solution?

It's very scalable for our use case. We have two security managers. We have one primary and one backup to manage all of our firewall infrastructure, and we have no problem with it. We always have a new firewall. 

There are around eight people who work with this solution in my company. They're network engineers. 

My colleague and I are responsible for the maintenance. 

We have a 100% adoption rate for all of the Check Point Firewalls. We all use this manager to manage the Check Point infrastructure.

How are customer service and technical support?

We don't have any issues with support. The support is very good, especially if you work with the Israel group, but on this specific product, as this is a core product of Check Point, I would say all of the groups work fairly well.

Which solution did I use previously and why did I switch?

We also have experience with Fortinet but it's like comparing apples to oranges. 

How was the initial setup?

The initial migration from R77 to the R80 was a bit complex. We had the help of a third-party company for the migration phase. We needed to export from the old manager and import it to the new one. There were some modifications we needed to do. It's not very straightforward. They had more experience in those kinds of migrations. 

We have already done some upgrades and they are very easy and straightforward. For this migration, we needed to prepare the servers side by side to the old one, and we needed to do the initial configuration. It took like at least one week to prepare and to migrate it that way.

What was our ROI?

We do see ROI because we save a lot of time and we can have new team members working with the firewall very quickly. We save at least eight hours a week.

What's my experience with pricing, setup cost, and licensing?

The pricing is in line with its competition, like Fortinet. 

Sometimes applying licensing in products gets a bit messy. We will apply for a license on the manager, specifically for the firewall, but you still see the firewall complaining it doesn't have any rights. In this case, we need vendor support to fix this kind of situation.

We need to devise whether we need to have remote sessions with regard to why the firewall is complaining. There must be some kind of protection for the people not to flip licenses that they shouldn't. Sometimes when you buy a new firewall, the licensing is not straightforward to apply. After we fix it, we never have issues again.

What other advice do I have?

This solution is overall our favorite Check Point product. It's a product that you need to have if you have a Check Point Firewall. If you have a Check Point Firewall, you need to have to Check Point Security Management. You cannot manage the firewalls directly, you need to have the manager.

I think it's the best product Check Point has and is the one that makes the difference. When you compare it to, for example, Fortinet, which has a manager that is web-based, it's not as easy to use and easy to drag and drop objects. The way to see the logs is not as good. It works better than web-based FortiManager, for example.

Palo Alto is also web-based, but me and my team, all of us prefer the SmartConsole over the way we have to manage FortiGate. It's very easy to search for rules on the policy, Check Point is much easier than the competition.

The competitors work well but Check Point works better.

If you refresh the page, you will lose what you did. Even the screen resolution is dependent on the browser. Drag and drop is not as good as with Check Point. It's by far the best product we have to manage firewalls. I think the thing that makes the difference on the other Check Point firewalls.

My advice would be to try the SmartConsole before deciding if you want to go ahead with buying Check Point Firewalls and the manager. You can install the application in any Windows, computer, or Windows server and try the SmartConsole in demo mode.

I would rate Check Point Security Management a nine out of ten. 

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
ICT Officer at Kenyatta National Hospital
Real User
Top 20
Has good identification capabilities that link with the Active Directory
Pros and Cons
  • "I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation. These allow me to select to whom to do what, and when."
  • "In future releases I'd like to see better integration with other applications and solutions. Also, the cost of the license is too high, it's too expensive."

What is our primary use case?

We use it for the firewall and the filtration. The accounts are put on a server and even the SmartConsole is installed on a server environment.

What is most valuable?

In terms of most valuable features, I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation. These allow me to select to whom to do what, and when.

What needs improvement?

As for improvement, again, the bandwidth regulation is an issue - it is not up to my expectations. If they could improve that it would be good.

In future releases I'd like to see better integration with other applications and solutions.

Also, the cost of the license is too high, it's too expensive.

For how long have I used the solution?

I have been using Check Point Security Management for the last five or six years.

How are customer service and technical support?

I used to contact customer service, but nowadays, I'm authorized to handle that. We have our own internal team in the company to maintain this solution on our own. I know a few people at Check Point so we work together.

Which solution did I use previously and why did I switch?

Yes, we were using Dell SonicWall.

How was the initial setup?

In terms of initial setup, at the beginning when I was not an expert, it was difficult but now that I'm an expert it is no longer difficult at all.

I don't know how long the setup was the first time since it was done by a client. But nowadays, because I'm an expert, it doesn't take long. It takes about an hour or two and I've done everything.

What other advice do I have?

On a scale of one to ten, I'd give Check Point Security Management a nine because it is not yet available in our country.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Network Administrator at N S PHARMACY SDN.BHD.
Real User
Good interface, excellent technical support, and very helpful additional features
Pros and Cons
  • "The additional features offered by the solution are excellent. We didn't have a lot fo these on a previous solution, and they've proven to be an advantage for us."
  • "The reporting should be improved in future releases. It needs to be very explicit. This is very important."

What is our primary use case?

We primarily use the solution based on the results that are provided. We've tried others previously and they didn't give us the results we receive on this particular product.

What is most valuable?

The additional features offered by the solution are excellent. We didn't have a lot of these on a previous solution, and they've proven to be an advantage for us.

Based on my personal use of the system, the interface is quite good.

What needs improvement?

It depends on the user, but all of the checkpoints need improvement. The only place I need a bit of an update, for example, is in the endpoint management. There are some policies that are embedded that you have to examine if you have sensitive users. 

For some applications, the default acts as a manager. However, in a system with a history of being breached or where users are given access based on their job function, we seem to have issues particularly there.

The reporting should be improved in future releases. It needs to be very explicit. This is very important.

For how long have I used the solution?

I've been using the solution for about a year.

What do I think about the stability of the solution?

Over the past nine or ten months that we've been using the solution we've found it to be very stable. We haven't had any issues at all. Since we have a monetary drive to enforce stability, when we see a flagged issue we will address it immediately.

What do I think about the scalability of the solution?

The scalability of the solution is excellent. We haven't faced any negative aspects when trying to scale up.

How are customer service and technical support?

The technical support of the solution has been very good. They are much better than what I previously had. I find that we get attention within 24 hours if we flag something. We are purchasing the support so it may be the reason we get such a quick and helpful response.

Which solution did I use previously and why did I switch?

We did previously use a different solution. They didn't have support locally in my country and this was difficult for us. Everything was done via mail or phone and it was not helpful. With this solution, if the situation cannot be remotely addressed within 48 hours, they will come to my office in person and attend to me. It's much better.

How was the initial setup?

The initial setup is very straightforward. Deployment takes about three working days. In our case, we had to import policies from SonicWall but not on the same platform, so we had some little challenges like that, however, overall it was quite straightforward.

We have an in-house team that handles maintenance.

What about the implementation team?

We had an integrator that assisted us with the implementation of the product. We use them for support as well.

What other advice do I have?

We're still in the testing phase in terms of using the solution. Soon, it will be one year since we have fully deployed it. So far, it's been very good. I would rate it eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Mohammed Semmour - PeerSpot reviewer
Scaling Engineer at Lutessa 2S
Real User
A very good management solution with a straightforward setup and good scalability
Pros and Cons
  • "It's a great solution for management. We can manage a lot at the same time with one security management system. Also, each gateway depends on the other, which is helpful."
  • "In the last version from 80.20, there are some issues around SSNA Diction. I would like this to be improved."

What is most valuable?

One of the most valuable features is the console application.

It's a great solution for management. We can manage a lot at the same time with one security management system. Also, each gateway depends on the other, which is helpful.

What needs improvement?

The client of the management needs to be improved. 

The solution is a bit slow. The speed should be improved. 

If there is a possibility to use the URL instead of client management in a future release, that would be ideal.

In the last version from 80.20, there are some issues around SSNA Diction. I would like this to be improved.

For how long have I used the solution?

I've been using the solution for one year.

What do I think about the scalability of the solution?

The solution is scalable.

How are customer service and technical support?

I haven't contacted technical support a lot. I have a colleague that's had issues with a certain version of the solution, and they have made contact. They've had issues, but for me, technical support has always been fine.

How was the initial setup?

The initial setup is not too complex, but those setting it up should have knowledge of Unix as well as some knowledge in Linux command lines. 

What about the implementation team?

We're a partner. We help clients implement the solution.

What other advice do I have?

We are using the on-premises deployment model.

I would rate the solution eight out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.
Updated: October 2025
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.