Try our new research platform with insights from 80,000+ expert users

Check Point Security Management Valuable Features

RL
Roy Lopez
TI at a security firm with 51-200 employees

The standout features of Check Point Security Management are unified policy management, real-time visibility, and automation capabilities, making it a powerful tool for security management.

Consistency across environments with Check Point Security Management helps me ensure that instead of maintaining separate rules for firewalls, cloud workloads, and data centers, we apply one unified policy that covers them all. This reduces misconfigurations and ensures compliance, proving to be a time-saver because rolling out a new rule or updating an existing one takes minutes, not hours, because it is propagated everywhere automatically.

Automation is one of the most valuable aspects of Check Point Security Management, and it often does not get enough attention compared to headline features like unified policies or visibility. With policy automation, routine tasks such as rule creation, compliance checks, or policy updates can be automated, reducing human error and saving hours of manual work.

Check Point Security Management has simplified administration in my organization because instead of juggling multiple consoles, everything is managed from a single pane of glass. This has reduced complexity and saved significant time for our IT team, improving our operational efficiency.

For a policy update, I used to spend two or three hours across multiple consoles. Now, with unified management in Check Point Security Management, it takes thirty to forty minutes, resulting in about a seventy percent reduction in effort, greatly boosting productivity.

View full review »
GR
Gerardo Rojas
Support at a security firm with 51-200 employees

One of the best features of Check Point Security Management that stands out for me is the powerful policy tools.

The flexible deployment model is valuable for me because I can choose deployment models, for example, on-premise, cloud, and different sites. I control or manage this with this tool.

An important feature I find helpful in Check Point Security Management is the policies view, where I create different policy labels for different gateways and control different traffic.

Check Point Security Management has positively impacted my organization, with one benefit being that I create one security management for controlling any gateways.

This level of security management has benefited my organization because it has saved me time.

I don't know the exact number, but it is easier for controlling the different gateways.

View full review »
reviewer2751156 - PeerSpot reviewer
reviewer2751156
Network Cyber Security Specialist at a tech services company with 51-200 employees

The best feature Check Point Security Management offers is definitely the log management. I've worked with other firewall vendors and the overview of the logs that you get in Check Point Security Management is superb. You don't get that anywhere else. It's very easy to troubleshoot what traffic is being dropped, what traffic is being passed. It's easy to build firewall rules and everything else. It's miles ahead of anyone else.

View full review »
Buyer's Guide
Check Point Security Management
January 2026
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
879,853 professionals have used our research since 2012.
VikasTiwari - PeerSpot reviewer
VikasTiwari
Senior Network Engineer at a tech vendor with 1,001-5,000 employees

The best features of Check Point Security Management are its cluster environment, which speeds up performance through SecureXL and ClusterXL, and its robust threat management tools that provide vulnerability exposure and virus mitigation capabilities.

ClusterXL and threat management have helped me by enhancing performance through redundancy in active and standby firewalls, allowing for multiple security gateways to operate smoothly within the security management setup.

Additionally, IPS is enabled, and I can integrate Check Point Infinity solutions through the Infinity portal, which allows for easy policy pushing and customization.

Check Point Security Management has positively impacted my organization by enabling me to set up various location firewalls in one dashboard, which is a significant benefit I have noticed. It saves me time and reduces complexity, as the friendly dashboard allows me to see all logs, policies, monitoring, auditing tools, and issues related to VPN and traffic, making it easy to manage everything efficiently.

View full review »
D Alvarado - PeerSpot reviewer
D Alvarado
IT Cloud Learder at a security firm with 51-200 employees

The best features Check Point Security Management offers are its intuitive tools. Around the technology, Check Point Security Management is the best way for controlling my gateways. When I need to use logs, events, and policies, and different things around controlling my gateways, it's very easy to use logs, events, and monitoring in Check Point Security Management. When I need to check different possibilities of hackers or others, it is very intuitive to use these features.

Check Point Security Management has impacted my organization positively because the organization's security and perimeter area is better after using this technology. Two years ago, when I needed to report different activities about suspicious activities, I needed to check faster, and I controlled the situation much faster.

Check Point Security Management offers great features for controlling your gateways.

View full review »
Cristopher Z - PeerSpot reviewer
Cristopher Z
Administrador De Redes at a financial services firm with 501-1,000 employees

The best feature that Check Point Security Management offers me is the single unified console because I can manage firewall, endpoints, cloud, and threat prevention policies from one place, which reduces complexity and ensures consistency across the organization.

The unified console in Check Point Security Management helps my team day-to-day by saving time, as the department has more free time because the security management console reduces the network admin security time.

Check Point Security Management has had a very positive impact on our organization, as the centralized console has reduced the time spent managing policies across sites by more than half. I now push updates instantly instead of coordinating separate changes at each location. The visibility has also improved since I can monitor logs and alerts in real-time from one place, leading to faster incident response and fewer disruptions for users. Overall, it has increased efficiency and given us stronger confidence in our security posture.

I estimate about a 30-40% reduction in time spent on our routine management tasks with Check Point Security Management, and incident response has improved with alerts consolidated in one place, cutting investigation time by nearly half. This change has freed my team to focus more on proactive security projects and other tasks.

Another feature I appreciate is the strong role-based access control because it allows me to assign different levels of permissions to administrators so teams can work in parallel without overlapping or risking unauthorized changes. I also appreciate the detailed logging and audit trails which make compliant reporting much easier, giving us both flexibility and accountability while keeping overall management streamlined.

View full review »
Suraj Jv - PeerSpot reviewer
Suraj Jv
Network Security Engineer at a outsourcing company with 11-50 employees

Based on my experience with Check Point Security Management, the best part is that we can enforce all configurations such as firewall policy or application control across all managed gateways. We can also generate compliance reports based on our requirements. We are using this central management for simplified configuration.

The reports generated through Check Point Security Management are very useful for our audit team. Whenever they ask for our logs or reports on network incidents, we generate the reports based on audit requirements and hand them over to our audit team.

With Check Point Security Management, the management of multiple gateways has become very easy and we can easily modify or enforce any changes in our existing configuration. We can also monitor from central, which is very useful.

View full review »
Dhanaji Mali - PeerSpot reviewer
Dhanaji Mali
Technical Specialist at a outsourcing company with 501-1,000 employees

The best features that Check Point Security Management offers, which stand out to me the most, are logging and monitoring. The monitoring is exceptional as it provides consolidated logs, signals, and any alerts that come from the security gateway in real time.

The logging and monitoring help my team day to day by alerting us if any incident or event occurs, enabling us to detect and prevent threats within seconds.

Check Point Security Management has positively impacted my organization because with more than one security gateway in our organization, we are easily able to manage and configure our security gateway with the help of security management.

View full review »
Vishal Koovaparam  - PeerSpot reviewer
Vishal Koovaparam
Server Security Analyst and Solution at a outsourcing company with 11-50 employees

The best features Check Point Security Management offers are its manageability and the easy user interface from where I can configure or manage multiple security gateways.

When I mention manageability and the user interface, it stands out to me because it is easy to trace any tabs to configure anything, making it very reliable.

Check Point Security Management has positively impacted my organization because our IT person is not always busy with troubleshooting or manageability after deploying this solution, as they can manage multiple security gateways from a single console.

It is saving our time, and we can do multiple things related to IT right now, with one single person doing multiple things after this deployment.

View full review »
NT
Niyajuddin Tiwale
Technique at a outsourcing company with 11-50 employees

A standout feature of Check Point Security Management is its user-friendly interface, which is easy to understand, and we can easily generate custom reports to present to our management team.

In terms of custom reporting, we generally generate reports such as top 10 or top 20 users consuming more bandwidth or top 10 risky users, helping us have visibility into users accessing malicious websites or security events that happened recently.

After deploying Check Point Security Management, we improved our productivity by integrating all devices into a single console instead of managing separate log-ins for each branch's gateways, making our admin team's tasks easier.

I have noticed that it has reduced errors because when configuring through the security management, a single configuration is pushed to all gateways, saving time and reducing mistakes.

View full review »
SM
San Murthe
IT admin at a manufacturing company with 51-200 employees

The best feature Check Point Security Management offers is the GUI. The GUI shows everything in different categories such as mobile phones, connected devices, laptops, and desktops. It displays everything in different dashboards, making it easy to understand what is connected to what.

Having that dashboard helps me in my day-to-day work because it saves time. It shows all the devices that have been connected and how many devices are connected in different ways. Through this, I am able to track how many laptops and mobile phones have occupied my IP addresses.

View full review »
Abhijeet Chaskar - PeerSpot reviewer
Abhijeet Chaskar
Cyber Security Analyst at a outsourcing company with 11-50 employees

Based on my experience with Check Point Security Management, it is an excellent solution for managing all security gateways from a central console where I can access all logs and security events triggering on different security gateways. I have a single console where I can monitor and configure everything, allowing me to manage everything from security management to all firewalls from a central console.

The best aspect about the centralized control of Check Point Security Management is that it streamlines all configurations across all location firewalls. I have all logs from all firewalls at a single pane of glass where I can filter and check all security events occurring over any number of days I select. I am gaining good visibility over the network, over the cyber threats triggering, and the compliance of the configuration.

Based on my experience, we now have configuration hardening across all branches, and there is no mismatched configuration between the branches. We do not need to communicate with other branches' engineers. We have a single centralized team for security managing all of the organization's Check Point Security Gateways.

It benefits everyone. My configuration errors have been reduced, compliance has improved, and it is saving my team time. We are achieving all three of these benefits.

View full review »
RK
Riyaz Khan.
Inside Sales Manager at a outsourcing company with 11-50 employees

The best feature of Check Point Security Management is centralized management and login, making it an easy job for engineers to configure and manage it.

After implementing the management of devices using Check Point Security Management, it became very easy and we are getting full visibility.

Time savings have been significant because with Check Point Security Management, our engineers spend less time managing or configuring the security gateway. We simply log in from central management to push changes to multiple security gateways easily.

View full review »
Abnet Tsegaye Belay - PeerSpot reviewer
Abnet Tsegaye Belay
Cybersecurity Engineer at a tech services company with 11-50 employees

The granular and general access control allows us to centralize our policy management in one console for firewall, application control, URL filtering, IPS, Anti-Bot, Threat Emulation, and Threat Extraction. It is unified in one console, allowing us to unify the rule base to reduce complexity. These features are beneficial, and the system is scalable.

Administrators are operational, so it creates operational efficiency through faster rollouts of change with policy packages, creating faster and easier operational day-to-day activities.

I strongly admire the compliant support feature. It creates detailed logs, audit trails, and customizable reports. It has excellent reporting features including the threat blades, threat prevention blades, and firewalling blades. I can comply with this and provide it for auditors, which makes it an interesting feature.

View full review »
networke1856865 - PeerSpot reviewer
networke1856865
Network Engineering and IS Access at a comms service provider with 5,001-10,000 employees

In my opinion, the best feature Check Point Security Management offers is the ability to upgrade firewalls directly from the management console of the security management, which stands out to me.

Being able to upgrade firewalls directly from the management console makes a big difference for me because it reduces errors, and we do a lot of things automatically, which improves the upgrade process.

Check Point Security Management has positively impacted my organization by saving a lot of time because we have a lot of firewalls, and it provides a console where I can see directly all the managed firewalls, allowing us to manage all of our firewalls from just one point.

View full review »
MT
Mohammad Taleb
Senior Network Engineer at a healthcare company with 10,001+ employees

The best features Check Point Security Management offers me are unified management console, automated policy management, and real-time monitoring and reporting.

Check Point Security Management has positively impacted my organization by providing centralized control, allowing us to manage all security policies and gateways from a single console, reducing complexity and saving time, and by enabling faster policy updates, which allowed quicker roll-out of rule changes across multiple sites, improving agility and reducing configuration errors.

View full review »
Bijja Maheshwar - PeerSpot reviewer
Bijja Maheshwar
Assistant Manager at a outsourcing company with 11-50 employees
Good control, good visibility, and a single console to manage all the security gateways in our organization are the best features of Check Point Security Management.

It will be helpful to meet the compliance of security, so we have full visibility on the configuration part of each and every security gateway, and we can compare the policies that are configured across different security gateways from a single console.

It has impacted positively and has really saved the team time and compliance.

Basically there were multiple teams, the team who handled the security gateways at each location, but now we have a central team where one to two engineers handle all the security gateways.

View full review »
AK
Ankush Kondewar
Sr. Technical Support Executive at a outsourcing company with 11-50 employees

The best features Check Point Security Management offers are Smart Logging and Smart Console, which are helpful for log searching and analysis. While we have raw data, these two tools provide better visibility on incident trends and ensure GDPR compliance.

Smart Log and Smart Console help with visibility and compliance by capturing all events and traffic flow from central management. All users and events are captured in security management, providing full visibility.

Check Point Security Management has positively impacted our organization by providing better administration control and a unified central pane of glass for daily configuration.

A specific outcome demonstrating how Check Point Security Management has helped our organization is the reduction in human error through centralized policy management.

View full review »
Alex Duarte - PeerSpot reviewer
Alex Duarte
Security Support at a non-tech company with 201-500 employees

The best features Check Point Security Management offers for me include real granular policy control, as the availability to define very specific rules for different users, applications, and environments ensures that security is tailored rather than one-size-fits-all.

Granular control has helped me in practice. For example, we had a project team working with an external partner who needed access to certain cloud collaboration tools that weren't normally allowed on the corporate network. Using granular policy control, we created a rule that applied only to the team's device and only during working hours, while keeping the rest of the organization restricted. This meant the project could move forward smoothly without compromising overall security.

Another feature worth highlighting is the role-based access control, as it allows us to assign different levels of permission to administrators, auditors, and operations, so each person only sees and manages what's relevant to their role. This reduces the risk of accidental misconfigurations and keeps responsibility clearly separate.

Centralized administration is also a great feature.

View full review »
KQ
K.Q
IT Support at a security firm with 51-200 employees

Check Point Security Management offers centralized control, real-time threat visibility, and automation tools that streamline security operations across complex environments. The unified management console, SmartConsole in this case, acts as a single pane of glass for managing firewalls, gateways, and related infrastructure.

A significant strength of Check Point Security Management is the role-based access control, which allows us to delegate specific tasks such as log review, policy editing, and threat analysis to different teams without compromising security.

Check Point Security Management has positively impacted our organization by improving efficiency. Centralized policy management has drastically reduced the time we spend configuring and deploying rules across multiple gateways from hours to minutes, thanks to SmartConsole and automated policy deployment.

View full review »
RR
Ruben Ruiz
Sr. VP of Creative & Development at a non-tech company with 51-200 employees

The best feature of Check Point Security Management for me is the Advanced Threat Prevention because it integrates protection against malware, phishing, and network attacks in different blades or gateways, alongside centralized policy management.

One more feature worth highlighting about Check Point Security Management is how advanced threat prevention and centralized policy management work together to simplify our daily operations, as threat prevention tools automatically block malware and phishing attempts across all environments while centralized policies ensure those protections apply consistently everywhere, significantly reducing the gaps between sites or platforms and lessening the team's troubleshooting time.

Check Point Security Management has positively impacted our organization by streamlining different policy management in a single console, and incident response has also become faster because all alerts and logs feed into one security tool or management tool, giving us immediate visibility without needing to switch between tools.

View full review »
Minor Corrales - PeerSpot reviewer
Minor Corrales
Networking Admin at a tech company with 51-200 employees

The best features Check Point Security Management offers include the opportunity to add different gateways and add different blades in my gateways, and the monitoring is excellent and it is easier to work in different instances.

Managing different gateways and blades in Check Point Security Management saves our time.

Check Point Security Management has positively impacted my organization because the department can publish different policies or search different events or try to know different threats in one security management center for different gateways.

I reduce the time when I need to publish different policies in different gateways, but I need to publish at the same time.

View full review »
Mohit Shah - PeerSpot reviewer
Mohit Shah
Network Security Engineer at a outsourcing company with 11-50 employees

The best features Check Point Security Management offers in my experience are the user interface and the logging service.

The user interface of Check Point Security Management is very understandable, and users can easily configure it. Additionally, every activity or traffic flow from our network gets logged in our security devices.

Once we deployed Check Point Security Management, the manageability and the reporting capabilities made our job easier. We are getting better visibility, and based on this visibility, we configure the policies. Since implementing Check Point Security Management, it has saved our time, and the configuration and troubleshooting processes are easy.

View full review »
CB
Carol Berrocal
IT at a security firm with 51-200 employees

The best feature of Check Point Security Management is the centralized policy control because I can manage all firewall rules, access control, and threat prevention policies from one console. This reduces configuration errors and ensures consistent enforcement across the network.

Check Point Security Management has had a strong positive impact on our organization. One of the biggest improvements is how much easier it has become to maintain consistent security policies across our environments.

View full review »
BE
Edrisa Biliba
Systems Engineer at a tech services company with 51-200 employees

It's a reliable solution for security without mentioning its importance. We can't work without Check Point since it provides the real visibility needed to manage the environment. You can depend on it, as it assures the environment is well-secured. It's doing great work, and we can't work without SQL. We don't work with any other solution.

View full review »
Minor Corrales - PeerSpot reviewer
Minor Corrales
Networking Admin at a tech company with 51-200 employees
The best features include centralized management, policy creation, and dashboard visibility, which stand out as positives for me.

The reporting feature of Check Point Security Management is one of the most practical tools for my daily and weekly routine. I perform daily checks, quick traffic, and threat summaries to spot anomalies or spikes in attacks, and weekly reports that a security team might schedule list the top ten blocked threats per branch office.

One last point worth adding about the features of Check Point Security Management is how scalability and flexibility play into its strengths. As environments grow, you do not need to reinvent your setup, and the same centralized console can handle new gateways, cloud connectors, or remote offices without losing consistency. Features like policies layering and dynamic objects make it easy to adapt rules to changing business needs.

Check Point Security Management has had a very positive impact on my organization by making security operations more efficient and reliable. Simplified management means policies are consistent across all sites, reducing errors and saving time.

View full review »
TV
TVargas
Cloud Support at a security firm with 51-200 employees

I love the real-time monitoring feature of Check Point Security Management because when I need to see different problems or block different traffic, I need to use a tool with real-time capabilities for troubleshooting or the other documentations with the real issue.

Real-time monitoring helps me solve issues, for example, when I have a problem with the VPN; I need to view different traffic and identify different calls about the problem, or when I need to view when I have different user a problem with into others networks or something else.

Check Point Security Management positively impacts my organization as it is a great tool for completing the security checkpoints tools, making it possible to create this solution in different sites, for example, in Azure and on-premise, with the same impact or application.

View full review »
Pravir KumarSinha - PeerSpot reviewer
Pravir KumarSinha
Information Security at a computer software company with 5,001-10,000 employees

It's already helped secure our organization effectively. That said, the integration of all the firewalls should be centralized, which would make management easier.

View full review »
reviewer2751366 - PeerSpot reviewer
reviewer2751366
Security Support Engineer at a tech vendor with 51-200 employees

I find very useful the central view offered by Check Point Security Management, as you're able to have all your gateways and policy and different policy packages. The maintenance and addition of new policy is fairly easy. The GUI is also very simple and user-friendly.

The logging feature in Check Point Security Management is effective because the view is one single view and you can have multiple log servers to retrieve the logs from.

View full review »
MK
Mithilesh_Kumar
Technical Architect and consultant at a aerospace/defense firm with 10,001+ employees

It offers numerous features and blades, including intrusion prevention (IPS) and malware detection. It excels in network security and VPN capabilities, including IPSec VPNs. IPS is particularly powerful due to its signature-based detection, which automatically checks for and identifies malicious software.

View full review »
CM
CBMMishra
Advisor at a manufacturing company with 201-500 employees

Over the past 1.5  years, we've started monitoring it more regularly, analyzing alerts closely. The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as TLS violations or content violations. 

While we use a cloud-based Security Control console, we primarily conduct in-depth analysis of reports on a weekly basis to enhance our security posture.

View full review »
SanjeevKumar20 - PeerSpot reviewer
SanjeevKumar20
Network Security Engineer at a tech vendor with 10,001+ employees

The most valuable aspects of the solution include:

  • IPSec VPN Tunneling, 
  • DDoS Protection
  • HÀ and Clustering, 
  • Firewall Rules, 
  • Proxy support, 
  • Revision history
  • Detailed audit log, 
  • Smart Event
  • Filter syntax.

These features are easy to configure and offer multiple options to set them up with cloud services and other vendor firewall products.

We can always feel secure if some things go wrong, I'm sure that we can restore to the old one.

We can apply centralized proxy settings to get additional databases when we need them.

We can get a graphical view of the traffic and provide history when we need it.

View full review »
Dhiren - PeerSpot reviewer
Dhiren
Team Lead - Network and Security at a outsourcing company with 11-50 employees

The centralized logs and management are helpful. All of the logs are stored in an external server or within the Management Server. All of the logs are very easy to understand and provide detailed information about the instance. 

Through the Management Server we can easily enable all the features and easily disable them as well. 

View full review »
Charity Kimotho - PeerSpot reviewer
Charity Kimotho
Information Technology Technician at a comms service provider with 51-200 employees

We can easily push the policies to any of our gateways. The solution manages the gateways. It works well with other products. It integrates well with Cisco products, too.

View full review »
reviewer06814135 - PeerSpot reviewer
reviewer06814135
System Engineer at a tech services company with 201-500 employees

The most valuable aspects of the solution include:

  • IPSec VPN Tunneling: they are easy to configure and offer multiple options to set them up with Cloud services and other vendor firewall products over certificates, shared keys etc.
  • DDoS Protection: Firewall cleverly handles such attacks without compromising on performance.
  • HA and Clustering: Seamless load management and High Availability between nodes of firewall clusters.
  • Firewall Rules: You have access to set up rules at a very granular level and all are accessible through the GUI platform as well as over CMDLET.
View full review »
ML
Mark Logue
It Security Engineer at a financial services firm with 10,001+ employees

The support is pretty incredible.

View full review »
MOHAMEDELSHERIF - PeerSpot reviewer
MOHAMEDELSHERIF
Senior Technical Consultant at a computer software company with 1,001-5,000 employees

The most valuable feature of Check Point Security Management is the high level of visibility

View full review »
Ozan Durmus - PeerSpot reviewer
Ozan Durmus
Senior Information Security Specialist at a financial services firm with 10,001+ employees

It's useful that we can find unused objects. This helps us to get rid  of unused objects in our database,

Proxy support is valuable for us. We can apply centralized proxy settings to get additional databases when we need them.

Revision history and detailed audit log is a good feature with this we can always feeling safe if somethings go wrong, I'm sure that I can go back the old one.

Smart Event is a very good feature. It provides a graphical view of the traffics and provides history.

The filter syntax is very good and helps control when we need it.

View full review »
Kalpesh Panchal - PeerSpot reviewer
Kalpesh Panchal
TOC Architect at a tech services company with 51-200 employees

It's very easy for management to understand workflow and everything.

View full review »
AJ
reviewer1298643
Head, Partner Management - Asia Pacific Middle East and Africa at a tech vendor with 10,001+ employees

Harmony Endpoint is one of the great solutions by Check Point; it ensures compliance with policies and minimizes the risk of threats entering through endpoints. 

It's a great complete endpoint security solution that prevents the most imminent threats to the endpoint such as ransomware, phishing, or malware. 

It has proved to be very successful in identifying ransomware behaviors such as file encryption or attempts to compromise operating system backups and safely restore ransomware-encrypted files automatically. 

View full review »
Bharath Kumar Gajula - PeerSpot reviewer
Bharath Kumar Gajula
Network Security Architect at a consultancy with 10,001+ employees

The solution is easy to use and comes with few vulnerabilities. You don't have to worry about release upgrades. Life cycle management is very easy. 

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Hugo Alexis Espinoza Naranjo
Perimeter Security Administrator at a security firm with 51-200 employees

Many excellent solutions can be plugged into Security Management to help us prevent threats and manage network security, such as the firewall. The firewall is one of the most powerful because it enables us to guard against attacks and threats on our perimeter in real-time and centrally manage everything to maintain a robust security posture. 

View full review »
reviewer1855164 - PeerSpot reviewer
reviewer1855164
Network Engineer at a maritime company with 10,001+ employees

The ability to easily mount VPN between firewalls, depending on the needs (star, meshed, or combined architecture) and depending on the type of firewall has been helpful.

We appreciate the fact that we can monitor the version of the managed firewalls in order to plan the firewall upgrades over time.

I like that I have the ability to apply a security policy model and template to many firewalls, depending on the firewall usage and architecture (DMZ firewall, LAN firewall, etc.).

We also like the way we can monitor the firewall traffic and we use this feature very often to troubleshoot user traffic.

View full review »
William Cambronero - PeerSpot reviewer
William Cambronero
Consultant at a security firm with 51-200 employees

Check Point Security Management has a great feature that allows you to automate the request of the automated server. This helps us reduce the administrative effort of the IT department and thus give priority to other things like the security of the company or with the characteristic It provides us with centralization, which helps us with management.

The SmartConsole has provided us with excellent help with the application. It communicates with the administrator and allows us to create policies and also look at the traffic log.

View full review »
Abnet Tsegaye Belay - PeerSpot reviewer
Abnet Tsegaye Belay
Cybersecurity Engineer at a tech services company with 11-50 employees

The most valuable aspects of the solution are:

1. Centralized Management: It can centrally manage security policies across multiple Check Point security gateways. This centralized approach simplifies policy deployment, monitoring, and updates, making it easier for administrators to maintain a consistent security posture. 

2. Intuitive User Interface: The management console provides an intuitive user interface that allows administrators to configure and monitor security policies with ease. The interface is well-designed, with clear navigation and comprehensive options for managing security rules, network objects, and logs. 

3. Comprehensive Security Features: Check Point Security Management Server offers a wide range of security features, including firewall, intrusion prevention, VPN, application control, and threat prevention capabilities. These features work together to provide multi-layered protection against various cyber threats.

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Edwin Solano Salmeron
Soporte técnico superior at a financial services firm with 51-200 employees

One of the most important features, and one that I see as having organizational value, is the ability to enable services or communications that can be integrated with third parties. We can add additional layers of security to logins or configuration startups that we did not have before. 

It provides for capabilities and has allowed us to be more scalable. We now have greater management flexibility and the possibility to configure and connect to different branches. It has given us better centralization with greater features and security benefits.

View full review »
Erick Chinchilla Mena - PeerSpot reviewer
Erick Chinchilla Mena
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at a computer retailer with 501-1,000 employees

One of the most outstanding characteristics of its centralized administration is its great computing power. The ease of being able to integrate more than one computer and manage and orchestrate them simultaneously and individually creates security layers for each one of them or different approaches based on the needs of the branches. We have an installation that is fast with an execution that is simple. It is easy to manage what each organization needs. 

View full review »
reviewer1853907 - PeerSpot reviewer
reviewer1853907
Sr. Security Infrastructure Engineer at a computer software company with 1,001-5,000 employees

The rulebase management and the shared layers concept are implemented well. It avoids double work and reduces the risk of human errors. It makes the management solution very scalable.

Working with multiple administrators is possible. Changes are visible to others once you publish changes.

Investigating logs is easy and fast. The search results are provided with all details, so an in-depth analysis of problematic flows is easier.

Installation of policies is fast. For R81.10+ releases, it's a matter of seconds (compared to many minutes in the past).

View full review »
Mustafa ÇİÇEK
Contracted IT Staff at a government with 501-1,000 employees

The log section is really good to understand and is really fast. 

The layered architecture is really understandable and easy to use. 

Event correlation function is really brilliant. 

Check Point provides one application with all your needs with the management system.

I do not need to log in to another application or website to see inputs and outputs. 

The monitoring is the best.

The solution offers:

  • Strong user community
  • Product functionality and performance
  • Financial/organizational viability
  • Strong services expertise
View full review »
RW
Robert Weaver
Senior Systems Engineer at a energy/utilities company with 51-200 employees

The single interface to manage multiple cybersecurity platforms is great. In the past, we had multiple security appliances from multiple vendors. Each of these had their own interfaces and their own peculiarities. Staff had to learn multiple interfaces to provide our systems with cybersecurity. Additionally, when there was an issue, multiple systems needed to be checked to clarify and remedy the situation. If something was getting blocked incorrectly, we had to search for which systems was blocking it and then determine whether the block was legitimate. With the Check Point appliance, all of the blades are accessible through a single interface. We can easily track the reason for a block.

View full review »
LucianoMiguel - PeerSpot reviewer
LucianoMiguel
Security Consultant at a consultancy with 501-1,000 employees

Regarding the tool's valuable features, I would say that Check Point is a very accessible and fast tool, especially when dealing with logs for the first time. It is a perfect solution for me.

View full review »
LD
Leo Diaz
Cloud Support at a tech company with 1-10 employees

The monitoring is excellent. It helps a lot in making decisions.

Finally, the additional tools or blades implemented in this console are great. You can go from basic security implementation to a fairly advanced one with all the blades you have available.

The separate environment of the Check Point gateways is one of the most important features. The separate management allows for the continued use of the gateways.

View full review »
SameerMogale - PeerSpot reviewer
SameerMogale
Independent Business Owner at a tech company with self employed

The company uses software called Harmony. Check Point integrates nicely, whether on an endpoint or mobile device. It integrates well with the firewall and can give me reports that I can check without going to an online portal.

View full review »
reviewer2000274 - PeerSpot reviewer
reviewer2000274
Software Engineer at a tech vendor with 201-500 employees

The set threat prevention tools have advanced the security monitoring systems and set up reliable data management platforms. 

Security analysis has helped teams in the organization plan and deploy the best security systems for protecting data. 

The malware detection feature has enabled the organization to block unauthorized attacks that can destroy data and leak confidential information.

Check Point Security Management has reduced operational costs and improved overall data security performance. 

Most set features have contributed to security stability in the organization, and I highly recommend this platform to other organizations.

View full review »
reviewer2040309 - PeerSpot reviewer
reviewer2040309
Property Accountant at a real estate/law firm with 201-500 employees

The advanced security operational features help the business to identify weak points that can leak data to unauthorized personnel and take necessary precautions. 

Autonomous IoT Security monitors the performance of applications and equips them with safety measures to prevent risks and attacks. 

Deep learning threat prevention has blocked unsafe sites and phishing attacks from cyber attackers. 

It has audited the entire network and removed threat barriers that are used to slow down workflows. 

The cost of running this software has been reduced due to the modern automated version that can work faster without human intervention.

View full review »
Hazel Zuñiga Rojas - PeerSpot reviewer
Hazel Zuñiga Rojas
Administrative Assistant at a engineering company with 51-200 employees

Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it. 

Among its advantages and features that add value is managing teams both on-premise and in the cloud, regardless of the type of cloud. It helps to have and use a solution that adapts to environments and is easy to manage and configure. 

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Jonathan Ramos G.
Cloud Engineer at a tech services company with 51-200 employees

Among the most valuable features is the ability to manage everything simultaneously. It can integrate with the Check Point Infinity Cloud. 

The costs of acquiring a server for this task is of value. Each of us who are administrators can continuously manage the security of companies. This management manages not only Firewall-type appliances but also Cloudguard IaaS-type appliances.

View full review »
reviewer1805079 - PeerSpot reviewer
reviewer1805079
Network Engineer at a maritime company with 501-1,000 employees

The importance of centralized administration cannot be overstated. As a network security engineer, I must mention that it allows us to manage all of our Check Point devices from a centralized point. 

Although there is certainly room for improvement in the UI, I am pleased that Check Point continues to correct and enhance. 

Furthermore, they provide some new features that will revolutionize security administration.

View full review »
LN
Linh M. Nguyen
Technical Manager at a tech services company with 501-1,000 employees

The most valuable feature is Management API. It has been supported since R80 and above. Why? For firewall administrators who handle many tasks daily on not only Check Point systems. They are flooded with their boring manual tasks but always got stuck with request tickets. For security analysts who work with numerous logs from many sources and take actions to stop attacks. Can analysist and protection be highly effective if they must take much time in implementing policies? All limitations above can be solved with Check Point Management API. The administrators can automate and improve their productivity in operation by scripting. The security analysts can immediately apply security settings on the firewall while saving their time and concentrate on their research job. This feature is very useful and Check Point works great job to support many security aspects with easy-to-understand guide.

View full review »
reviewer1858884 - PeerSpot reviewer
reviewer1858884
Network Administrator at a computer software company with 1,001-5,000 employees

The compliance is great. It verifies the overall compliance of all of the gateways and attached policies against standards. It offers ready-to-use reports that are detailed.

The SmartView monitor is helpful. Having the ability to give read-only access to our system admins where they can look into the firewall logs is a huge plus and reduces the load on the dependency of the network admins. Also, it is very handy in that it is a web console and not an application that needs to be installed on your computer to view the logs. 

It displays very nice dashboards.

View full review »
CK
Christine Kunda Chungu
Systems Engineer at a tech services company with 11-50 employees

The smart event feature is the most valuable. The consolidated logs give full network visibility. 

The smart console has been able to provide us with good detailed information and reports ranging from bandwidth, risky applications, IPS reports, VPN reports, and infected hosts on the network. 

Reports help determine which machines may be infected with bots if they indicate that they were trying to connect to command and control servers, smart event helps determine these machines by IP address or username. 

The IPS also indicates what attacks and from where we're trying to hit our organization which helps us twerk our settings accordingly to have the most security we can get. 

View full review »
reviewer1965150 - PeerSpot reviewer
reviewer1965150
System Engineer Network & Security at a retailer with 10,001+ employees

The management API is the best new feature for me. It allows us to further automate our customers' automated server ordering.

The API reduces the administrative effort so that we can concentrate on essential things. It is an enormous advantage for our customers that rules are created automatically and are available immediately. 

For our private cloud, we have to stay competitive with the public clouds and the speed on offer is what counts here. It's good.

The new web management tool allows the management in the browser, which is a great feature.

View full review »
reviewer1721694 - PeerSpot reviewer
reviewer1721694
Network Security Engineer at a security firm with 11-50 employees

We love the ability to monitor performance in real-time, and gather critical information about network flows and traffic. 

The controls for creating, modifying, and editing firewall policies, firewall configurations, and other system operations are very simple and seamless. Accessing and viewing logging from many firewalls worldwide is also made very simple and intuitive with the ability to see both an overall picture of the logging, as well as the ability to filter down to the most specific traffic flows.

View full review »
reviewer1658724 - PeerSpot reviewer
reviewer1658724
Assistant Manager IT Operation at a tech services company with 10,001+ employees

We have found all the security blades very helpful. The IPS blade, Antivirus blade, Anti-bot blade, Threat Emulation blade, and Threat Prevention blades have been most useful in securing the network. 

With the antivirus, IPS, and Anti-bot blades signatures being automatically updated regularly on a daily/hourly basis, the network is always safe. 

The URL and Application Filter blade offers a daily update of the database which helps us control the traffic. 

Mobile access has helped us cater to more than 4000 users so that they can work from home.

View full review »
reviewer1670154 - PeerSpot reviewer
reviewer1670154
Firewall Engineer at a logistics company with 1,001-5,000 employees

Using a single GUI with a single management IP makes things easier if you have to administrate several customers. In the Multi-Domain Environment, you are able to see an overview of all the different customers.

Several health checks are shown for the gateways in an overview so you don't always have to use a monitoring system in parallel since you see some states at a glance after logging in.

Having the possibility to use Smart Event to check for threats on a broader scale helps after a security incident and also makes it easier to check - instead of looking through different logs.

View full review »
reviewer1668993 - PeerSpot reviewer
reviewer1668993
Presales engineer cybersecurity expert en ElevenPaths at a comms service provider with 10,001+ employees

One of the features that attract me the most is being able to activate different functionalities through its blades, having centralized point access to all of them, and being able to activate and deactivate them as needed.

In addition, the fact that everything starts from the same unified management console makes it very easy to integrate new equipment or functionalities once the operator has become familiar with it, as everything will follow similar management or operation mechanisms.

This is one of the aspects I value the most.

View full review »
PD
PRAPHULLA DESHPANDE
Associate Consult at a security firm with 1,001-5,000 employees

Some of the great aspects of the solution include:

1. Smart Event is a great feature of the Check Point management console. It gives a complete graphical view of more than a year of traffic flow including botnet traffic, malicious host present in-network, compromised hosts, and many more.

2. Object (based on IP, hostname, domain name) configuration.

3. Application and URL filtering configuration.

4. Log monitoring and alert configuration.

5. IPS configuration with improved performance.

6. Applying filters based on source, destination, port, application, etc. which is easy compared to all other vendors in the market.

7. Managing clustering for gateways - including their live health check performance - can be done on the dashboard itself.

8. The SSL VPN monitoring based on users and tunnel monitoring are great value-added features present in the management console.

View full review »
reviewer1629138 - PeerSpot reviewer
reviewer1629138
Senior Infrastructure Service Specialist at a financial services firm with 10,001+ employees

The Check Point Security Management platform provides a central location for the management of domains and firewalls in the environment. The nature of the product brings valuable returns to the operation, increasing efficiency when configuring and troubleshooting.

The intuitive interface also allows new team members to adapt to the technology if they are not familiar with it initially. It doesn't take much for one to familiarize themselves with the product.

Another great feature is to have available logs in a central location, enabling the troubleshooting of security issues anywhere in the environment.

View full review »
it_user1626507 - PeerSpot reviewer
it_user1626507
Senior Infrastructure Services Specialist at a financial services firm with 10,001+ employees

The Main Domain Log Management Server is what I find to be the most valuable feature for the Security Management of our environment. With the Main Domain Log Management Server, support teams are able to check and verify the information required to determine if any traffic is getting blocked or denied due to specific policy rule implementation. It can even identify any traffic getting spoofed or any other related events on the gateways. It has a central management log server that helps us to easily identify faults and issues in the environment, especially during outages and incidents during the implementation of policy rules.

View full review »
it_user1626507 - PeerSpot reviewer
it_user1626507
Senior Infrastructure Services Specialist at a financial services firm with 10,001+ employees

The Main Domain Log Management Server is what I find to be the most valuable feature for the Security Management of our environment. 

With the Main Domain Log Management Server, support teams are able to check and verify the information required in order to determine if any traffic is getting blocked or denied due to specific policy rule implementation, or even identify any traffic getting spoof or any other related events on the gateways. 

It has a central management log server that helps us to easily identify faults and issues in the environment, especially during outages and incidents during the implementation of policy rules.

View full review »
reviewer1600518 - PeerSpot reviewer
reviewer1600518
Global IT Network and Security Service Senior Specialist at a manufacturing company with 1,001-5,000 employees

The unique management using Smart Console for all Firewalls is very useful. Also, the management of policies and the log page allows for easy troubleshooting and configuration using a single pane of glass. The new release R81 allows a very fast installation of policies on the firewalls.

The MEP feature had a lot of problems during the implementation, needing configuration of TXT file via the CLI, however, at the end of the implementation, it is working well and has given us a very good advantage on the VPN solution in our company. I hope to see other useful features in the next release.

View full review »
KP
Kirtikumar Patel
Network Engineer at a tech company with 10,001+ employees

The most valuable feature for me is Identity Awareness.

Earlier, we were creating policies with a machine IP-based policy. Whenever a user's machine was changed we had to manually change that machine IP to streamline the user access without their work being interrupted. That was a very hard task for me but now, with this identity awareness blade, we are creating users with their user ID.

If any user changes desk location or something else, we map the user ID-based access. It is a one-time activity and we are very happy with it.

View full review »
Oleg P. - PeerSpot reviewer
Oleg P.
Senior Network and Security Engineer at a computer software company with 201-500 employees

As the security administrator, who is responsible for the day-to-day tasks (e.g. creating new firewall rules, monitoring the security alerts and incidents etc.) and the maintenance (e.g. installing the new Jumbo Hotfixes), I find the Check Point Security Management R80.10 to be the great solution. 

Now everything is configured in one place - the unified SmartConsole, which helps me in saving the working time and not jumping from one console or dashboard to another constantly. The interface is cozy and modern. I especially like built-in searching capabilities - you may not just find the objects, but also see where exactly it is used across the whole security policy. Also, now the latest logs may be seen in the security policy as well, per matched rule. 

View full review »
Richard Lachira - PeerSpot reviewer
Richard Lachira
Consultant, Reseller and IT Infrastructure Projects at a tech services company with 11-50 employees

The most valuable feature for me is the firewall. Whether it's five stars or even higher, the analytics reports it provides are truly impressive. They offer valuable Key Performance Indicators (KPIs) that shed light on various situations and different logs.

View full review »
reviewer1853913 - PeerSpot reviewer
reviewer1853913
Senior cyber security specialist at a computer software company with 1,001-5,000 employees

The solution offers ClusterXL, Secure XL, and Core XL.

When working with it, you will encounter three main components: Security gateway, security management server, and Smart Console. 

Customer support is very good and they have depth knowledge on the particular technology which helps us in fixing the problems ASAP. 

Remote and site-site VPNs we can easily deployable and maintenance  upgrade of the tunnel parameters becomes very easy as this is having the simple smart console access to the gateways. 

Also the multi-domain smart dashboard is another capability to manage multiple firewall through the single console.

View full review »
reviewer1250127 - PeerSpot reviewer
reviewer1250127
Systems Administrator with 201-500 employees

This solution is easy to install and deploy. It is also user-friendly.

View full review »
reviewer1591110 - PeerSpot reviewer
reviewer1591110
ICT at a manufacturing company with 501-1,000 employees

Check Point Security Management has a beautiful interface for viewing logs and access reports. You can create many filters and run queries from a modern graphical interface without resorting to shell commands.

View full review »
reviewer1578726 - PeerSpot reviewer
reviewer1578726
Works at a financial services firm with 5,001-10,000 employees

It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution. Check Point is effective when it comes to security control and threat prevention.

View full review »
ST
Swapnil Talegaonkar
Technology consultant at a tech services company with 501-1,000 employees

The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration. Logs are collected at the management server, hence we can preserve those as well. 

We can keep on adding new devices that can all be managed from a single security management server.

After the upgrade to R80, we have a single interface for all activities. Previously, we needed to configure using different applications.   

View full review »
reviewer1098015 - PeerSpot reviewer
reviewer1098015
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees

The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other. We have a centralized point of managing the firewall in terms of firewall policy and in terms of threat prevention policy where we can easily review the antivirus policy. It has a good description of which protection we are applying to the IPS on the antivirus. It's very clear and easy to use.

The SmartConsole chooses which application communicates with the manager and allows us to create the policies and also look at the log of the traffic that is crossing all the firewalls. We can manage and also see the logs of what is happening on the firewalls.

View full review »
GC
GeraldChege
ICT Officer at a healthcare company with 1,001-5,000 employees

In terms of most valuable features, I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation. These allow me to select to whom to do what, and when.

View full review »
SA
Sadiq Abdulwahab
Network Administrator at a printing company with 501-1,000 employees

The additional features offered by the solution are excellent. We didn't have a lot of these on a previous solution, and they've proven to be an advantage for us.

Based on my personal use of the system, the interface is quite good.

View full review »
Mohammed Semmour - PeerSpot reviewer
Mohammed Semmour
Scaling Engineer at a tech services company with 51-200 employees

One of the most valuable features is the console application.

It's a great solution for management. We can manage a lot at the same time with one security management system. Also, each gateway depends on the other, which is helpful.

View full review »
reviewer1181253 - PeerSpot reviewer
reviewer1181253
System and Network Engineer at a non-tech company with 1,001-5,000 employees

The firewall's blades are the solution's most valuable feature.

View full review »
David Roy - PeerSpot reviewer
David Roy
Head of IT with 201-500 employees

The ability to include logs for everything that you do for admin. Also, it has web filtering built in and VPN. Those are the main features we use.

View full review »
MF
Mario Figueiredo
Security Specialist at a insurance company with 501-1,000 employees

URL filtering is a very important feature.

View full review »
reviewer1098015 - PeerSpot reviewer
reviewer1098015
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees

Check Point Security Management excels over Forti Management in daily operations, policy management, and graphical interface. It is easy to open and edit policies, search within them, and view logs.

View full review »
Buyer's Guide
Check Point Security Management
January 2026
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
879,853 professionals have used our research since 2012.