Try our new research platform with insights from 80,000+ expert users

Anomali vs Check Point Security Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Apr 1, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Anomali
Ranking in Advanced Threat Protection (ATP)
22nd
Ranking in Threat Intelligence Platforms
7th
Average Rating
7.8
Reviews Sentiment
7.2
Number of Reviews
4
Ranking in other categories
Security Information and Event Management (SIEM) (34th), User Entity Behavior Analytics (UEBA) (19th), Extended Detection and Response (XDR) (28th)
Check Point Security Manage...
Ranking in Advanced Threat Protection (ATP)
13th
Ranking in Threat Intelligence Platforms
5th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
64
Ranking in other categories
Log Management (6th)
 

Mindshare comparison

As of June 2025, in the Advanced Threat Protection (ATP) category, the mindshare of Anomali is 1.2%, up from 1.1% compared to the previous year. The mindshare of Check Point Security Management is 0.6%, up from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP)
 

Featured Reviews

CC
Enables automated threat intelligence sorting and enhances proactive threat hunting capabilities
You have to have at least a threat intelligence background or a SOC analyst background to use it, as that's the information you'll dig around with in there. If you don't have that kind of knowledge, it probably can be a little hard to use, but they do provide training. They offer training not only for how to use the platform but also some basic threat intelligence training to explain what these things are and what these terms mean. My company is a customer of Anomali. I would recommend it to other people. I would advise making sure you don't pick it without testing other products and have your use cases well thought out and documented before testing, so you know it will solve the problems you're trying to address. Keep an open mind with it and realize that whatever you can dream of, you can probably do with the platform. Overall, I would rate Anomali an eight out of ten.
NareshKumar10 - PeerSpot reviewer
Enhanced Internal Security and Efficiency
Check Point Security Management can be improved by addressing a negative challenge I face: sometimes it does not show internet utilization in the GUI. When I ask support, they tell me to upgrade the firmware, which happens quite frequently. Since I deployed the device in my on-premises environment 1.5 years ago, I have experienced this issue three times. Check Point Security Management has not impacted my daily work or decision-making in any negative way. As an IT person, I occasionally need to check how much internet bandwidth has been used in the internal network over the past month, day, or week. During those times, when I open the data utilization column, it shows nothing available. Each time this happens, I need to upgrade to the latest version of the firmware, and this frequent updating affects my productivity negatively. If Check Point addresses this issue in the future, it will be beneficial for all customers using Check Point SMBs.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable aspect of Anomali is the threat modeling capability."
"The feature I have found most valuable is credential monitoring. This feature is easy and quick."
"I have found Cyber threat intelligence (CTI) very useful and concise. The solution is easy to use."
"We now have a very robust collection of threat intelligence based on the capabilities that Anomali provides."
"URL filtering is a very important feature."
"The rulebase management and the shared layers concept is implemented well."
"The most valuable feature of Check Point Security Management is the high level of visibility"
"It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution. Check Point is effective when it comes to security control and threat prevention."
"The centralized logs and management are helpful."
"The unique management using Smart Console for all firewalls is very useful."
"With the generation and review of logs, we have verified some vulnerabilities and attempted attacks to generate improvements in our infrastructure and policies to help avoid issues in the future."
"The product has done a great job in protecting our business network and SCADA systems."
 

Cons

"Support in the past has been top-notch, but recent trends indicate that it has taken a back seat, as we often don't get answers for days."
"A lot of tools can give you many features, such as CTI intelligence and a tax service reduction. However, many people are combining different tools together to have more capabilities. It is up to the consumer whether they want to have multiple tools or have one tool that serves the purpose. Anomali Enterprise could improve by combining all the other tools' features into one solution."
"An area for improvement is the intelligence sharing within the Anomali community. The tagging system can be inconsistent, as any company can use any tags for their reporting."
"Less code in integration would be nice when building blocks."
"I've found the solution was a bit unstable."
"I would like to bind users to their network, as well as their local office machine."
"It would be great if the SmartView Monitor could become integrated into the SmartView Console Platform."
"Check Point could improve by enhancing the networking in their solution in order to align it with the existing network architecture."
"The usability of the solution could be improved."
"We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners."
"Check Point Tech Support will not assist with new configurations if we encounter any issues during the configuration process."
"The tracking of new threats could be improved."
 

Pricing and Cost Advice

"When comparing the price of Anomali Enterprise to other solutions it is in the medium to high range. However, I am satisfied with the price."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"Do the homework because Check Point is rather expensive."
"This product can be used for 25 security gateways on a basic license."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"The solution is expensive and there is an annual license."
"Price-wise, it is an expensive solution."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"The solution is expensive."
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
857,162 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
13%
Government
9%
Manufacturing Company
7%
Computer Software Company
13%
Financial Services Firm
12%
Government
9%
Comms Service Provider
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What needs improvement with Anomali ThreatStream?
An area for improvement is the intelligence sharing within the Anomali community. The tagging system can be inconsistent, as any company can use any tags for their reporting. Combining all aliases ...
What is your primary use case for Anomali ThreatStream?
I use Anomali ( /products/anomali-reviews ) for threat hunting, threat collection, operationalization of intelligence, such as indicators of compromise (IOCs), and dissemination of reports for repo...
What advice do you have for others considering Anomali ThreatStream?
For new users, I recommend taking the training provided by Anomali as it is very well articulated. I advise reading the user manual and taking the instructor-led training sessions from the customer...
What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
Check Point Security Management can be improved by addressing a negative challenge I face: sometimes it does not show internet utilization in the GUI. When I ask support, they tell me to upgrade th...
What is your primary use case for Check Point Security Management?
My main use case for Check Point Security Management is using it as a firewall, which ignores all my data threats, and it is useful to secure my inside IT infrastructure. It secures all the data an...
 

Also Known As

Match, Lens, ThreatStream, STAXX, Anomali Security Analytics
R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
 

Overview

 

Sample Customers

Bank of England, First Energy, UBISOFT, Bank of Hope, Blackhawk Network
Hedgetec, Geiger
Find out what your peers are saying about Anomali vs. Check Point Security Management and other solutions. Updated: June 2025.
857,162 professionals have used our research since 2012.