Try our new research platform with insights from 80,000+ expert users

Change Auditor for Windows File Servers vs Check Point Security Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Change Auditor for Windows ...
Ranking in Log Management
31st
Average Rating
9.0
Reviews Sentiment
7.6
Number of Reviews
2
Ranking in other categories
No ranking in other categories
Check Point Security Manage...
Ranking in Log Management
8th
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
70
Ranking in other categories
Advanced Threat Protection (ATP) (11th), Threat Intelligence Platforms (TIP) (6th)
 

Mindshare comparison

As of October 2025, in the Log Management category, the mindshare of Change Auditor for Windows File Servers is 0.2%, up from 0.1% compared to the previous year. The mindshare of Check Point Security Management is 0.5%, down from 0.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management Market Share Distribution
ProductMarket Share (%)
Check Point Security Management0.5%
Change Auditor for Windows File Servers0.2%
Other99.3%
Log Management
 

Featured Reviews

KF
Provides granular queries of security logs and real-time alerting helps me mitigate risks
The real-time alerting helps me mitigate risks. For example, someone adds a member to the domain admin group. We have an alert set up, so if someone does this unexpectedly, we get notified. Then, we can check and verify if the action is legitimate or a potential threat to the environment.
reviewer2751156 - PeerSpot reviewer
Years of using the solution significantly improve log management and troubleshooting efficiency
Check Point Security Management has positively impacted my organization because, after migrating from our previous firewall, a Cisco ASA, we were able to see what traffic was passing through the firewall and from that, build out least access privilege firewall rules. So only what's actually needed by the organization is being let through. The rest is being dropped. The measurable outcomes with Check Point Security Management show that the troubleshooting is definitely quicker. Now it just takes a few minutes to find out where the error is and resolve it. Before, it was at least an hour or two of troubleshooting to locate the issue.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"In terms of features, the querying is great."
"The solution's most valuable aspect is that it can be fully integrated with Microsoft solutions and it doesn't impact the productivity order."
"Check Point Security Management Server offers a wide range of security features, including firewall, intrusion prevention, VPN, application control, and threat prevention capabilities."
"Check Point Security Management has helped my team save time, improve security, and reduce manual work significantly."
"Check Point management is one of the most complete solutions for managing Check Point Firewall appliances."
"Security Management gives us complete visibility into our security operations, allowing administrators to identify and address problem areas, reduce unnecessary costs, and improve efficiency. It offers detailed reports on network usage and security, which helps my company to monitor and control its security expenses."
"HA Structure provides good coverage and works fine."
"The control is granular, so you can set policy profiles for different organizational profiles."
"Check Point Security Management has improved our organization because all corporate firewalls can be managed with a single interface."
"The management API is the best new feature for me. It allows us to further automate our customers' automated server ordering."
 

Cons

"The pricing could be improved. It needs to be reduced."
"The customer service and support could improve their approach to questioning issues. They tend to ask questions one at a time, which creates a lot of back-and-forth communication."
"As per personal experience and based on many organizations, Check Point needs to improve PS services."
"They need to change the support resolution time."
"I like that the Compliance software blade is available for free with the Security Management server purchase, but it is free for only one year - after that you have to buy an additional license to continue using it. I think such an important feature is vital for the management server, and should not be licensed separately."
"While the console and administration work well, they have to work on performance since it consumes a lot of CPU and memory."
"You need some technical expertise to use the solution. I don't think it's accessible to the typical end-user. You need to access the box and use some command lines or the web interface. It would be nice to have a user-friendly dashboard and comprehensive reporting."
"The upgrade procedure already made huge improvements, yet it remains more challenging compared to other products."
"In the future, I would like to see more frequent updates because of the changing security landscape."
"The management API can be further developed so that all functions offered by the dashboard are also available via the API (for example, Network Topology)."
 

Pricing and Cost Advice

"The pricing is per user. The cost is approximately $15/user on a yearly basis. If you need to, you can always upgrade as well."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"This product can be used for 25 security gateways on a basic license."
"Do the homework because Check Point is rather expensive."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"The solution is expensive and there is an annual license."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"Price-wise, it is an expensive solution."
"The solution is expensive."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
869,760 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Computer Software Company
11%
Comms Service Provider
9%
Financial Services Firm
8%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business37
Midsize Enterprise28
Large Enterprise41
 

Questions from the Community

What needs improvement with Change Auditor for Windows File Servers?
They've already made improvements! They have a tool called IT Security Search, which lets you perform queries outside of Change Auditor. It's much faster. This is a really good addition and helps u...
What is your primary use case for Change Auditor for Windows File Servers?
I use Change Auditor for Windows File Servers to log history. It's helpful when we have critical changes in Active Directory, like adding or removing items. I use it extensively for monitoring.
What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
Performance with logs needs improvement as Check Point Security Management has large-scale environments that need dedicated log servers. If you store logs on the central management server or Check ...
What is your primary use case for Check Point Security Management?
We need central management for our policy, monitoring, and different day-to-day administrative tasks, so Check Point Security Management fits all the requirements for our needs. As we know, Check P...
 

Also Known As

No data available
R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
 

Overview

 

Sample Customers

Dragon Capital, Howard County MD
Hedgetec, Geiger
Find out what your peers are saying about Change Auditor for Windows File Servers vs. Check Point Security Management and other solutions. Updated: September 2025.
869,760 professionals have used our research since 2012.