

Check Point Security Management and Cribl are prominent competitors in the security technology solutions and data management category. Check Point appears to have the edge due to its comprehensive identity and log management capabilities that benefit large-scale deployments.
Features: Check Point's standout features include Identity Awareness, which simplifies access management; Main Domain Log Management Server, which centralizes log analysis; and policies management for threat prevention. Cribl is known for its impressive data routing capabilities, the ability to integrate with multiple data sources and destinations, and an intuitive UI for users managing data pipelines.
Room for Improvement: Check Point could improve by integrating SmartView Monitor with newer platforms, streamlining access rules, and enhancing initial setup documentation. Cribl could focus on expanding integrations, refining documentation for better onboarding, and improving management for complex pipelines.
Ease of Deployment and Customer Service: Both Check Point and Cribl offer versatile deployment options, including on-premises and various cloud models. Check Point's customer support is seen as knowledgeable but inconsistent, while Cribl is praised for quick deployment but would benefit from more robust customer support and faster adaptation timelines.
Pricing and ROI: Check Point's pricing is higher, necessitating individual feature blades, though it offers ROI through reduced manpower and security enhancements. Cribl presents a cost-effective model with substantial data ingestion cost reductions, yielding a significant ROI, particularly in data-intensive environments.
I have seen a strong ROI from using Check Point Security Management through unified policy management, reduced misconfigurations, and faster incident response.
The time to resolve issues is very much better now with Check Point Security Management.
I have seen a hundred percent return on investment with Check Point Security Management.
What we've seen is really an overall reduction of just shy of 40% in our ingest into our SIM platform versus prior to having Cribl.
The second thing is that data aggregation, sampling, and reduction that we're able to do of the data, lowering our overall data volume, both traversing the network as well as what's being stored inside of our final solutions.
In terms of reduction, we were able to save almost ~40% of our total cost.
When we face technical issues, they are ready to help us.
Customer support for Check Point Security Management is excellent
We have partner support that helps us mitigate vulnerabilities reported by our infrastructure team.
They had extensive expertise with the product and were able to facilitate everything we needed.
Usually, within an hour, we get a response, and we are able to work with them back and forth until we resolve the issues.
Sometimes by hearing the problem itself, they will know what the solution is, and they will let us know how to resolve it, and we do it immediately.
It can be a multi-domain Security Management server and can manage large or segmented environments with multiple domains or customers.
When you upgrade multiple times, you leave many files that are useless. They are dated, so it's always better to create a new machine every few versions, for example, three or four major versions.
The scalability of Check Point Security Management is excellent.
The infrastructure behind Cribl Search is also scalable as it uses a CPU and just spawns horizontally more instances as it demands and requires.
Compared to other SIEM tools I use, any slight change on the operating system end impacts a lot on our SIEM tools and other things, but Cribl performs well in that regard.
Cribl performs effectively across both market segments.
Check Point Security Management is really stable, and I have not experienced any downtime or issues with reliability except for when we do upgrades.
The SmartConsole used to administrate the security management is somewhat unstable.
Check Point Security Management is very stable in my experience, ensuring that our operations run smoothly without interruptions.
Migrating from those SC4S servers to Cribl worker nodes has truly been a game-changer.
Regarding scalability, we started with zero servers and have around 285 servers now.
Cribl is designed to deal with certain kinds of loads and is not designed to handle any scenario in the market.
When the logs are too heavy for the security management server, the CPU spike will be high, causing our management day-to-day activity to lag or become difficult.
Refining reports and automation capabilities to make it more intuitive and scalable for diverse enterprise environments could improve Check Point Security Management.
Engaging role-based access control is essential; granular permissions for more flexible RBAC will allow the organization to delegate tasks.
A more stringent role-based access control feature would enhance security and allow granular control over what users can see and access.
When passing query logs or DNS logs, if certain malicious query patterns need to be identified or if fast-flux attacks are happening, Cribl can report that and those would definitely be a plus for them.
I would advise others looking to implement Cribl that if they are evolving Cribl Search, it would be very interesting to see more capability, more flexibility, and more ways to share the data similar to Splunk.
Since we are using it extensively, we get significant discounts during procurement.
Licensing is quite expensive.
We pay on a three-year base.
Over time, the licensing cost has increased.
It was cheaper than the Splunk license.
Splunk is more expensive, and Cribl appears to be more affordable.
Check Point Security Management has positively impacted my organization by providing centralized control, allowing us to manage all security policies and gateways from a single console, reducing complexity and saving time.
After deploying Check Point Security Management, we improved our productivity by integrating all devices into a single console instead of managing separate log-ins for each branch's gateways, making our admin team's tasks easier.
The monitoring is exceptional as it provides consolidated logs, signals, and any alerts that come from the security gateway in real time.
The data reduction and preprocessing capabilities make Cribl really unique.
Cribl has a feature called JSON Unroll or Unroll function that allows you to differentiate the events; each event will come ingested as a single log instead of piling it up with multiple events.
The Cribl UI is very simple and easy to use, particularly when working with data from various sources; it makes it very easy to create pipelines, add complex logic to those pipelines, and then gives you a preview of what your data looks like before applying that pipeline and what you get after.
| Product | Mindshare (%) |
|---|---|
| Cribl | 2.7% |
| Check Point Security Management | 0.7% |
| Other | 96.6% |

| Company Size | Count |
|---|---|
| Small Business | 55 |
| Midsize Enterprise | 31 |
| Large Enterprise | 43 |
| Company Size | Count |
|---|---|
| Small Business | 34 |
| Midsize Enterprise | 6 |
| Large Enterprise | 34 |
Check Point Security Management is an advanced security management platform for enterprises. The platform integrates all aspects of security. A single platform manages the entire infrastructure, from data centers to private/public cloud deployments.
Check Point Security Management is a reliable and easy-to-use security platform. It integrates all aspects of your security environment to strengthen the security posture without impairing productivity. The system has a layered policy model. This means the security policy can be separated into layers for network segmentation. Different administrators can manage different policies. The policy layer automates the tasks.
The platform is extensible, scalable, and integrates easily with orchestration systems and change management.
Basic Components of the Infrastructure
The smart console offers several advantages. Changes in security policies and logs can be done with a click. You can navigate from an item within a log to the policy. There are also built-in multi-language support and accessibility features.
1. Security Management Server: The server manages security gateways with set security policies and monitors security events on the network.
The automation server is an integrated part of the management server. The API server is active by default on servers with 4 GB of RAM or more and on standalone servers with 8 or more GB of RAM.
The automation server communicates with the management server the same way as the Smart Console. This architecture allows the same validation errors and warnings to be presented when using an automation session.
The same audit logs generated using the Smart Console are also generated using an automation session. If you have a multi-domain environment, there is only one automation server that monitors all the IP addresses of the multi-domain management server.
2. Security Gateway is placed at the edge of the network. It monitors and filters traffic and enforces security policies.
Logging, Event management, and Monitoring
With Check Point Security Management, logging, reporting, event management, and monitoring are integrated. The platform features widgets and chart templates that optimize visibility. One of the best features is the one-click exploration. This simplifies going from a general overview to specific event details.
Benefits of Check Point Security Management
The unified console also means a single policy for users, data, applications, and networks. The granularity control helps accelerate administration processes. This feature, together with automation, is key to achieving reduced operational overhead. Security teams can automate tasks and even create self-service security web portals with the Check Point Security Management platform.
Threat management is fully integrated, with reporting, logging, and monitoring all in one dashboard. This provides full visibility into the security of the network.
Security Management Suite
The Security Management Suite consists of the following modules:
Reviews from Real Users
A Network Security Engineer/Architect at a tech services company says, "The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other."
"The management API is the best new feature for me. It allows us to further automate our customers' automated server ordering," says a System Engineer Network & Security at OTTO GmbH & Co KG.
A Senior Infrastructure Services Specialist at St.George Bank Limited adds that "The solution is ideal for use and deployment in a large infrastructure environment."
Cribl offers advanced data transformation and routing with features such as data reduction, plugin configurations, and log collection within a user-friendly framework supporting various deployments, significantly reducing data volumes and costs.
Cribl is designed to streamline data management, offering real-time data transformation and efficient log management. It supports seamless SIEM migration, enabling organizations to optimize costs associated with platforms like Splunk through data trimming. The capability to handle multiple data destinations and compression eases log control. With flexibility across on-prem, cloud, or hybrid environments, Cribl provides an adaptable interface that facilitates quick data model replication. While it significantly reduces data volumes, enhancing overall efficiency, there are areas for improvement, including compatibility with legacy systems and integration with enterprise products. Organizations can enhance their operational capabilities through certification opportunities and explore added functionalities tailored towards specific industry needs.
What are Cribl's most important features?Cribl sees extensive use in industries prioritizing efficient data management and cost optimization. Organizations leverage its capabilities to connect between different data sources, including cloud environments, improving both data handling and storage efficiency. Its customization options appeal to firms needing specific industry compliance and operational enhancements.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.