Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Cybersixgill comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Threat Intelligence Platforms
5th
Average Rating
9.0
Reviews Sentiment
7.3
Number of Reviews
63
Ranking in other categories
Log Management (10th), Advanced Threat Protection (ATP) (15th)
Cybersixgill
Ranking in Threat Intelligence Platforms
22nd
Average Rating
8.8
Reviews Sentiment
7.6
Number of Reviews
4
Ranking in other categories
Vulnerability Management (63rd), Digital Risk Protection (5th), Attack Surface Management (ASM) (24th)
 

Mindshare comparison

As of May 2025, in the Threat Intelligence Platforms category, the mindshare of Check Point Security Management is 0.3%, up from 0.2% compared to the previous year. The mindshare of Cybersixgill is 2.2%, down from 2.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Threat Intelligence Platforms
 

Featured Reviews

Ozan Durmus - PeerSpot reviewer
Good documentation and proxy support with a helpful community available for troubleshooting
It's useful that we can find unused objects. This helps us to get rid of unused objects in our database, Proxy support is valuable for us. We can apply centralized proxy settings to get additional databases when we need them. Revision history and detailed audit log is a good feature with this we can always feeling safe if somethings go wrong, I'm sure that I can go back the old one. Smart Event is a very good feature. It provides a graphical view of the traffics and provides history. The filter syntax is very good and helps control when we need it.
reviewer1533792 - PeerSpot reviewer
Contains a huge amount of information regarding deep web and dark web, reducing investigation times
In the search engine, you are able to use operators. These operators allow you to do specific searches or open searches. The main things are: * If you want to search everything related to a specific malware family but you don't want to have anything related to specific search. So, you can just upload it from the search engine and search for it. * If you only wanted to know about one specific vulnerability, but you don't care what is in Telegram or GitHub as repositories, then it will only care for these things in the dark web forums. You can narrow your search to that. * If you want only sites in Spanish, but not in other languages, you can narrow your search to that. There are a lot of possibilities when using the search engine. It has become really useful for my analysts. The solution has enabled us to access sources that we have not seen anywhere else, such as Telegram. It also gives us access to the Genesis Marketplace. Otherwise, we would have to pay someone for that. However, with Cybersixgill, we can go to the platform and search for whatever we want.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The product's installation phase was easy."
"We can track logs of each firewall which is very helpful."
"The firewall cleverly handles such attacks without compromising on performance."
"I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation. These allow me to select to whom to do what, and when."
"It offers numerous features and blades, including intrusion prevention (IPS) and malware detection. It excels in network security and VPN capabilities, including IPSec VPNs. IPS is particularly powerful due to its signature-based detection, which automatically checks for and identifies malicious software."
"The centralized logs and management are helpful."
"It's already helped secure our organization effectively."
"It's very easy for management to understand workflow and everything."
"The solution’s approach of using limited open source intelligence and focusing, instead, on the Deep Web and Dark Web is what seals the deal. That is why I like them. I have other tools that I can aggregate all the open source intelligence from. I value Cybersixgill because it provides access to things that no one else does."
"The advanced analysis has made our security operations more efficient. It has also potentially given us quicker access to data that we might not have otherwise located."
"They also provide some of the greatest notification capabilities. I put in a customer's company name and domain names, or sometimes I put in their IP addresses as a keyword. Once Sixgill collects information that includes those keywords, they then provide us email notifications. That means we can catch information related to our customers as soon as possible."
"To be diligent for the customer, we usually go into Cybersixgill Investigative Portal to analyze and search things. The solution tells us the reputation of cyber threat actors. So, if someone has a reputation of one, it is a really bad idea to care about what that person is saying. However, if you find someone with a reputation of nine, then there is a high probability that we need to address the problem. You can get information about these type of actors in Cybersixgill Investigative Portal. They have a huge collection, which is like having the rules/goals of the dark web and deep web without having to go there. Our analysts avoid going dark web because they have Cybersixgill Investigative Portal and can get the news from their browser, searching wherever they want."
 

Cons

"It sometimes blocks safe sites when I am researching, affecting the overall output and wasting time."
"Check Point could possibly lighten up the software code so that it is not as resource-intensive and will run more smoothly on a variety of hardware and cloud or virtual machine platforms."
"I would like for users to have more control over the platform in the next release. Right now, the system is very central and general requiring new rules to be created that better-suite our requirements."
"Among the things that I would like in the future is for the solution to have its application on Android and iOS, as many of the administrators have adopted remote administration positions due to what has happened since the pandemic. This would help us to have an easier and simpler administration."
"The reporting should be improved in future releases. It needs to be very explicit. This is very important."
"We are not sure if there is a centralized security console available. It would be beneficial if all firewalls could be integrated under one management console."
"I like that the Compliance software blade is available for free with the Security Management server purchase, but it is free for only one year - after that you have to buy an additional license to continue using it. I think such an important feature is vital for the management server, and should not be licensed separately."
"In order to work management console, you need some good appliance or you need to provide more CPU and Memory to the appliance."
"The breadth of access to data is good, but there are gaps. More data would be my suggestion because the platform is good and I have no complaints about the system. I think it is just a case of always trying to get more data sources."
"We need real-time updated information. If we could have this, it would be amazing. For example, if someone was posting something, then ten second later, it was on the platform. Sometimes, it takes a minute or hours right now, depending on the forum."
"Sixgill has strong capabilities based on search queries, but there is some difficulty in using Sixgill. Their querying is very powerful but it can be difficult. It's not hugely complex but you need some skill to use Sixgill querying."
"Regarding their scraping abilities, things could be solidified. There are definitely improvements that could be made on the specificity for setting certain queries."
 

Pricing and Cost Advice

"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"The solution is expensive and there is an annual license."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"This product can be used for 25 security gateways on a basic license."
"The solution is expensive."
"Do the homework because Check Point is rather expensive."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"Price-wise, it is an expensive solution."
"The pricing and licensing are good. It is expensive for us because the US dollar is quite strong compared to our dollar. Otherwise, it is quite reasonable for what it is. All the tools in the market are around the same price from my experience."
"The pricing is cheap compared with Recorded Future. Sixgill's cost-effectiveness is very good."
"Sometimes, Cybersixgill Investigative Portal is cheaper than its competitors."
report
Use our free recommendation engine to learn which Threat Intelligence Platforms solutions are best for your needs.
850,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Financial Services Firm
11%
Government
10%
Manufacturing Company
6%
Computer Software Company
14%
Manufacturing Company
13%
Financial Services Firm
11%
Educational Organization
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
One case I saw was with the logs, which gave me the transfer and the vibration. There's a lot of logs, and I'm unsure about their validity, however, they take up a lot of space. We had to provision...
What is your primary use case for Check Point Security Management?
This is the Wi-Fi documentation. I work with the service, and we are partners with Check Point. One of our clients, Parliament, required an upgrade from physical to virtual implementation. This was...
Ask a question
Earn 20 points
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
No data available
 

Overview

 

Sample Customers

Hedgetec, Geiger
Current customers include large enterprises, financial services, manufacturing, GSIs, MSSPs, government and law enforcement entities.
Find out what your peers are saying about Check Point Security Management vs. Cybersixgill and other solutions. Updated: April 2025.
850,028 professionals have used our research since 2012.