Check Point Security Management vs Dynatrace comparison

Cancel
You must select at least 2 products to compare!
Check Point Software Technologies Logo
2,244 views|1,091 comparisons
98% willing to recommend
Dynatrace Logo
19,806 views|12,033 comparisons
95% willing to recommend
Comparison Buyer's Guide
Executive Summary
Updated on Jul 23, 2023

We performed a comparison between Dynatrace and Check Point Security Management based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.

  • Features: Dynatrace is highly regarded for its advanced AI engine and ability to identify infrastructure automatically. It also offers session replay and impressive visualization features. Check Point Security Management is praised for its centralized management features, user-friendly interface, and extensive monitoring capabilities. Some Dynatrace reviewers feel the learning curve is a little steep, and the documentation could be clearer. Users say that Dynatrace should offer more security options and improve integration with other tools. Check Point Security Management could improve by simplifying the migration of security policies, optimizing performance, and expanding its management API. Other pain points include threat tracking and documentation. 

  • Service and Support: Users generally found Dynatrace's customer service to be helpful and available, but some said that the response times and documentation have room for improvement. Check Point Security Management's customer service is widely praised for being knowledgeable, supportive, and reliable. Although some users had problems with inexperienced agents and coordination issues, the overall support experience is positive.

  • Ease of Deployment: Dynatrace's setup is simple, efficient, and requires minimal technical configuration. It takes a few hours at most. Check Point Security Management is generally seen as easy to set up if the user has some expertise.

  • Pricing: Users say Dynatrace is expensive. Some noted that the licensing model is complicated and not transparent. Some said they struggled to accurately predict the number of units needed. Check Point Security Management is seen as a solid investment, offering flexibility and a good value for the price.

  • ROI: Dynatrace users said the solution saved them money and reduced downtime. Check Point users said the solution offers a steady ROI over time.

Conclusion: Based on user feedback, Dynatrace is the preferred choice when compared to Check Point Security Management. Users appreciate its simple and hassle-free setup process, which requires minimal technical configuration and allows even junior engineers to handle it. In contrast, users have encountered potential complexities during migration and deployment with Check Point Security Management. Although it offers a wide range of security blades and valuable features, there is room for improvement in areas such as authentication, reporting tools, and performance stability. When it comes to pricing, Dynatrace is considered to offer good value for money with moderate pricing, while Check Point's pricing is higher but justified. 
To learn more, read our detailed Check Point Security Management vs. Dynatrace Report (Updated: April 2024).
768,857 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The solution is ideal for use and deployment in a large infrastructure environment.""Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it.""The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration.""It has a central management log server that helps us to easily identify faults and issues in the environment, especially during outages and incidents during the implementation of policy rules.""Each department can easily share data with the management without fear of data compromise.""The firewall cleverly handles such attacks without compromising on performance.""It's a great solution for management. We can manage a lot at the same time with one security management system. Also, each gateway depends on the other, which is helpful.""The interface also makes it easy for us to configure the VPN from the GUI rather than the command line, which makes it easy even for less experienced engineers to work with."

More Check Point Security Management Pros →

"Gives systems back-end visibility, allows for proactive monitoring, and improves the user's experience.""Real time monitoring helps reduce downtime. It saves a lot of time in determining what is the likely cause of an issue an end user may be experiencing.""We are using Dynatrace for prediction and staging for every step of our development cycle.""Great tool for deep diving into performance data and tracking issues through all the connected systems to better diagnose and pinpoint the real issues.""Agentless Transaction Analysis allows my team to granularly decompose complex operations and flows for business applications.""Understanding how the user was being targeted by the application as well as knowing their behavior using those applications.​""Service discovery with artificial intelligence automatic anomaly root cause detection, and problems replay.""Real user monitoring is one of the best things in solution. The possibility to analyze any particular user session is wonderful."

More Dynatrace Pros →

Cons
"Even though the platform is simple, and creating security policies is a fairly quick task, creating a bulk of policies at once (ie. for a migration) could be a useful tool. This is probably possible through scripting, however, having an easy-to-use "import CSV" button would be beneficial.""Check Point could improve by enhancing the networking in their solution in order to align it with the existing network architecture.""It would be helpful if the documentation and good practice guides are updated. Many are still from R77.""It sometimes blocks safe sites when I am researching, affecting the overall output and wasting time.""Installing a policy takes a very long time to complete.""We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners.""Check Point EDR has room for improvement, especially in the area of Data Loss Prevention where it currently lacks functionality.""Policy installation time can be reduced."

More Check Point Security Management Cons →

"They could also, develop an observability platform where you could have the ability to inject events, locks, and traces.""Alert triggers could be easier to setup and more granular.""Needs support for more technologies.""Another area for improvement is that I would like the alerting to be set up a little bit more easily. Currently, it takes a lot of work to add alerting, especially if you have a large environment, and I consider our environment to be quite large. The alerting takes a lot of administration.""As the product is evolving quickly and product features are added on a monthly basis, a more transparent roadmap would be more than welcome.""It is always requiring us to update the Dynatrace client.""The user interface is complicated, but recent web versions are getting better all the time.""There is another challenge, which is in case of the Managed solution. In our old solution we could simply export the data as session data, and that would be imported and seen. Now, if we are using the Managed solution, then giving someone access to that solution is a challenge. We can handle it, but it's different than taking screenshots and saving that information the way we used to. The copy/paste features that were there in old application - because it was a fat app - were nice, compared to browser-based app, because you cannot really use those features anymore."

More Dynatrace Cons →

Pricing and Cost Advice
  • "Do the homework because Check Point is rather expensive."
  • "This product can be used for 25 security gateways on a basic license."
  • "Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
  • "The solution is expensive and there is an annual license."
  • "Price-wise, it is an expensive solution."
  • "The solution is expensive."
  • "The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
  • More Check Point Security Management Pricing and Cost Advice →

  • "Pricing is based on the number of servers monitored, so for big applications, it is a bit expensive."
  • "Licensing is a bit complicated for Dynatrace, and pricing is dependent on how much your organization invests."
  • "We found an issue within the first week of ownership that has been costing us more than the entire license cost."
  • "Product pricing can seem a little over complex, however this is minor and does not detract from the benefits of the solution."
  • "Getting the first agents installed, getting information, and coverage in a initial set of systems can be done in hours and with a low cost entry point."
  • "Price (of the product) is a major concern for all the clients I work with."
  • "The licensing model is confusing in solutioning clients for the number of hosts needed to deploy."
  • "The product is superior to others, but it comes with a price tag that is often difficult to position back to clients."
  • More Dynatrace Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Log Management solutions are best for your needs.
    768,857 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as… more »
    Top Answer:Check Point EDR has room for improvement, especially in the area of Data Loss Prevention where it currently lacks functionality. I'd also like to see enhancements in content filtering and… more »
    Top Answer:We utilize Check Point Security Management for our daily security operations, including managing firewall rules, reviewing alerts, and generating reports on a weekly basis.
    Top Answer:The key is to have a holistic view over the complete infrastructure, the ones you have listed are great for APM if you need to monitor applications end to end. I have tested them all and have not… more »
    Top Answer:While the environment does matter in the selection of an APM tool, I prefer to use Dynatrace to manage the entire stack. Both production and Dev/Test. I find it to be quite superior to anything else… more »
    Top Answer:There are many factors and we know little about your requirements (size of org, technology stack, management systems, the scope of implementation). Our goal was to consolidate APM and infra… more »
    Ranking
    9th
    out of 95 in Log Management
    Views
    2,244
    Comparisons
    1,091
    Reviews
    29
    Average Words per Review
    479
    Rating
    9.0
    4th
    out of 95 in Log Management
    Views
    19,806
    Comparisons
    12,033
    Reviews
    15
    Average Words per Review
    468
    Rating
    8.5
    Comparisons
    Also Known As
    R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
    Learn More
    Overview

    Check Point Security Management is an advanced security management platform for enterprises. The platform integrates all aspects of security. A single platform manages the entire infrastructure, from data centers to private/public cloud deployments.

    Check Point Security Management is a reliable and easy-to-use security platform. It integrates all aspects of your security environment to strengthen the security posture without impairing productivity. The system has a layered policy model. This means the security policy can be separated into layers for network segmentation. Different administrators can manage different policies. The policy layer automates the tasks.

    The platform is extensible, scalable, and integrates easily with orchestration systems and change management.

    Basic Components of the Infrastructure

    1. Smart Console: The Check Point Graphical User Interface for connecting and managing Security Management Servers. The smart console provides an integrated solution via the following features:


    • Security policy management
    • System health monitoring
    • Multi-domain management


    The smart console offers several advantages. Changes in security policies and logs can be done with a click. You can navigate from an item within a log to the policy. There are also built-in multi-language support and accessibility features.

    1. Security Management Server: The server manages security gateways with set security policies and monitors security events on the network.

      The automation server is an integrated part of the management server. The API server is active by default on servers with 4 GB of RAM or more and on standalone servers with 8 or more GB of RAM.

      The automation server communicates with the management server the same way as the Smart Console. This architecture allows the same validation errors and warnings to be presented when using an automation session.

      The same audit logs generated using the Smart Console are also generated using an automation session. If you have a multi-domain environment, there is only one automation server that monitors all the IP addresses of the multi-domain management server.

      2. Security Gateway is placed at the edge of the network. It monitors and filters traffic and enforces security policies.

        Logging, Event management, and Monitoring

        With Check Point Security Management, logging, reporting, event management, and monitoring are integrated. The platform features widgets and chart templates that optimize visibility. One of the best features is the one-click exploration. This simplifies going from a general overview to specific event details.

        Benefits of Check Point Security Management

        • The platform keeps pace with dynamic network changes
        • Helps align security with business goals
        • Helps with threat prevention.
        • Reduces operational costs

        The unified console also means a single policy for users, data, applications, and networks. The granularity control helps accelerate administration processes. This feature, together with automation, is key to achieving reduced operational overhead. Security teams can automate tasks and even create self-service security web portals with the Check Point Security Management platform.

        Threat management is fully integrated, with reporting, logging, and monitoring all in one dashboard. This provides full visibility into the security of the network.

        Security Management Suite

        The Security Management Suite consists of the following modules:

        • Policy Management: Includes central management of different security policies across multiple domains and browser-based security management.
        • Operations Management: Includes compliance, provisioning, workflow automation, and user directory centralization.
        • Threat Management: Includes centralizing security event correlation for enforcement points. Centrally monitors Check Point devices.

        Reviews from Real Users

        A Network Security Engineer/Architect at a tech services company says, "The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other."

        "The management API is the best new feature for me. It allows us to further automate our customers' automated server ordering," says a System Engineer Network & Security at OTTO GmbH & Co KG.

        A Senior Infrastructure Services Specialist at St.George Bank Limited adds that "The solution is ideal for use and deployment in a large infrastructure environment."





        Dynatrace is an AI-powered software intelligence monitoring platform that accelerates digital transformation and simplifies cloud complexities. Dynatrace is an entirely automated full-stack solution that provides data and answers about the performance of your applications and deep insight into every transaction throughout every application, including the end-user experience. By modernizing and automating enterprise cloud operations, users can deliver an optimal digital experience with higher quality software to customers faster.

        Dynatrace offers an all-in-one automated artificial intelligence solution that brings together application performance, cloud and infrastructure, and digital experience monitoring. Dynatrace accelerates performance-driven results through operations, development, and business teams with a shared metrics platform. In addition, users are provided a full-stack monitoring experience with three patented technologies:

        • Smartscape - visualization mechanism that maps the totality of everything working in your environment and detects any casual dependencies between your applications, processes, websites, services, hosts, cloud infrastructure, and networks.

        • OneAgent - a technology that analyzes, gathers ,and unifies all business performance metrics throughout every layer of your technology stack.

        • PurePath Technology - code-level context and timings are captured from the mainframe to the cloud for all end-to-end transactions.

        What does Dynatrace offer?

        Dynatrace redefines how organizations monitor their digital ecosystems. The solution offers:

        • Cloud Automation: With AI engine Davis®, users can see the exact reason for problems and facilitate quick auto-remediation and intelligent cloud orchestration.

        • Application Security: With automated application vulnerability management, users can deliver applications faster and more securely.

        • Infrastructure Monitoring: Convenient broad visibility across your environments is provided with streamlined, automated infrastructure monitoring.

        • Digital Experience Monitoring (DEM): Optimize your applications, provide better support, and improve user experience with a combination of Real User Monitoring (RUM), Session Replay, and synthetic monitoring throughout your environment.

        • Applications and Microservices: For complex cloud environments, Dynatrace can automatically provide visibility and root-cause answers. It can also monitor microservices.

        • Digital Business Analytics: Get AI-powered, real-time answers to analytical business queries with KPIs and metrics that are already flowing through applications.

        Reviews from Real Users

        Dynatrace is the only solution that provides answers to organizations based on deep insight into each user, transaction, and organization's environment.

        Barry P., a managing performance engineer at Medica Health Plans, writes, "With Dynatrace, we have synthetic checks and real-user monitoring of all of our websites, places where members and providers can interact with us over the web. We monitor the response times of those with Dynatrace, and it's all integrated into one place."

        A consultant at a tech service company notes, "A feature that's one of the highlights of Dynatrace is the AI. The second most valuable feature is OneAgent. Between infrastructures, applications, operating systems, you can deploy with just a single agent and can practically install and forget about it."

        Sample Customers
        Hedgetec, Geiger
        Audi, Best Buy, LinkedIn, CISCO, Intuit, KRONOS, Scottrade, Wells Fargo, ULTA Beauty, Lenovo, Swarovsk, Nike, Whirlpool, American Express
        Top Industries
        REVIEWERS
        Manufacturing Company19%
        Security Firm16%
        Financial Services Firm14%
        Computer Software Company10%
        VISITORS READING REVIEWS
        Computer Software Company13%
        Security Firm13%
        Comms Service Provider9%
        Government8%
        REVIEWERS
        Financial Services Firm28%
        Insurance Company9%
        Computer Software Company9%
        Manufacturing Company8%
        VISITORS READING REVIEWS
        Educational Organization28%
        Financial Services Firm18%
        Computer Software Company8%
        Manufacturing Company6%
        Company Size
        REVIEWERS
        Small Business34%
        Midsize Enterprise28%
        Large Enterprise38%
        VISITORS READING REVIEWS
        Small Business37%
        Midsize Enterprise14%
        Large Enterprise49%
        REVIEWERS
        Small Business17%
        Midsize Enterprise13%
        Large Enterprise71%
        VISITORS READING REVIEWS
        Small Business11%
        Midsize Enterprise33%
        Large Enterprise56%
        Buyer's Guide
        Check Point Security Management vs. Dynatrace
        April 2024
        Find out what your peers are saying about Check Point Security Management vs. Dynatrace and other solutions. Updated: April 2024.
        768,857 professionals have used our research since 2012.

        Check Point Security Management is ranked 9th in Log Management with 55 reviews while Dynatrace is ranked 4th in Log Management with 340 reviews. Check Point Security Management is rated 8.8, while Dynatrace is rated 8.8. The top reviewer of Check Point Security Management writes "Great DDoS protection, high availability, and useful firewall rule implementation". On the other hand, the top reviewer of Dynatrace writes "AI identifies all the components of a response-time issue or failure, hugely benefiting our triage efforts". Check Point Security Management is most compared with Wazuh, Fortinet FortiAnalyzer, IBM Security QRadar, LogRhythm SIEM and Splunk Cloud Platform, whereas Dynatrace is most compared with Datadog, New Relic, AppDynamics, Splunk Enterprise Security and Azure Monitor. See our Check Point Security Management vs. Dynatrace report.

        See our list of best Log Management vendors.

        We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.