Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Elastic Observability comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
6.4
Check Point Security Management boosts efficiency and security by significantly reducing incidents, enhancing returns, and streamlining operations.
Sentiment score
6.3
Elastic Observability enhances efficiency, reduces incidents, and provides cost-effective visibility, with benefits in data management and availability.
I have seen a strong ROI from using Check Point Security Management through unified policy management, reduced misconfigurations, and faster incident response.
The time to resolve issues is very much better now with Check Point Security Management.
I have seen a hundred percent return on investment with Check Point Security Management.
 

Customer Service

Sentiment score
6.2
Check Point Security Management support is responsive with expertise, but experiences vary by region and engineer experience, needing speed improvements.
Sentiment score
7.5
Elastic Observability users praise responsive, knowledgeable support, valuing quick problem-solving, though rely on documentation for added assistance.
We have partner support that helps us mitigate vulnerabilities reported by our infrastructure team.
The challenge was with drivers due to the size, and we had not provisioned the partition to the right size.
The customer support for Check Point Security Management is great.
Elastic support really struggles in complex situations to resolve issues.
 

Scalability Issues

Sentiment score
7.2
Check Point Security Management is praised for scalable efficiency, centralized console management, and adaptability across extensive networks.
Sentiment score
7.1
Elastic Observability offers scalable performance and ease of use, with user satisfaction varying based on specific implementations and preferences.
It can be a multi-domain Security Management server and can manage large or segmented environments with multiple domains or customers.
When you upgrade multiple times, you leave many files that are useless. They are dated, so it's always better to create a new machine every few versions, for example, three or four major versions.
Check Point Security Management's scalability is exceptional as it handles growth in users or devices very well.
Elastic Observability seems to have a good scale-out capability.
Elastic Observability is easy in deployment in general for small scale, but when you deploy it at a really large scale, the complexity comes with the customizations.
What is not scalable for us is not on Elastic's side.
 

Stability Issues

Sentiment score
7.9
Check Point Security Management is stable, though occasional application crashes and connectivity issues occur, particularly under heavy loads.
Sentiment score
8.1
Elastic Observability is stable, efficiently handles analytics, and is well-regarded by users, though monitoring storage is recommended.
Check Point Security Management is really stable, and I have not experienced any downtime or issues with reliability except for when we do upgrades.
The SmartConsole used to administrate the security management is somewhat unstable.
There are some bugs that come with each release, but they are keen always to build major versions and minor versions on time, including the CVE vulnerabilities to fix it.
It is very stable, and I would rate it ten out of ten based on my interaction with it.
Elastic Observability is really stable.
 

Room For Improvement

Check Point Security Management requires usability, performance, compliance improvements, enhanced interoperability, and better customer support for effective use.
Elastic Observability needs improved automation, ease of use, dashboard customization, advanced metrics, compatibility, and streamlined deployment processes.
When the logs are too heavy for the security management server, the CPU spike will be high, causing our management day-to-day activity to lag or become difficult.
I believe they can improve the management by allowing better API functionality because the API now is a little complicated, making it difficult to do automation.
Additionally, it crashes pretty regularly, so they could resolve the stability issues as well.
For instance, if you have many error logs and want to create a rule with a custom query, such as triggering an alert for five errors in the last hour, all you need to do is open the AI bot, type this question, and it generates an Elastic query for you to use in your alert rules.
It lacked some capabilities when handling on-prem devices, like network observability, package flow analysis, and device performance data on the infrastructure side.
Some areas such as AI Ops still require data scientists to understand machine learning and AI, and it doesn't have a quick win with no-brainer use cases.
 

Setup Cost

Despite high costs, Check Point offers advanced features and strong security, making it valuable for enterprises with complex needs.
Elastic Observability offers cost-effective, flexible pricing for enterprises, though high-tier licensing may be expensive for smaller users.
Since we are using it extensively, we get significant discounts during procurement.
Licensing is quite expensive.
We pay on a three-year base.
The license is reasonably priced, however, the VMs where we host the solution are extremely expensive, making the overall cost in the public cloud high.
Elastic Observability is cost-efficient and provides all features in the enterprise license without asset-based licensing.
Observability is actually cheaper compared to logs because you're not indexing huge blobs of text and trying to parse those.
 

Valuable Features

Check Point Security Management offers centralized control, efficient policy and log management, enhanced security, and seamless integration with systems.
Elastic Observability enhances incident response with powerful search, centralized logging, machine learning, and scalable integration for seamless monitoring and alerting.
Check Point Security Management has positively impacted my organization by providing centralized control, allowing us to manage all security policies and gateways from a single console, reducing complexity and saving time.
Check Point Security Management has helped my team save time, improve security, and reduce manual work significantly.
We can't work without Check Point because it provides the real visibility needed to manage the environment.
The most valuable feature is the integrated platform that allows customers to start from observability and expand into other areas like security, EDR solutions, etc.
the most valued feature of Elastic is its log analytics capabilities.
All the features that we use, such as monitoring, dashboarding, reporting, the possibility of alerting, and the way we index the data, are important.
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
8th
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
70
Ranking in other categories
Advanced Threat Protection (ATP) (11th), Threat Intelligence Platforms (TIP) (6th)
Elastic Observability
Ranking in Log Management
14th
Average Rating
8.0
Reviews Sentiment
6.7
Number of Reviews
28
Ranking in other categories
Application Performance Monitoring (APM) and Observability (7th), IT Infrastructure Monitoring (10th), Container Monitoring (4th), Cloud Monitoring Software (6th)
 

Mindshare comparison

As of October 2025, in the Log Management category, the mindshare of Check Point Security Management is 0.5%, down from 0.5% compared to the previous year. The mindshare of Elastic Observability is 1.3%, down from 1.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management Market Share Distribution
ProductMarket Share (%)
Check Point Security Management0.5%
Elastic Observability1.3%
Other98.2%
Log Management
 

Featured Reviews

reviewer2751156 - PeerSpot reviewer
Years of using the solution significantly improve log management and troubleshooting efficiency
Check Point Security Management has positively impacted my organization because, after migrating from our previous firewall, a Cisco ASA, we were able to see what traffic was passing through the firewall and from that, build out least access privilege firewall rules. So only what's actually needed by the organization is being let through. The rest is being dropped. The measurable outcomes with Check Point Security Management show that the troubleshooting is definitely quicker. Now it just takes a few minutes to find out where the error is and resolve it. Before, it was at least an hour or two of troubleshooting to locate the issue.
Adelina Craciun - PeerSpot reviewer
Customization enables tailored monitoring and alerting across departments
The possibility to customize it has been quite useful. Whatever the other departments want to dream up, we implement. Whatever they want to monitor, the granularity of it, the changes in the threshold, and the anomalies that they want reported all require some development. So far, every single request has been fulfilled.
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
869,760 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Comms Service Provider
9%
Financial Services Firm
8%
Manufacturing Company
7%
Financial Services Firm
17%
Computer Software Company
14%
Manufacturing Company
8%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business37
Midsize Enterprise28
Large Enterprise41
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise4
Large Enterprise16
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
Performance with logs needs improvement as Check Point Security Management has large-scale environments that need dedicated log servers. If you store logs on the central management server or Check ...
What is your primary use case for Check Point Security Management?
We need central management for our policy, monitoring, and different day-to-day administrative tasks, so Check Point Security Management fits all the requirements for our needs. As we know, Check P...
What do you like most about Elastic Observability?
Elastic Observability significantly improves incident response time by providing quick access to logs and data across various sources. For instance, searching for specific keywords in logs spanning...
What is your experience regarding pricing and costs for Elastic Observability?
The problem is their licensing model, which is a bit confusing. Many customers struggle to understand their total cost of ownership because Elastic licensing is not dependent on easy, quantifiable ...
What needs improvement with Elastic Observability?
Out-of-the-box use cases have room for improvement in Elastic Observability. They don't invest a lot in building out-of-the-box observable use cases, and they are more focusing on giving a very fle...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
No data available
 

Overview

 

Sample Customers

Hedgetec, Geiger
PSCU, Entel, VITAS, Mimecast, Barrett Steel, Butterfield Bank
Find out what your peers are saying about Check Point Security Management vs. Elastic Observability and other solutions. Updated: September 2025.
869,760 professionals have used our research since 2012.