Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Google Cloud's operations suite (formerly Stackdriver) comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
9th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
65
Ranking in other categories
Advanced Threat Protection (ATP) (13th), Threat Intelligence Platforms (7th)
Google Cloud's operations s...
Ranking in Log Management
30th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
10
Ranking in other categories
Application Performance Monitoring (APM) and Observability (29th), Cloud Monitoring Software (20th)
 

Mindshare comparison

As of August 2025, in the Log Management category, the mindshare of Check Point Security Management is 0.4%, down from 0.5% compared to the previous year. The mindshare of Google Cloud's operations suite (formerly Stackdriver) is 0.6%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
 

Featured Reviews

NareshKumar10 - PeerSpot reviewer
Enhanced Internal Security and Efficiency
Check Point Security Management can be improved by addressing a negative challenge I face: sometimes it does not show internet utilization in the GUI. When I ask support, they tell me to upgrade the firmware, which happens quite frequently. Since I deployed the device in my on-premises environment 1.5 years ago, I have experienced this issue three times. Check Point Security Management has not impacted my daily work or decision-making in any negative way. As an IT person, I occasionally need to check how much internet bandwidth has been used in the internal network over the past month, day, or week. During those times, when I open the data utilization column, it shows nothing available. Each time this happens, I need to upgrade to the latest version of the firmware, and this frequent updating affects my productivity negatively. If Check Point addresses this issue in the future, it will be beneficial for all customers using Check Point SMBs.
Anand_Patel - PeerSpot reviewer
Offers reliable Ops Agent and logging transport feature with easy third-party integrations
As part of our company, we implemented several changes in our log analytics pattern, including the storage and procurement process. Earlier, before implementing the solution, our company was able to procure only one year of data, but later, we came to the three-year mark. Around 15-20% reduction has been witnessed in the total analytic consumption of our company. The aforementioned result was possible because the solution allowed the creation of a dashboard where factors like storage costs, proportion of logs, and logs presence in a storage bucket or BigQuery can all be checked. Earlier all logs were stored in a raw storage, but currently our company is able to move logs in table bucket that contributes towards cost savings.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It's already helped secure our organization effectively."
"It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering."
"It's a great complete endpoint security solution that prevents the most imminent threats to the endpoint such as ransomware, phishing, or malware."
"The rulebase management and the shared layers concept is implemented well."
"It's a great solution for management. We can manage a lot at the same time with one security management system. Also, each gateway depends on the other, which is helpful."
"Key features include the ability to include logs for everything that you do for admin. Also, it has web filtering built in and VPN."
"The additional features offered by the solution are excellent. We didn't have a lot fo these on a previous solution, and they've proven to be an advantage for us."
"The firewall's blades are the solution's most valuable feature."
"We find the solution to be stable."
"I like the monitoring feature."
"Provides visibility into the performance uptime."
"The features that I have found most valuable are its graphs - if I need any statistics, in Kubernetes or Kong level or VPN level, I can quickly get the reports."
"It's easy to use."
"The most valuable feature is the multi-cloud integration, where there is support for both GCP and AWS."
"Offers a valuable logging transport feature"
"The cloud login enables us to get our logs from the different platforms that we currently use."
 

Cons

"Check Point's hybrid cloud integration needs significant improvements. These resources need to evolve as data transfers to the cloud increase, so hybrid cloud models are easier to implement. Better hybrid cloud integration would improve how we manage our security logs and provide our administrators with a low-cost solution that enables them to meet all our essential requirements."
"For those not familiar with the Command Line interface, there should be an option in the GUI for operating backups."
"In future releases I'd like to see better integration with other applications and solutions. Also, the cost of the license is too high, it's too expensive."
"I've found the solution was a bit unstable."
"I and my colleagues occasionally report glitches or missing data views with the GUI stability and performance issues, and sometimes SmartConsole crashes."
"While the console and administration work well, they have to work on performance since it consumes a lot of CPU and memory."
"I would like it to be the administrator of equipment or Next Generation firewalls (which have to be managed on this platform) and to be able to manage other services (like Harmony) that also belong to Check Point."
"The usability of the solution could be improved."
"The process of logging analytics can be improved"
"The product provides minimal metrics that are insufficient."
"It could be more stable."
"While we are satisfied with the overall performance, in certain cases we must add additional metrics and additional tools like Grafana and Dynatrace."
"The logging functionality could be better."
"It could be even more automated."
"Lacking sufficient operations documentation."
"It is difficult to estimate in advance how much something is going to cost."
 

Pricing and Cost Advice

"This product can be used for 25 security gateways on a basic license."
"The solution is expensive."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"Do the homework because Check Point is rather expensive."
"The solution is expensive and there is an annual license."
"Price-wise, it is an expensive solution."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"The cost of using Stackdriver depends on usage."
"We have a basic standard license without any additional costs."
"The cost could be lower."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Comms Service Provider
8%
Financial Services Firm
7%
Manufacturing Company
6%
Financial Services Firm
17%
Computer Software Company
14%
Retailer
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
I see areas of improvement for Check Point Security Management such as GUI stability and performance, and simplified firmware upgrades. I and my colleagues occasionally report glitches or missing d...
What is your primary use case for Check Point Security Management?
My main use case for Check Point Security Management is to unify firewall and threat prevention policies across multiple international sites, so I use SmartConsole to streamline rule updates and mo...
What needs improvement with Google Stackdriver?
If the errors are caught early in the interface, it would be easier for users to manage. The process of logging analytics can be improved.
What is your primary use case for Google Stackdriver?
I use the solution for logging, defining alerts, and monitoring. Our company's Java and Python logging teams mainly use it.
What advice do you have for others considering Google Stackdriver?
The Ops Agent and logging transport feature of the solution have had a major impact on improving application performance. The solution also allows the transport of logs into log buckets, which is h...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
Google Stackdriver, Stackdriver Monitoring, Stackdriver Logging, Google Cloud Monitoring
 

Overview

 

Sample Customers

Hedgetec, Geiger
Uber, Batterii, Q42, Dovetail Games
Find out what your peers are saying about Check Point Security Management vs. Google Cloud's operations suite (formerly Stackdriver) and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.