Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Graylog comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Apr 20, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
10th
Average Rating
9.0
Reviews Sentiment
7.3
Number of Reviews
63
Ranking in other categories
Advanced Threat Protection (ATP) (15th), Threat Intelligence Platforms (5th)
Graylog
Ranking in Log Management
16th
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
20
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2025, in the Log Management category, the mindshare of Check Point Security Management is 0.4%, down from 0.6% compared to the previous year. The mindshare of Graylog is 6.7%, up from 5.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
 

Featured Reviews

Ozan Durmus - PeerSpot reviewer
Good documentation and proxy support with a helpful community available for troubleshooting
It's useful that we can find unused objects. This helps us to get rid of unused objects in our database, Proxy support is valuable for us. We can apply centralized proxy settings to get additional databases when we need them. Revision history and detailed audit log is a good feature with this we can always feeling safe if somethings go wrong, I'm sure that I can go back the old one. Smart Event is a very good feature. It provides a graphical view of the traffics and provides history. The filter syntax is very good and helps control when we need it.
Ivan Kokalovic - PeerSpot reviewer
Facilitates backend service monitoring with efficient log retrieval and API flexibility
Graylog is valuable because it bridges technical knowledge to non-technical teams, presenting complex backend processes in a simple timeline. It boosts the knowledge of sales and customer support teams by allowing them to see the backend operations without needing to read the code. Its API is flexible for visualization, and its powerful search engine efficiently handles large volumes of log data. Moreover, its stability, fast search capabilities, and compatibility with languages like ANSI SQL enhance its utility in IT infrastructure.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Check Point management is one of the most complete solutions for managing Check Point Firewall appliances."
"Check Point has been very effective in terms of threat management and comprehensive protection against vulnerabilities, and it has given us confidence that our data is not going anywhere."
"Security Management gives us complete visibility into our security operations, allowing administrators to identify and address problem areas, reduce unnecessary costs, and improve efficiency. It offers detailed reports on network usage and security, which helps my company to monitor and control its security expenses."
"It's already helped secure our organization effectively."
"The intuitive interface also allows new team members to adapt to the technology if they are not familiar with it initially. It doesn't take much for one to familiarize themselves with the product."
"Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it."
"With the generation and review of logs, we have verified some vulnerabilities and attempted attacks to generate improvements in our infrastructure and policies to help avoid issues in the future."
"It has a central management log server that helps us to easily identify faults and issues in the environment, especially during outages and incidents during the implementation of policy rules."
"Allowing us to set up alerts and integrate with platforms we already use, such as Slack and OpsGenie to alert users of these errors proactively, is also a very useful feature."
"We have scaled from a single machine installation (a VM with a Graylog + ES + MongoDB) to (2 Graylog + 2 ES + 3 MongoDB). This was done smoothly with a minimal impact on logging."
"Open source and user friendly."
"It is used as a log manager/SIEM. It provides visibility into the infrastructure and security related events."
"This had increased productivity for the dev and support teams, because we are directly notifying them."
"UDP is a fast and lightweight protocol, perfect for sending large volumes of logs with minimal overhead."
"The solution's most valuable feature is its new interface."
"I like the correlation and the alerting."
 

Cons

"We are not sure if there is a centralized security console available. It would be beneficial if all firewalls could be integrated under one management console."
"The web administration tool that allows administration in the browser must be developed even more."
"The application filtering and URL filtering could be better."
"I would like this solution to be integrated directly into the Cluster XL equipment."
"As per personal experience and based on many organizations, Check Point needs to improve PS services."
"I would like it to be the administrator of equipment or Next Generation firewalls (which have to be managed on this platform) and to be able to manage other services (like Harmony) that also belong to Check Point."
"Sometimes the security system slows down when it is overloaded."
"I've found the solution was a bit unstable."
"With technical support, you are on your own without an enterprise license."
"More customization is always useful."
"I hope to see improvements in Graylog for more interactivity, user-friendliness, and creating alerts. The initial setup is complex."
"Lacks sufficient documentation."
"It would be great if Graylog could provide a better Python package in order to make it easier to use for the Python community."
"Graylog could improve the process of creating rules. We have to create them manually by doing parses and applying them. Other SIEM solutions have basic rules and you can create and get more events of interest."
"The biggest problem is the collector application, as we wanted to avoid using Graylog Collector Sidecar due to its architecture."
"Over six months, I had two similar issues where searches were performed on field "messages". It exhausted all the memory of the ES node causing an ES crash and a Graylog halt."
 

Pricing and Cost Advice

"This product can be used for 25 security gateways on a basic license."
"The solution is expensive and there is an annual license."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"Do the homework because Check Point is rather expensive."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"Price-wise, it is an expensive solution."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"The solution is expensive."
"We are using the free version of the product. However, the paid version is expensive."
"Consider Enterprise support if you have atypical needs or setup requirements.​"
"I am using a community edition. I have not looked at the enterprise offering from Graylog."
"It's open source and free. They have a paid version, but we never looked into that because we never needed the features of the paid version."
"It's an open-source solution that can be used free of charge."
"There is an open source version and an enterprise version. I wouldn't recommend the enterprise version, but as an open source solution, it is solid and works really well."
"I use the free version of Graylog."
"​You get a lot out-of-the-box with the non-enterprise version, so give it a try first."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
849,686 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Financial Services Firm
11%
Government
10%
Manufacturing Company
6%
Computer Software Company
18%
Comms Service Provider
10%
Educational Organization
7%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
One case I saw was with the logs, which gave me the transfer and the vibration. There's a lot of logs, and I'm unsure about their validity, however, they take up a lot of space. We had to provision...
What is your primary use case for Check Point Security Management?
This is the Wi-Fi documentation. I work with the service, and we are partners with Check Point. One of our clients, Parliament, required an upgrade from physical to virtual implementation. This was...
What do you like most about Graylog?
The product is scalable. The solution is stable.
What is your experience regarding pricing and costs for Graylog?
We are using the free version of the product. However, the paid version is expensive.
What needs improvement with Graylog?
When it comes to configuring the processing pipeline, writing the rules can be very tedious, especially since the documentation isn't extensive on how the functions provided for these rules work. P...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
Graylog2
 

Overview

 

Sample Customers

Hedgetec, Geiger
Blue Cross Blue Shield, eBay, Cisco, LinkedIn, SAP, King.com, Twilio, Deutsche Presse-Agentur
Find out what your peers are saying about Check Point Security Management vs. Graylog and other solutions. Updated: April 2025.
849,686 professionals have used our research since 2012.