We changed our name from IT Central Station: Here's why

Check Point Security Management vs Graylog comparison

Cancel
You must select at least 2 products to compare!
Devo Logo
Read 13 Devo reviews.
12,001 views|4,605 comparisons
Graylog Logo
13,405 views|10,799 comparisons
Featured Review
Find out what your peers are saying about Check Point Security Management vs. Graylog and other solutions. Updated: January 2022.
564,643 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The most valuable feature is definitely the ability that Devo has to ingest data. From the previous SIEM that I came from and helped my company administer, it really was the type of system where data was parsed on ingest. This meant that if you didn't build the parser efficiently or correctly, sometimes that would bring the system to its knees. You'd have a backlog of processing the logs as it was ingesting them.""The user experience [is] well thought out and the workflows are logical. The dashboards are intuitive and highly customizable.""The thing that Devo does better than other solutions is to give me the ability to write queries that look at multiple data sources and run fast. Most SIEMs don't do that. And I can do that by creating entity-based queries. Let's say I have a table which has Okta, a table which has G Suite, a table which has endpoint telemetry, and I have a table which has DNS telemetry. I can write a query that says, 'Join all these things together on IP, and where the IP matches in all these tables, return to me that subset of data, within these time windows.' I can break it down that way.""The user interface is really modern. As an end-user, there are a lot of possibilities to tailor the platform to your needs, and that can be done without needing much support from Devo. It's really flexible and modular. The UI is very clean.""In traditional BI solutions, you need to wait a lot of time to have the ability to create visualizations with the data and to do searches. With this kind of platform, you have that information in real-time.""Those 400 days of hot data mean that people can look for trends and at what happened in the past. And they can not only do so from a security point of view, but even for operational use cases. In the past, our operational norm was to keep live data for only 30 days. Our users were constantly asking us for at least 90 days, and we really couldn't even do that. That's one reason that having 400 days of live data is pretty huge. As our users start to use it and adopt this system, we expect people to be able to do those long-term analytics.""Devo helps us to unlock the full power of our data because they have more than 450 parsers, which means that we can ingest pretty much any type of log data.""One of the biggest features of the UI is that you see the actual code of what you're doing in the graphical user interface, in a little window on the side. Whatever you're doing, you see the code, what's happening. And you can really quickly switch between using the GUI and using the code. That's really useful."

More Devo Pros →

"Check Point Security Management has improved our organization because all corporate firewalls can be managed with a single interface.""Mobile access has helped us cater to more than 4000 users so that they can work from home.""We love the ability to monitor performance in real-time, and gather critical information about network flows and traffic.""As the security administrator, who is responsible for the day-to-day tasks (e.g. creating new firewall rules, monitoring the security alerts and incidents etc.) and the maintenance (e.g. installing the new Jumbo Hotfixes), I find the Check Point Security Management R80.10 to be the great solution.""The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other.""The intuitive interface also allows new team members to adapt to the technology if they are not familiar with it initially. It doesn't take much for one to familiarize themselves with the product.""It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution. Check Point is effective when it comes to security control and threat prevention.""I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation. These allow me to select to whom to do what, and when."

More Check Point Security Management Pros →

"Graylog's search functionality, alerting functionality, user management, and dashboards are useful.""I like the correlation and the alerting.""Open source and user friendly."

More Graylog Pros →

Cons
"We only use the core functionality and one of the reasons for this is that their security operation center needs improvement.""One major area for improvement for Devo... is to provide more capabilities around pre-built monitoring. They're working on integrations with different types of systems, but that integration needs to go beyond just onboarding to the platform. It needs to include applications, out-of-the-box, that immediately help people to start monitoring their systems. Such applications would include dashboards and alerts, and then people could customize them for their own needs so that they aren't starting from a blank slate.""An admin who is trying to audit user activity usually cannot go beyond a day in the UI. I would like to have access to pages and pages of that data, going back as far as the storage we have, so I could look at every command or search or deletion or anything that a user has run. As an admin, that would really help. Going back just a day in the UI is not going to help, and that means I have to find a different way to do that.""There's room for improvement within the GUI. There is also some room for improvement within the native parsers they support. But I can say that about pretty much any solution in this space.""Devo has a lot of cloud connectors, but they need to do a little bit of work there. They've got good integrations with the public cloud, but there are a lot of cloud SaaS systems that they still need to work with on integrations, such as Salesforce and other SaaS providers where we need to get access logs.""There's always room to reduce the learning curve over how to deal with events and machine data. They could make the machine data simpler.""The Activeboards feature is not as mature regarding the look and feel. Its functionality is mature, but the look and feel is not there. For example, if you have some data sets and are trying to get some graphics, you cannot change anything. There's just one format for the graphics. You cannot change the size of the font, the font itself, etc.""From our experience, the Devo agent needs some work. They built it on top of OS Query's open-source framework. It seems like it wasn't tuned properly to handle a large volume of Windows event logs. In our experience, there would definitely be some room for improvement. A lot of SIEMs on the market have their own agent infrastructure. I think Devo's working towards that, but I think that it needs some improvement as far as keeping up with high-volume environments."

More Devo Cons →

"Support is the main area that they need to improve. Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region. I would like a feature where there is a workflow to provide authorization to some users before they're able to create and apply rules. Such a feature should be integrated with the management. It should not be in the box that comes with it.""I would like to bind users to their network, as well as their local office machine.""Troubleshooting is quite complicated within multi-domain management. If an issue arises, the local administrator has to keep in mind that there are other domains that could be also affected.""The reporting should be improved in future releases. It needs to be very explicit. This is very important.""Even though the platform is simple, and creating security policies is a fairly quick task, creating a bulk of policies at once (ie. for a migration) could be a useful tool. This is probably possible through scripting, however, having an easy-to-use "import CSV" button would be beneficial.""If the SmartView monitor can be integrated in the R80.40 and R81 versions, that would be ideal in understanding the trends and graphs of how traffic is observed hitting the different Check Point Firewall Gateways that the Security Management controls.""For those not familiar with the Command Line interface, there should be an option in the GUI for operating backups.""It would be helpful if we could enable URL and application traffic control remote access."

More Check Point Security Management Cons →

"Lacks sufficient documentation.""Graylog can improve the index rotation as it's quite a complex solution.""I would like to see some kind of visualization included in Graylog."

More Graylog Cons →

Pricing and Cost Advice
  • "We have an OEM agreement with Devo. It is very similar to the standard licensing agreement because we are charged in the same way as any other customer, e.g., we use the backroom."
  • "I'm not involved in the financial aspect, but I think the licensing costs are similar to other solutions. If all the solutions have a similar cost, Devo provides more for the money."
  • "Devo is definitely cheaper than Splunk. There's no doubt about that. The value from Devo is good. It's definitely more valuable to me than QRadar or LogRhythm or any of the old, traditional SIEMs."
  • "[Devo was] in the ballpark with at least a couple of the other front-runners that we were looking at. Devo is a good value and, given the quality of the product, I would expect to pay more."
  • "Be cautious of metadata inclusion for log types in pricing, as there are some "gotchas" with that."
  • "Devo was very cost-competitive... Devo did come with that 400 days of hot data, and that was not the case with other products."
  • "Our licensing fees are billed annually and per terabyte."
  • "I like the pricing very much. They keep it simple. It is a single price based on data ingested, and they do it on an average. If you get a spike of data that flows in, they will not stick it to you or charge you for that. They are very fair about that."
  • More Devo Pricing and Cost Advice →

  • "This product can be used for 25 security gateways on a basic license."
  • More Check Point Security Management Pricing and Cost Advice →

  • "It's an open-source solution that can be used free of charge."
  • More Graylog Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Log Management solutions are best for your needs.
    564,643 professionals have used our research since 2012.
    Questions from the Community
    Top Answer: 
    It's very, very versatile.
    Top Answer: 
    Devo, like other vendors, doesn't charge extra for playbooks and automation. That way, you are only paying for the side… more »
    Top Answer: 
    I need more empowerment in reporting. For example, when I'm using Qlik or Power BI in terms of reporting for the… more »
    Top Answer: 
    It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution… more »
    Top Answer: 
    Support is the main area that they need to improve. Our support experience is not very smooth. We are based in Africa… more »
    Top Answer: 
    We use it for both perimeter and internal defense.
    Top Answer: 
    I like the correlation and the alerting.
    Top Answer: 
    It's an open-source solution that can be used free of charge.
    Top Answer: 
    I would like to see some kind of visualization included in Graylog. The report is plain, they could be improved.
    Comparisons
    Also Known As
    R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
    Graylog2
    Learn More
    Overview

    Devo is the only cloud-native logging and security analytics platform that releases the full potential of all your data to empower bold, confident action when it matters most. Only the Devo platform delivers the powerful combination of real-time visibility, high-performance analytics, scalability, multitenancy, and low TCO crucial for monitoring and securing business operations as enterprises accelerate their shift to the cloud.

    R80.30 Cyber Security Management features centralized management control across all networks and cloud environments, increasing operational efficiency and lowering the complexity of managing your security. Learn more about Security Management.

    Graylog is purpose-built to deliver the best log collection, storage, enrichment, and analysis. Graylog is:

    • Considerably faster analysis speeds.
    • More robust and easier-to-use analysis platform.
    • Simpler administration and infrastructure management.
    • Lower cost than alternatives.
    • Full-scale customer service.
    • No expensive training or tool experts required.
    Offer
    See Devo in Action

    See how Devo allows you to free yourself from data management, and make machine data and insights accessible.

    Learn more about Check Point Security Management
    Learn more about Graylog
    Sample Customers
    United States Air Force, Rubrik, SentinelOne, Critical Start, NHL, Panda Security, Telefonica, CaixaBank, OpenText, IGT, OneMain Financial, SurveyMonkey, FanDuel, H&R Block, Ulta Beauty, Manulife, Moneylion, Chime Bank, Magna International, American Express Global Business Travel
    Hedgetec, Geiger
    Blue Cross Blue Shield, eBay, Cisco, LinkedIn, SAP, King.com, Twilio, Deutsche Presse-Agentur
    Top Industries
    REVIEWERS
    Computer Software Company57%
    Comms Service Provider14%
    Retailer14%
    Insurance Company14%
    VISITORS READING REVIEWS
    Computer Software Company27%
    Comms Service Provider20%
    Government7%
    Financial Services Firm7%
    REVIEWERS
    Manufacturing Company38%
    Financial Services Firm19%
    Security Firm12%
    Comms Service Provider8%
    VISITORS READING REVIEWS
    Computer Software Company31%
    Comms Service Provider31%
    Financial Services Firm6%
    Manufacturing Company3%
    VISITORS READING REVIEWS
    Comms Service Provider30%
    Computer Software Company21%
    Government8%
    Financial Services Firm5%
    Company Size
    REVIEWERS
    Small Business14%
    Midsize Enterprise14%
    Large Enterprise71%
    VISITORS READING REVIEWS
    Small Business49%
    Midsize Enterprise15%
    Large Enterprise36%
    REVIEWERS
    Small Business12%
    Midsize Enterprise42%
    Large Enterprise45%
    REVIEWERS
    Small Business43%
    Large Enterprise57%
    Find out what your peers are saying about Check Point Security Management vs. Graylog and other solutions. Updated: January 2022.
    564,643 professionals have used our research since 2012.

    Check Point Security Management is ranked 5th in Log Management with 18 reviews while Graylog is ranked 14th in Log Management with 3 reviews. Check Point Security Management is rated 9.0, while Graylog is rated 8.6. The top reviewer of Check Point Security Management writes "Helps our security team create policies in a centralized way". On the other hand, the top reviewer of Graylog writes "Stable, scalable, easy to install and maintain". Check Point Security Management is most compared with Fortinet FortiAnalyzer, ELK Logstash, Wazuh, IBM QRadar and ArcSight Logger, whereas Graylog is most compared with Splunk, ELK Logstash, Wazuh, Fortinet FortiAnalyzer and syslog-ng. See our Check Point Security Management vs. Graylog report.

    See our list of best Log Management vendors.

    We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.