Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Graylog vs Splunk Enterprise Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

As of August 2025, in the Log Management category, the mindshare of Check Point Security Management is 0.4%, down from 0.5% compared to the previous year. The mindshare of Graylog is 6.4%, up from 6.0% compared to the previous year. The mindshare of Splunk Enterprise Security is 7.4%, down from 9.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
 

Featured Reviews

NareshKumar10 - PeerSpot reviewer
Enhanced Internal Security and Efficiency
Check Point Security Management can be improved by addressing a negative challenge I face: sometimes it does not show internet utilization in the GUI. When I ask support, they tell me to upgrade the firmware, which happens quite frequently. Since I deployed the device in my on-premises environment 1.5 years ago, I have experienced this issue three times. Check Point Security Management has not impacted my daily work or decision-making in any negative way. As an IT person, I occasionally need to check how much internet bandwidth has been used in the internal network over the past month, day, or week. During those times, when I open the data utilization column, it shows nothing available. Each time this happens, I need to upgrade to the latest version of the firmware, and this frequent updating affects my productivity negatively. If Check Point addresses this issue in the future, it will be beneficial for all customers using Check Point SMBs.
Ivan Kokalovic - PeerSpot reviewer
Facilitates backend service monitoring with efficient log retrieval and API flexibility
Graylog is valuable because it bridges technical knowledge to non-technical teams, presenting complex backend processes in a simple timeline. It boosts the knowledge of sales and customer support teams by allowing them to see the backend operations without needing to read the code. Its API is flexible for visualization, and its powerful search engine efficiently handles large volumes of log data. Moreover, its stability, fast search capabilities, and compatibility with languages like ANSI SQL enhance its utility in IT infrastructure.
ROBERT-CHRISTIAN - PeerSpot reviewer
Has many predefined correlation rules and is brilliant for investigation and log analysis
It is very complicated to write your own correlation rules without the help of Splunk support. What Splunk could do better is to create an API to the standard SIEM tools, such as Microsoft Sentinel. The idea would be to make it less painful. In ELK Stack, Kibana is the query language with which you can search log files. I believe Splunk has also a query language in which they search their log files, but once you have identified the log file that you want to use for further security correlation, you want to very quickly transport that into your SIEM tool, such as Microsoft Sentinel. That is something that Splunk could make a little bit less painful because it is a lot of effort to find that log file and forward it. An API with Microsoft Sentinel or a similar SIEM tool would be a good idea.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The company uses software called Harmony. Check Point integrates nicely, whether on an endpoint or mobile device. It integrates well with the firewall and can give me reports that I can check without going to an online portal."
"URL filtering is a very important feature."
"Check Point's management portal and firmware are very stable and don't require frequent maintenance. Their IPSec tunneling is very stable, especially with Azure and AWS networks."
"Each department can easily share data with the management without fear of data compromise."
"The firewall cleverly handles such attacks without compromising on performance."
"It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution. Check Point is effective when it comes to security control and threat prevention."
"The fact that everything starts from the same unified management console makes it very easy to integrate new equipment or functionalities once the operator has become familiar with it, as everything will follow similar management or operation mechanisms."
"The centralized logs and management are helpful."
"Message forwarding through the in-built module."
"The product is scalable. The solution is stable."
"UDP is a fast and lightweight protocol, perfect for sending large volumes of logs with minimal overhead."
"What I like about Graylog is that it's real-time and you have access to the raw data. So, you ingest it, and you have access to every message and every data item you ingest. You can then build analytics on top of that. You can look at the raw data, and you can do some volumetric estimations, such as how big traffic you have, how many messages of data of a type you have, etc."
"This had increased productivity for the dev and support teams, because we are directly notifying them."
"The solution's most valuable feature is its new interface."
"Allowing us to set up alerts and integrate with platforms we already use, such as Slack and OpsGenie to alert users of these errors proactively, is also a very useful feature."
"I am very proud of how very stable the solution is."
"The solution's most valuable features are the granularity and analysis of the logs."
"The log aggregation is great."
"It has the ability to correlate data, analyze and review it."
"The graph visualization is the most valuable feature."
"The connections to the database are very good and updating the data files is simple to do. The dashboards are useful and user-friendly."
"It is user-friendly. It is more effective than other solutions. The support and help for troubleshooting and the documentation from Splunk make it very effective."
"Splunk works based on parsing log files."
"The most valuable features for us include its robust log management capabilities, which allow us to efficiently handle and retain logs for extended periods as needed."
 

Cons

"In the future, I would like to see more frequent updates because of the changing security landscape."
"Even though the platform is simple, and creating security policies is a fairly quick task, creating a bulk of policies at once (ie. for a migration) could be a useful tool. This is probably possible through scripting, however, having an easy-to-use "import CSV" button would be beneficial."
"I would like this solution to be integrated directly into the Cluster XL equipment."
"The management API can be further developed so that all functions offered by the dashboard are also available via the API (for example, Network Topology)."
"There's a lot of logs, and I'm unsure about their validity, however, they take up a lot of space. We had to provision the virtual machine twice."
"Check Point could possibly lighten up the software code so that it is not as resource-intensive and will run more smoothly on a variety of hardware and cloud or virtual machine platforms."
"The application filtering and URL filtering could be better."
"Check Point Tech Support will not assist with new configurations if we encounter any issues during the configuration process."
"Graylog could improve the process of creating rules. We have to create them manually by doing parses and applying them. Other SIEM solutions have basic rules and you can create and get more events of interest."
"When it comes to configuring the processing pipeline, writing the rules can be very tedious, especially since the documentation isn't extensive on how the functions provided for these rules work."
"The biggest problem is the collector application, as we wanted to avoid using Graylog Collector Sidecar due to its architecture."
"Graylog needs to improve their authentication. Also, the fact that Graylog displays logs from the top down is just ridiculous."
"Elasticsearch recommendations for tuning could be better. Graylog doesn't have direct support for running the system inside of Kubernetes, so it can be challenging to fill in the gaps and set up containers in a way that is both performant and stable."
"It would be great if Graylog could provide a better Python package in order to make it easier to use for the Python community."
"I would like to see a date and time in the Graylog Grok patterns so that I can save time when searching for a log. I like how the streams and the search query work, but adding a date and time will allow me to pull out a log in a milli-second."
"Lacks sufficient documentation."
"They can improve their support teams. They can also improve their capability of ingesting data from different IoT sources."
"Its deployment is difficult. I remember when I first started learning, I faced several challenges, especially when deploying VMware in a virtual environment."
"It needs a better way to export dynamic views without requiring a ton of code and user/pw."
"The Enterprise Security app could be improved. We have had trouble with it working from the first day."
"Some of the terminology can be confusing, even for seasoned vets. Renaming components at this point would be a serious undertaking. However, it might be beneficial in the long run."
"Splunk could add more ways to manage archiving and storage. There isn't a web interface. You can do this on the SaaS version, but the on-premise platform doesn't have this option. It has other things but no option for remote NAS. I would like to have a personal web interface where I can specify how long logs should be stored. To have this readily available on the web, you need to adjust some settings on the backend. That is tricky."
"The documentation and training resources available for knowledge and training can be expanded. We need to learn more about Splunk Enterprise Security and new security attacks."
"I would like to have fraud detection features. Fraud is within the same turf as with security operations. Fraud and cybersecurity work hand in hand. I would like to have detection capabilities, or at least dashboards in Enterprise Security for fraud."
 

Pricing and Cost Advice

"The solution is expensive and there is an annual license."
"The solution is expensive."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"This product can be used for 25 security gateways on a basic license."
"Price-wise, it is an expensive solution."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"Do the homework because Check Point is rather expensive."
"Graylog is a free open-source solution. The free version has a capacity limitation of 2 GB daily, if you want to go above this you have to purchase a license."
"We're using the Community edition."
"If you want something that works and do not have the money for Splunk or QRadar, take Graylog.​​"
"We are using the free version of the product. However, the paid version is expensive."
"Having paid official support is wise for projects."
"There is an open source version and an enterprise version. I wouldn't recommend the enterprise version, but as an open source solution, it is solid and works really well."
"​You get a lot out-of-the-box with the non-enterprise version, so give it a try first."
"I am using a community edition. I have not looked at the enterprise offering from Graylog."
"I would highly recommend anyone evaluating this option to download the free trial which allows for the ingestion of 500MB of data per day in order to get a feel for what Splunk does at its core. It will get pricey once your ingestion rates start to sky rocket, but I would consider it expensive given the amount of information that it allows you to analyze and react on straight out-of-the-box."
"The pricing model is based on the number of gigabytes that you ingest into the Splunk system. So it can be an expensive solution."
"Some of the insights that we have obtained as a part of using Splunk have greatly helped us in increasing our revenue in terms of selling our products."
"We have seen ROI and improvements as we have continued to use the product, but they are more reactive."
"Splunk Enterprise Security is a worthwhile investment given the comprehensive range of features it offers."
"It is a bit costly."
"In terms of pricing, I believe Splunk is unreasonably costly for the majority of mid and small-sized companies."
"It is possible to use a developer's license, which is up to 10GB per day of volume traffic, which is usually enough for most use cases."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
865,140 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Comms Service Provider
8%
Financial Services Firm
7%
Manufacturing Company
6%
Computer Software Company
16%
Comms Service Provider
11%
Government
8%
University
7%
Computer Software Company
14%
Financial Services Firm
14%
Manufacturing Company
8%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the ...
What needs improvement with Check Point Security Management?
I see areas of improvement for Check Point Security Management such as GUI stability and performance, and simplified ...
What is your primary use case for Check Point Security Management?
My main use case for Check Point Security Management is to unify firewall and threat prevention policies across multi...
What do you like most about Graylog?
The product is scalable. The solution is stable.
What is your experience regarding pricing and costs for Graylog?
I am not familiar with the pricing details of Graylog, as I was not responsible for that aspect. It was determined th...
What needs improvement with Graylog?
An improvement I would suggest is in Graylog's user interface, such as allowing for font size adjustments. A potentia...
What SOC product do you recommend?
For tools I’d recommend: -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is a...
What is a better choice, Splunk or Azure Sentinel?
It would really depend on (1) which logs you need to ingest and (2) what are your use cases Splunk is easy for ingest...
How does Splunk compare with Azure Monitor?
Splunk handles a high amount of data very well. We use Splunk to capture information and as an aggregator for monitor...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
Graylog2
No data available
 

Overview

 

Sample Customers

Hedgetec, Geiger
Blue Cross Blue Shield, eBay, Cisco, LinkedIn, SAP, King.com, Twilio, Deutsche Presse-Agentur
Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Find out what your peers are saying about Wazuh, Splunk, Datadog and others in Log Management. Updated: July 2025.
865,140 professionals have used our research since 2012.