Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Logsign Next-Gen SIEM comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
9th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
65
Ranking in other categories
Advanced Threat Protection (ATP) (13th), Threat Intelligence Platforms (7th)
Logsign Next-Gen SIEM
Ranking in Log Management
40th
Average Rating
7.6
Reviews Sentiment
7.1
Number of Reviews
4
Ranking in other categories
Security Information and Event Management (SIEM) (46th)
 

Mindshare comparison

As of August 2025, in the Log Management category, the mindshare of Check Point Security Management is 0.4%, down from 0.5% compared to the previous year. The mindshare of Logsign Next-Gen SIEM is 0.4%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
 

Featured Reviews

NareshKumar10 - PeerSpot reviewer
Enhanced Internal Security and Efficiency
Check Point Security Management can be improved by addressing a negative challenge I face: sometimes it does not show internet utilization in the GUI. When I ask support, they tell me to upgrade the firmware, which happens quite frequently. Since I deployed the device in my on-premises environment 1.5 years ago, I have experienced this issue three times. Check Point Security Management has not impacted my daily work or decision-making in any negative way. As an IT person, I occasionally need to check how much internet bandwidth has been used in the internal network over the past month, day, or week. During those times, when I open the data utilization column, it shows nothing available. Each time this happens, I need to upgrade to the latest version of the firmware, and this frequent updating affects my productivity negatively. If Check Point addresses this issue in the future, it will be beneficial for all customers using Check Point SMBs.
Ayaz Ahmed - PeerSpot reviewer
Works well for threat detection and security
Improvements needed in Logsign SIEM are providing specific security alerts that can be filtered and configured more effectively. There should be a focus on delivering alerts tailored to specific needs rather than overwhelming users with numerous alerts. Additionally, incorporating more mature data about threats is necessary for better threat detection.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"One of the most outstanding characteristics of its centralized administration is its great computing power."
"The log dashboard in the SmartConsole is very useful and convenient for monitoring and tracking."
"Check Point Security Management excels over Forti Management in daily operations, policy management, and graphical interface. It is easy to open and edit policies, search within them, and view logs."
"The intuitive interface also allows new team members to adapt to the technology if they are not familiar with it initially. It doesn't take much for one to familiarize themselves with the product."
"Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it."
"The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other."
"Check Point's management portal and firmware are very stable and don't require frequent maintenance. Their IPSec tunneling is very stable, especially with Azure and AWS networks."
"Check Point Security Management has positively impacted my organization by providing centralized control, allowing us to manage all security policies and gateways from a single console, reducing complexity and saving time, and by enabling faster policy updates, which allowed quicker roll-out of rule changes across multiple sites, improving agility and reducing configuration errors."
"The most valuable features of Logsign SIEM are its cloud capabilities, alerting functionality, integration with Elastic Search, and configuration options."
"Logsign provides sample logs within the product, allowing users to see how logs will appear before integration, which is a valuable feature for testing and understanding log formats."
"It has full automation and automated SIEM responses."
 

Cons

"Check Point could improve by enhancing the networking in their solution in order to align it with the existing network architecture."
"Installing a policy takes a very long time to complete."
"I would like for users to have more control over the platform in the next release. Right now, the system is very central and general requiring new rules to be created that better-suite our requirements."
"Some costs are ridiculously high."
"Policy installation time can be reduced."
"Check Point could possibly lighten up the software code so that it is not as resource-intensive and will run more smoothly on a variety of hardware and cloud or virtual machine platforms."
"We are not sure if there is a centralized security console available."
"It could improve by showing DNS-specific information for connections to unknown public IPs."
"AI and machine learning need to be developed. If they develop those features, I think everything will be fine."
"Improvements needed in Logsign SIEM are providing specific security alerts that can be filtered and configured more effectively."
"I hope they address the pricing model for Logsign Next-Gen SIEM, especially regarding regional variations. The pricing should not differ based on the country of operation as it can lead to dissatisfaction among customers. A fixed pricing structure would be more favorable for us. I would also suggest enhancing the GUI interface and adding features similar to xFi Exchange from IBM Pure. This would streamline operations and save time for analysts."
 

Pricing and Cost Advice

"Price-wise, it is an expensive solution."
"The solution is expensive and there is an annual license."
"This product can be used for 25 security gateways on a basic license."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"Do the homework because Check Point is rather expensive."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"The solution is expensive."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"Compared to other SIEMs, it has low pricing."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
865,295 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Comms Service Provider
8%
Financial Services Firm
7%
Manufacturing Company
6%
Computer Software Company
11%
Comms Service Provider
11%
Government
8%
University
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
I see areas of improvement for Check Point Security Management such as GUI stability and performance, and simplified firmware upgrades. I and my colleagues occasionally report glitches or missing d...
What is your primary use case for Check Point Security Management?
My main use case for Check Point Security Management is to unify firewall and threat prevention policies across multiple international sites, so I use SmartConsole to streamline rule updates and mo...
What needs improvement with Logsign Next-Gen SIEM?
It does not have much AI and machine learning features yet. They are developing them and will be releasing them in a few months.
What is your primary use case for Logsign Next-Gen SIEM?
We use Logsign SIEM for various tasks in our daily operations. One key use case is for forensic analysis. We also use it to monitor critical servers and generate security alerts for actions like lo...
What advice do you have for others considering Logsign Next-Gen SIEM?
Overall, I would rate it an eight out of ten. AI and machine learning need to be developed. If they develop those features, I think everything will be fine. I can recommend it. Not for large enterp...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
No data available
 

Overview

 

Sample Customers

Hedgetec, Geiger
Turkish Petroleum, Tırsan, DP World, SAC American Colleges, Robert College, Unlu&Co, UniCo Insurance Company, ETSTur, CK Energy, UEDAS Energy, Wilo, Eurocross Assistance, Deloitte Turkey, Incı GS Yuasa, Pappara, Bilgi University, Anadolu University, İstanbul University, The Ministry of Energy and Natural Resources, TRT, Anadolu Media Agency, Ministry of Family, Labour and Social Services, Ispark, Spor AS and wide range of enterprises in different industries. 
Find out what your peers are saying about Check Point Security Management vs. Logsign Next-Gen SIEM and other solutions. Updated: July 2025.
865,295 professionals have used our research since 2012.