Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Logstash comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
8th
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
70
Ranking in other categories
Advanced Threat Protection (ATP) (11th), Threat Intelligence Platforms (TIP) (6th)
Logstash
Ranking in Log Management
24th
Average Rating
9.0
Reviews Sentiment
5.6
Number of Reviews
5
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Log Management category, the mindshare of Check Point Security Management is 0.5%, down from 0.5% compared to the previous year. The mindshare of Logstash is 0.7%, up from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management Market Share Distribution
ProductMarket Share (%)
Check Point Security Management0.5%
Logstash0.7%
Other98.8%
Log Management
 

Featured Reviews

reviewer2751156 - PeerSpot reviewer
Years of using the solution significantly improve log management and troubleshooting efficiency
Check Point Security Management has positively impacted my organization because, after migrating from our previous firewall, a Cisco ASA, we were able to see what traffic was passing through the firewall and from that, build out least access privilege firewall rules. So only what's actually needed by the organization is being let through. The rest is being dropped. The measurable outcomes with Check Point Security Management show that the troubleshooting is definitely quicker. Now it just takes a few minutes to find out where the error is and resolve it. Before, it was at least an hour or two of troubleshooting to locate the issue.
PRANIL CHANDARKAR - PeerSpot reviewer
Open-source accessibility and ease of implementation empower adaptable log management
As both a customer and an integrator, I think the best features in Logstash are that people prefer it because it is open to all, as it is an open-source version. The functionality of Logstash is quite easy to implement. I can say that the plugin ecosystem of Logstash is great. I have used some plugins for shell script monitoring and for SQL monitoring, and these are all working well with Logstash. The real-time processing capabilities of Logstash are also pretty fine with the tool. When I use the community edition, I have to do many things manually. If I am using enterprise Elastic, then that is taken care of by the Elastic native machine learning.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is easy to use and comes with few vulnerabilities. You don't have to worry about release upgrades. Life cycle management is very easy."
"It offers numerous features and blades, including intrusion prevention (IPS) and malware detection. It excels in network security and VPN capabilities, including IPSec VPNs. IPS is particularly powerful due to its signature-based detection, which automatically checks for and identifies malicious software."
"The interface also makes it easy for us to configure the VPN from the GUI rather than the command line, which makes it easy even for less experienced engineers to work with."
"As the security administrator, who is responsible for the day-to-day tasks (e.g. creating new firewall rules, monitoring the security alerts and incidents etc.) and the maintenance (e.g. installing the new Jumbo Hotfixes), I find the Check Point Security Management R80.10 to be the great solution."
"Check Point Security Management has improved our organization because all corporate firewalls can be managed with a single interface."
"Mobile access has helped us cater to more than 4000 users so that they can work from home."
"I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation. These allow me to select to whom to do what, and when."
"Check Point Security Management Server offers a wide range of security features, including firewall, intrusion prevention, VPN, application control, and threat prevention capabilities."
"We have three or four Logstash servers for high availability."
"Logstash has numerous plugins for inputs and outputs, allowing it to work well in environments that do not contain other Elastic components."
"Everything aligns well with improving our organization."
"I can collect logs from various data sources, including hardware."
"The transformation means we ship the logs in the way that we want them to be presented in Kibana, which is the main function we use Logstash for."
 

Cons

"I would like for users to have more control over the platform in the next release. Right now, the system is very central and general requiring new rules to be created that better-suite our requirements."
"We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners."
"For those not familiar with the Command Line interface, there should be an option in the GUI for operating backups."
"We are not sure if there is a centralized security console available. It would be beneficial if all firewalls could be integrated under one management console."
"Check Point could improve by enhancing the networking in their solution in order to align it with the existing network architecture."
"The management API can be further developed so that all functions offered by the dashboard are also available via the API (for example, Network Topology)."
"I would like the ability to have an overview, cross-site: One portal that does all firewalls. Also, the user interface is overly complicated."
"The customer support rates at five out of 10."
"There can be a UI to implement with Logstash. Currently, I have to work with config files and everything."
"Elastic does not provide proper support for Logstash worldwide, and I rate their technical support as one out of ten."
"The product needs to improve its compatibility."
"Almost all the research can be very bad. We still have a problem with importing the log system."
"An enhancement we could implement is the ability to cluster Logstash to exist in more than one node."
"We still have a problem with importing the log system."
 

Pricing and Cost Advice

"This product can be used for 25 security gateways on a basic license."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"Price-wise, it is an expensive solution."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"Do the homework because Check Point is rather expensive."
"The solution is expensive and there is an annual license."
"The solution is expensive."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
Information not available
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
869,760 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Comms Service Provider
9%
Financial Services Firm
8%
Manufacturing Company
7%
Financial Services Firm
16%
Computer Software Company
12%
Government
9%
University
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business37
Midsize Enterprise28
Large Enterprise41
No data available
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
Performance with logs needs improvement as Check Point Security Management has large-scale environments that need dedicated log servers. If you store logs on the central management server or Check ...
What is your primary use case for Check Point Security Management?
We need central management for our policy, monitoring, and different day-to-day administrative tasks, so Check Point Security Management fits all the requirements for our needs. As we know, Check P...
What do you like most about Logstash?
I can collect logs from various data sources, including hardware.
What needs improvement with Logstash?
Customization can be automated with Logstash, but it is at the developer's disposal. The developer has to do it, not the tool as such. There is scope for optimization, but that is all outside the t...
What is your primary use case for Logstash?
The purposes for which I am using Logstash largely include log aggregation and application monitoring.
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
No data available
 

Overview

 

Sample Customers

Hedgetec, Geiger
Information Not Available
Find out what your peers are saying about Check Point Security Management vs. Logstash and other solutions. Updated: September 2025.
869,760 professionals have used our research since 2012.