Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Microsoft Defender for Identity comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.4
Check Point Security Management offers time savings, incident reduction, and ROI increase, ensuring satisfaction and system protection.
Sentiment score
5.0
Microsoft Defender for Identity is cost-effective and efficient, offering incident prevention and resolution without complex hardware setups.
I have seen a return on investment with Check Point Security Management, as my security concerns regarding data production have been greatly diminished, and my time is also saved.
I have seen a strong ROI from using Check Point Security Management through unified policy management, reduced misconfigurations, and faster incident response.
 

Customer Service

Sentiment score
6.3
Check Point Security Management support receives mixed reviews, with experiences varying by region and service level, suggesting improvements needed.
Sentiment score
7.5
Opinions on Microsoft Defender for Identity support vary, highlighting responsiveness, but issues include delays, contact challenges, and false positives.
We have partner support that helps us mitigate vulnerabilities reported by our infrastructure team.
The challenge was with drivers due to the size, and we had not provisioned the partition to the right size.
Generally, the support is more effective than other providers like Oracle.
The quality of support is very good, but troubleshooting can take time due to complex setups and the need to provide many logs.
 

Scalability Issues

Sentiment score
7.8
Check Point Security Management is scalable and effective for centralizing firewalls but faces challenges in complex deployments and licensing.
Sentiment score
7.9
Microsoft Defender for Identity efficiently integrates and scales globally, supporting diverse organizational needs within Microsoft’s ecosystem effectively.
So far, it has been functioning smoothly without any issues in the past 1.5 years.
In a Microsoft-centric organization, especially with Azure infrastructure and Office 365, Microsoft Defender for Identity is scalable.
 

Stability Issues

Sentiment score
7.9
Check Point Security Management is stable with high availability, though some users report minor VPN and connectivity issues.
Sentiment score
7.2
Microsoft Defender for Identity is highly reliable, with minimal incidents, seamless operation, and consistent ratings between seven and nine.
In my environment, Check Point Security Management is stable, as I do not see any downtime.
Microsoft Defender for Identity is quite robust and built on Azure hyperscale infrastructure, with a 99% availability.
We do not see any issues with the stability of Microsoft Defender for Identity.
Having recently started using it, reliability is affirmed, but manual investigation is often performed to verify if alerts identified by auto-remediation are accurate.
 

Room For Improvement

Check Point Security Management needs improved third-party integration, intuitive interfaces, faster policy application, and enhanced reporting capabilities.
Microsoft Defender for Identity users seek improved cloud integration, user-friendly features, better support, and streamlined processes for enhanced threat management.
As an IT person, I occasionally need to check how much internet bandwidth has been used in the internal network over the past month, day, or week.
We had to provision the virtual machine twice.
If Microsoft could develop a feature that indicates when impossible travel is caused by VPN connections, it would prevent unnecessary password resets and session disruptions, especially for VIP users in organizations.
One improvement I would recommend is the integration of an admin application within Teams, allowing easy access to attack information on a mobile platform.
Reducing false positives is something we've been working on with Microsoft.
 

Setup Cost

Check Point Security Management is costly but valued for its features; discounts and trials offer added benefits for users.
Microsoft Defender for Identity is cost-effective with E5 licenses despite complex pricing and competitive against other security solutions.
Since we are using it extensively, we get significant discounts during procurement.
My experience with pricing, setup costs, and licensing for Check Point Security Management involves a bit of a challenge in pricing, as it is somewhat costlier than previous devices.
If they can reduce the costs, organizations will be happy, and it will compensate for using the Azure environment, which is more expensive on the infrastructure as a service side.
Ensuring a fair price according to market standards.
From an organization perspective, using E5 licenses is value for money, especially if Azure and Office 365 are already in use.
 

Valuable Features

Check Point Security Management offers centralized controls, seamless integration, and robust security features for effective network administration and full visibility.
Microsoft Defender for Identity integrates with Azure to offer comprehensive threat detection, identity protection, and advanced real-time security insights.
Check Point Security Management does not operate like that; it shows the mobile device, tablet, smartphone, laptop, and desktop separately so that I can easily find out how many desktops are connected, how many mobile devices are connected, and I can easily block mobile devices and free up the IPs.
Check Point Security Management has positively impacted my organization by providing centralized control, allowing us to manage all security policies and gateways from a single console, reducing complexity and saving time.
We can't work without Check Point because it provides the real visibility needed to manage the environment.
We receive an advance report of risky users, allowing us to take preemptive action before an attack causes damage to organization details.
The most valuable feature is its hybrid artificial intelligence, which gathers forensic data to track and counteract security threats, much like the CSI series in effect.
The advanced threat protection is one of the strengths of Microsoft Defender for Identity, as it utilizes user and entity analytics and can detect indicative attacks.
 

Categories and Ranking

Check Point Security Manage...
Ranking in Advanced Threat Protection (ATP)
13th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
65
Ranking in other categories
Log Management (9th), Threat Intelligence Platforms (7th)
Microsoft Defender for Iden...
Ranking in Advanced Threat Protection (ATP)
6th
Average Rating
8.8
Reviews Sentiment
7.0
Number of Reviews
25
Ranking in other categories
Microsoft Security Suite (3rd), Identity Threat Detection and Response (ITDR) (3rd)
 

Mindshare comparison

As of August 2025, in the Advanced Threat Protection (ATP) category, the mindshare of Check Point Security Management is 0.8%, up from 0.1% compared to the previous year. The mindshare of Microsoft Defender for Identity is 6.7%, down from 7.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP)
 

Featured Reviews

NareshKumar10 - PeerSpot reviewer
Enhanced Internal Security and Efficiency
Check Point Security Management can be improved by addressing a negative challenge I face: sometimes it does not show internet utilization in the GUI. When I ask support, they tell me to upgrade the firmware, which happens quite frequently. Since I deployed the device in my on-premises environment 1.5 years ago, I have experienced this issue three times. Check Point Security Management has not impacted my daily work or decision-making in any negative way. As an IT person, I occasionally need to check how much internet bandwidth has been used in the internal network over the past month, day, or week. During those times, when I open the data utilization column, it shows nothing available. Each time this happens, I need to upgrade to the latest version of the firmware, and this frequent updating affects my productivity negatively. If Check Point addresses this issue in the future, it will be beneficial for all customers using Check Point SMBs.
ROBERT-CHRISTIAN - PeerSpot reviewer
Integration within the ecosystem enhances collaboration and automates functionalities
The integration into the Microsoft Defender ecosystem is the most valuable feature of Microsoft Defender for Identity. It fits very nicely with all the other Defender tools, allowing for excellent collaboration among them. It also fits seamlessly into Microsoft Sentinel SIEM. Furthermore, Microsoft security solutions can save time as they allow the automation of numerous functionalities, and the reporting inside the Microsoft ecosystem is commendable.
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Comms Service Provider
8%
Financial Services Firm
7%
Manufacturing Company
6%
Computer Software Company
15%
Financial Services Firm
13%
Government
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
I see areas of improvement for Check Point Security Management such as GUI stability and performance, and simplified firmware upgrades. I and my colleagues occasionally report glitches or missing d...
What is your primary use case for Check Point Security Management?
My main use case for Check Point Security Management is to unify firewall and threat prevention policies across multiple international sites, so I use SmartConsole to streamline rule updates and mo...
What do you like most about Microsoft Defender for Identity?
Microsoft Defender for Identity provides excellent visibility into threats by leveraging real-time analytics and data intelligence.
What needs improvement with Microsoft Defender for Identity?
Microsoft can improve Microsoft Defender for Identity by ensuring that installation prerequisites are included in the setup process. Installing the solution presents challenges as numerous logs and...
What is your primary use case for Microsoft Defender for Identity?
My personal use case for Microsoft Defender for Identity is that it is amazing. It provides very good and deep analytics about whatever is happening in the on-premises Active Directory. The sensors...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
Azure Advanced Threat Protection, Azure ATP, MS Defender for Identity
 

Overview

 

Sample Customers

Hedgetec, Geiger
Microsoft Defender for Identity is trusted by companies such as St. Luke’s University Health Network, Ansell, and more.
Find out what your peers are saying about Check Point Security Management vs. Microsoft Defender for Identity and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.