Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs NetWitness Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
9th
Average Rating
9.0
Reviews Sentiment
7.3
Number of Reviews
63
Ranking in other categories
Advanced Threat Protection (ATP) (15th), Threat Intelligence Platforms (5th)
NetWitness Platform
Ranking in Log Management
38th
Average Rating
7.4
Reviews Sentiment
7.4
Number of Reviews
37
Ranking in other categories
Security Information and Event Management (SIEM) (32nd)
 

Mindshare comparison

As of May 2025, in the Log Management category, the mindshare of Check Point Security Management is 0.4%, down from 0.6% compared to the previous year. The mindshare of NetWitness Platform is 0.3%, down from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
 

Featured Reviews

Ozan Durmus - PeerSpot reviewer
Good documentation and proxy support with a helpful community available for troubleshooting
It's useful that we can find unused objects. This helps us to get rid of unused objects in our database, Proxy support is valuable for us. We can apply centralized proxy settings to get additional databases when we need them. Revision history and detailed audit log is a good feature with this we can always feeling safe if somethings go wrong, I'm sure that I can go back the old one. Smart Event is a very good feature. It provides a graphical view of the traffics and provides history. The filter syntax is very good and helps control when we need it.
MdZaman - PeerSpot reviewer
Really scalable for enterprise customers
The solution should have more integration capabilities with different platforms. The API is nearly open and scalable, so the solution can integrate with many platforms. The solution has more than 200 log sources in the scalability to support, but this is its limit. Installation is pretty easy. However, there are a couple of modules involved, so it is not as easy as it could be. We are talking about a distributed module, not a single-module type. This is what makes things a bit complex, instead of easier. I rate it as a seven out of ten on its installation and configuration capabilities.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It's a great complete endpoint security solution that prevents the most imminent threats to the endpoint such as ransomware, phishing, or malware."
"It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering."
"The compliance is great."
"The firewall cleverly handles such attacks without compromising on performance."
"One of the most outstanding characteristics of its centralized administration is its great computing power."
"We can easily push the policies to any of our gateways."
"We love the ability to monitor performance in real-time, and gather critical information about network flows and traffic."
"As the security administrator, who is responsible for the day-to-day tasks (e.g. creating new firewall rules, monitoring the security alerts and incidents etc.) and the maintenance (e.g. installing the new Jumbo Hotfixes), I find the Check Point Security Management R80.10 to be the great solution."
"It's fully scalable. There is no limit. Of course, the license limits per day the number of terabytes. In my opinion, it's very flexible."
"The most valuable feature is the hunting ability to work in a CERT."
"The most valuable features are the threat prediction and network forensics."
"NetWitness Platform is valuable for creating rules that the solution must detect."
"Setting up NetWitness is straightforward. There are multiple connectors, including standard and specialized connectors. One purpose of the connectors is the enhanced capability integrate the custom applications. NetWitness comes with E6 appliances and application images that we use for the initial configurations and for the OS stack information. From there, you can consider the correlation rules, integrate the different log sources, and easily create correlation rules and backlog reports."
"The most valuable feature is the correlation. It can report in real-time and monitor the management."
"The most valuable feature is the security that it provides."
"It gives the ability to investigate into network traffic in the Net and the organization what we couldn't do before."
 

Cons

"SD-WAN functionality could be added."
"I would like this solution to be integrated directly into the Cluster XL equipment."
"It sometimes blocks safe sites when I am researching, affecting the overall output and wasting time."
"The tool is expensive."
"Installing a policy takes a very long time to complete."
"Check Point could possibly lighten up the software code so that it is not as resource-intensive and will run more smoothly on a variety of hardware and cloud or virtual machine platforms."
"The reporting should be improved in future releases. It needs to be very explicit. This is very important."
"It would be great if the SmartView Monitor could become integrated into the SmartView Console Platform."
"The documentation is not as structured as I would like, personally, and I think that it can be improved and made much more user-friendly."
"RSA NetWitness Logs and Packets can improve the threat level aspect, it is lacking compared to other solutions. Whenever any hacking activity or any other threat factor occurred they used to provide the coverages very fast when comparing RSA NetWitness Logs and Packets. I heard the other three solutions, from a discussion with my team members who had experience in other solutions, they used to say that. Whenever any issues happened across the globe RSA NetWitness Logs and Packets are a little bit slow improving those detection mechanisms."
"The system architecture is complex and sometimes it’s hard to troubleshoot potential problems."
"Technical support could be improved."
"It is not so easy to customize this product."
"The initial setup was complex because it takes a lot of time to complete the implementation."
"There is no support for this product in this country, so problems have to be resolved through global technical teams."
"The tool's integration capability isn't so great."
 

Pricing and Cost Advice

"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"The solution is expensive."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"This product can be used for 25 security gateways on a basic license."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"Do the homework because Check Point is rather expensive."
"Price-wise, it is an expensive solution."
"The solution is expensive and there is an annual license."
"We are on an annual license for the use of the solution."
"There is a licensing fee and the customer can choose whether he wishes this to be subscription-based or perpetual."
"RSA NetWitness Logs and Packets do not have a subscription model, it's a one-time purchase. There is only a perpetual license."
"Our license is for one year."
"We have yearly licensing costs. The license fee can be based on the volume of EPS. Some organizations may have, as a gentlemanly gesture, 10,000 EPS and get a 3,000 EPS license but actually use 5,000 EPS."
"It’s cheaper to run virtual machines in a VMware environment."
"This is a pricey solution; it's not cheap."
"The new pricing and licensing mechanisms are fair. I would advise always to get the full solution (i.e., not only Logs)."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
850,236 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Financial Services Firm
11%
Government
10%
Comms Service Provider
7%
Computer Software Company
18%
Financial Services Firm
18%
Government
6%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
One case I saw was with the logs, which gave me the transfer and the vibration. There's a lot of logs, and I'm unsure about their validity, however, they take up a lot of space. We had to provision...
What is your primary use case for Check Point Security Management?
This is the Wi-Fi documentation. I work with the service, and we are partners with Check Point. One of our clients, Parliament, required an upgrade from physical to virtual implementation. This was...
What do you like most about NetWitness Platform?
The product's initial setup phase was not at all difficult.
What is your experience regarding pricing and costs for NetWitness Platform?
The pricing is comparable to others, and I consider the cost to be intermediate. Specific cost details are unknown to me.
What needs improvement with NetWitness Platform?
There is currently no need for improvement in the SIEM ( /categories/security-information-and-event-management-siem ), though there could be potential enhancements by integrating with AI.
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
RSA Security Analytics
 

Overview

 

Sample Customers

Hedgetec, Geiger
Los Angeles World Airports, Reply
Find out what your peers are saying about Check Point Security Management vs. NetWitness Platform and other solutions. Updated: April 2025.
850,236 professionals have used our research since 2012.