Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Palo Alto Networks AutoFocus comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Threat Intelligence Platforms (TIP)
4th
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
89
Ranking in other categories
Log Management (11th), Advanced Threat Protection (ATP) (10th)
Palo Alto Networks AutoFocus
Ranking in Threat Intelligence Platforms (TIP)
17th
Average Rating
7.4
Reviews Sentiment
6.8
Number of Reviews
7
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Threat Intelligence Platforms (TIP) category, the mindshare of Check Point Security Management is 0.5%, up from 0.3% compared to the previous year. The mindshare of Palo Alto Networks AutoFocus is 1.2%, down from 1.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Threat Intelligence Platforms (TIP) Market Share Distribution
ProductMarket Share (%)
Check Point Security Management0.5%
Palo Alto Networks AutoFocus1.2%
Other98.3%
Threat Intelligence Platforms (TIP)
 

Featured Reviews

RL
TI at a security firm with 51-200 employees
Simplified threat detection and reduced policy deployment time
The standout features of Check Point Security Management are unified policy management, real-time visibility, and automation capabilities, making it a powerful tool for security management. Consistency across environments with Check Point Security Management helps me ensure that instead of maintaining separate rules for firewalls, cloud workloads, and data centers, we apply one unified policy that covers them all. This reduces misconfigurations and ensures compliance, proving to be a time-saver because rolling out a new rule or updating an existing one takes minutes, not hours, because it is propagated everywhere automatically. Automation is one of the most valuable aspects of Check Point Security Management, and it often does not get enough attention compared to headline features like unified policies or visibility. With policy automation, routine tasks such as rule creation, compliance checks, or policy updates can be automated, reducing human error and saving hours of manual work. Check Point Security Management has simplified administration in my organization because instead of juggling multiple consoles, everything is managed from a single pane of glass. This has reduced complexity and saved significant time for our IT team, improving our operational efficiency. For a policy update, I used to spend two or three hours across multiple consoles. Now, with unified management in Check Point Security Management, it takes thirty to forty minutes, resulting in about a seventy percent reduction in effort, greatly boosting productivity.
reviewer9216065 - PeerSpot reviewer
Sr. Cloud Security Architect at a tech services company with 11-50 employees
Seamless integration into existing ecosystem empowers effective threat detection
The most valuable feature of Palo Alto Networks AutoFocus is its seamless integration into the Palo Alto Networks ecosystem, allowing the threat intelligence feeds to be automatically consumed without manual effort. It uses the STIX format, which is automatically understood by the firewalls. AutoFocus also excels in behavioral analytics and reputation scoring, providing thorough threat analysis.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Check Point Security Management has positively impacted our organization by providing better administration control and a unified central pane of glass for daily configuration."
"The solution is easy to use and comes with few vulnerabilities. You don't have to worry about release upgrades. Life cycle management is very easy."
"Check Point Security Management has positively impacted our organization by streamlining different policy management in a single console, and incident response has also become faster because all alerts and logs feed into one security tool or management tool, giving us immediate visibility without needing to switch between tools."
"The product has done a great job in protecting our business network and SCADA systems."
"Check Point Security Management has positively impacted my organization because with more than one security gateway in our organization, we are easily able to manage and configure our security gateway with the help of security management."
"As the security administrator, who is responsible for the day-to-day tasks (e.g. creating new firewall rules, monitoring the security alerts and incidents etc.) and the maintenance (e.g. installing the new Jumbo Hotfixes), I find the Check Point Security Management R80.10 to be the great solution."
"The management API is the best new feature for me. It allows us to further automate our customers' automated server ordering."
"It offers numerous features and blades, including intrusion prevention (IPS) and malware detection. It excels in network security and VPN capabilities, including IPSec VPNs. IPS is particularly powerful due to its signature-based detection, which automatically checks for and identifies malicious software."
"I am impressed with the tool's integration of Palo Alto products which serves as a platform for security."
"Palo Alto Networks AutoFocus has had a positive impact on my company as we can reduce the cost for the SOC investment, and we can also get good feedback on how to strengthen our network from the expertise people available."
"The feature that I like best is the dashboard."
"I would rate Palo Alto Networks AutoFocus a ten out of ten."
"The logs play a crucial role as they contribute to blocking unwanted Internet traffic."
"The most valuable feature is alerting."
"It integrates well with other solutions and provides good threat intelligence in terms of external threats."
 

Cons

"For those not familiar with the Command Line interface, there should be an option in the GUI for operating backups."
"I would like this solution to be integrated directly into the Cluster XL equipment."
"There is room for improvement in reliability."
"Check Point's hybrid cloud integration needs significant improvements. These resources need to evolve as data transfers to the cloud increase, so hybrid cloud models are easier to implement. Better hybrid cloud integration would improve how we manage our security logs and provide our administrators with a low-cost solution that enables them to meet all our essential requirements."
"Check Point Security Management can be improved; the recent R82 version is AI-enabled with increased security but I have encountered issues during upgrades, requiring backups to prevent potential disasters."
"In the future, I would like to see more frequent updates because of the changing security landscape."
"The upgrade procedure already made huge improvements, yet it remains more challenging compared to other products."
"Some of the configuration elements could be improved."
"It is a completely cloud-based product at present."
"It would be helpful to have better documentation for configuring and installing the solution."
"It would be better if they used the threat intelligence feeds directly from their side and changing the verdict instead of us requesting it."
"I would like to have more technical documentation that contains greater detail on the types of threats that are occurring."
"I would like the tool to see more integration with Cortex XDR. There is no real reason to keep them separate."
 

Pricing and Cost Advice

"The solution is expensive and there is an annual license."
"Price-wise, it is an expensive solution."
"Do the homework because Check Point is rather expensive."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"The solution is expensive."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"This product can be used for 25 security gateways on a basic license."
"It is expensive."
"The solution is reasonably priced."
report
Use our free recommendation engine to learn which Threat Intelligence Platforms (TIP) solutions are best for your needs.
881,114 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Outsourcing Company
18%
Security Firm
11%
Computer Software Company
7%
Manufacturing Company
6%
Performing Arts
15%
Computer Software Company
8%
Outsourcing Company
8%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business55
Midsize Enterprise32
Large Enterprise43
By reviewers
Company SizeCount
Small Business4
Midsize Enterprise1
Large Enterprise4
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
Based on my experience with Check Point Security Management, I do not see anything lacking. It is currently managing all the gateways, and we are able to achieve what we want from our perspective. ...
What is your primary use case for Check Point Security Management?
I am using Check Point Security Management in our day-to-day operations to centrally manage all Check Point Security Gateways within my organization. All of these Check Point Security Gateways are ...
What needs improvement with Palo Alto Networks AutoFocus?
I feel that Palo Alto Networks AutoFocus can improve, especially since most of the OEMs are implementing MDR, Managed Service feature, which is still not available with Palo Alto. The MDR feature i...
What is your primary use case for Palo Alto Networks AutoFocus?
I use Palo Alto Networks AutoFocus for threat monitoring, and it is provided by the OEM itself. I use the threat data correlation feature, which correlates with Cortex. We can use it for data corre...
What advice do you have for others considering Palo Alto Networks AutoFocus?
As a partner with Palo Alto Networks, my email is Sarvajit at bsrgroup.in. My job title is Technical Manager. I confirm that we will publish these reviews on peerspot.com in written or audio format...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
Palo Alto Threat Intelligence Management
 

Overview

 

Sample Customers

Hedgetec, Geiger
Telkom Indonesia
Find out what your peers are saying about Check Point Security Management vs. Palo Alto Networks AutoFocus and other solutions. Updated: December 2025.
881,114 professionals have used our research since 2012.