No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point Security Management vs Palo Alto Networks AutoFocus comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Threat Intelligence Platforms (TIP)
3rd
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
86
Ranking in other categories
Log Management (10th), Advanced Threat Protection (ATP) (10th)
Palo Alto Networks AutoFocus
Ranking in Threat Intelligence Platforms (TIP)
21st
Average Rating
7.4
Reviews Sentiment
6.8
Number of Reviews
7
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Threat Intelligence Platforms (TIP) category, the mindshare of Check Point Security Management is 0.8%, up from 0.3% compared to the previous year. The mindshare of Palo Alto Networks AutoFocus is 1.4%, up from 1.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Threat Intelligence Platforms (TIP) Mindshare Distribution
ProductMindshare (%)
Check Point Security Management0.8%
Palo Alto Networks AutoFocus1.4%
Other97.8%
Threat Intelligence Platforms (TIP)
 

Featured Reviews

RL
TI at a security firm with 51-200 employees
Simplified threat detection and reduced policy deployment time
The standout features of Check Point Security Management are unified policy management, real-time visibility, and automation capabilities, making it a powerful tool for security management. Consistency across environments with Check Point Security Management helps me ensure that instead of maintaining separate rules for firewalls, cloud workloads, and data centers, we apply one unified policy that covers them all. This reduces misconfigurations and ensures compliance, proving to be a time-saver because rolling out a new rule or updating an existing one takes minutes, not hours, because it is propagated everywhere automatically. Automation is one of the most valuable aspects of Check Point Security Management, and it often does not get enough attention compared to headline features like unified policies or visibility. With policy automation, routine tasks such as rule creation, compliance checks, or policy updates can be automated, reducing human error and saving hours of manual work. Check Point Security Management has simplified administration in my organization because instead of juggling multiple consoles, everything is managed from a single pane of glass. This has reduced complexity and saved significant time for our IT team, improving our operational efficiency. For a policy update, I used to spend two or three hours across multiple consoles. Now, with unified management in Check Point Security Management, it takes thirty to forty minutes, resulting in about a seventy percent reduction in effort, greatly boosting productivity.
Tejas Jain - PeerSpot reviewer
Sr. Cloud Security Architect at a tech services company with 11-50 employees
Seamless integration into existing ecosystem empowers effective threat detection
The most valuable feature of Palo Alto Networks AutoFocus is its seamless integration into the Palo Alto Networks ecosystem, allowing the threat intelligence feeds to be automatically consumed without manual effort. It uses the STIX format, which is automatically understood by the firewalls. AutoFocus also excels in behavioral analytics and reputation scoring, providing thorough threat analysis.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering."
"Key features include the ability to include logs for everything that you do for admin, and it has web filtering built in and VPN."
"Based on my experience with Check Point Security Management, it is an excellent solution for managing all security gateways from a central console where I can access all logs and security events triggering on different security gateways."
"The transparency of the rules and the integrated logs makes daily troubleshooting easy and saves a lot of time."
"The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration."
"The solution is easy to use and comes with few vulnerabilities. You don't have to worry about release upgrades. Life cycle management is very easy."
"The product has done a great job in protecting our business network and SCADA systems."
"Check Point Security Management has positively impacted my organization by providing centralized control, allowing us to manage all security policies and gateways from a single console, reducing complexity and saving time, and by enabling faster policy updates, which allowed quicker roll-out of rule changes across multiple sites, improving agility and reducing configuration errors."
"Palo Alto Networks AutoFocus has had a positive impact on my company as we can reduce the cost for the SOC investment, and we can also get good feedback on how to strengthen our network from the expertise people available."
"The logs play a crucial role as they contribute to blocking unwanted Internet traffic."
"It's a very good solution, it identifies critical attacks and alerts you."
"The most valuable feature is alerting."
"It integrates well with other solutions and provides good threat intelligence in terms of external threats."
"It integrates well with other solutions and provides good threat intelligence in terms of external threats."
"It is very easy to install and set up AutoFocus."
"I am impressed with the tool's integration of Palo Alto products which serves as a platform for security."
 

Cons

"Troubleshooting is quite complicated within multi-domain management."
"Even though the platform is simple, and creating security policies is a fairly quick task, creating a bulk of policies at once (ie. for a migration) could be a useful tool. This is probably possible through scripting, however, having an easy-to-use "import CSV" button would be beneficial."
"It also offers compatibility with third-party security solutions, however, it is not a lot. This needs to be improved."
"I guess it lacks in providing visibility of the many incidents."
"For the first deployment, Check Point Security Management is not so easy and can be difficult for the first implementation."
"The application filtering and URL filtering could be better."
"Support is the main area that they need to improve. Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region. I would like a feature where there is a workflow to provide authorization to some users before they're able to create and apply rules. Such a feature should be integrated with the management. It should not be in the box that comes with it."
"I like that the Compliance software blade is available for free with the Security Management server purchase, but it is free for only one year - after that, you have to buy an additional license to continue using it."
"I would like to have more technical documentation that contains greater detail on the types of threats that are occurring."
"I would like the tool to see more integration with Cortex XDR. There is no real reason to keep them separate."
"It is a completely cloud-based product at present."
"It would be helpful to have better documentation for configuring and installing the solution."
"It would be better if they used the threat intelligence feeds directly from their side and changing the verdict instead of us requesting it."
"It must be on-premises as well; it must have a server on-premises. It is a completely cloud-based product at present."
"It would be better if they used the threat intelligence feeds directly from their side and changing the verdict instead of us requesting it."
"I would like to have more technical documentation that contains greater detail on the types of threats that are occurring."
 

Pricing and Cost Advice

"Price-wise, it is an expensive solution."
"Do the homework because Check Point is rather expensive."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"The solution is expensive and there is an annual license."
"The solution is expensive."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"This product can be used for 25 security gateways on a basic license."
"It is expensive."
"The solution is reasonably priced."
report
Use our free recommendation engine to learn which Threat Intelligence Platforms (TIP) solutions are best for your needs.
894,738 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Outsourcing Company
15%
Financial Services Firm
14%
Security Firm
8%
Marketing Services Firm
7%
Performing Arts
15%
Manufacturing Company
8%
Outsourcing Company
8%
Energy/Utilities Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business55
Midsize Enterprise31
Large Enterprise43
By reviewers
Company SizeCount
Small Business5
Large Enterprise4
 

Questions from the Community

What needs improvement with Check Point Security Management?
Based on my experience with Check Point Security Management, I do not see anything lacking. It is currently managing all the gateways, and we are able to achieve what we want from our perspective. ...
What is your primary use case for Check Point Security Management?
I am using Check Point Security Management in our day-to-day operations to centrally manage all Check Point Security Gateways within my organization. All of these Check Point Security Gateways are ...
What advice do you have for others considering Check Point Security Management?
I advise anyone having multiple security gateways that are managed stand-alone to deploy Check Point Security Management and manage all security gateways from a central console and central team. Th...
What needs improvement with Palo Alto Networks AutoFocus?
I feel that Palo Alto Networks AutoFocus can improve, especially since most of the OEMs are implementing MDR, Managed Service feature, which is still not available with Palo Alto. The MDR feature i...
What is your primary use case for Palo Alto Networks AutoFocus?
I use Palo Alto Networks AutoFocus for threat monitoring, and it is provided by the OEM itself. I use the threat data correlation feature, which correlates with Cortex. We can use it for data corre...
What advice do you have for others considering Palo Alto Networks AutoFocus?
As a partner with Palo Alto Networks, my email is Sarvajit at bsrgroup.in. My job title is Technical Manager. I confirm that we will publish these reviews on peerspot.com in written or audio format...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
Palo Alto Threat Intelligence Management
 

Overview

 

Sample Customers

Hedgetec, Geiger
Telkom Indonesia
Find out what your peers are saying about Check Point Security Management vs. Palo Alto Networks AutoFocus and other solutions. Updated: April 2026.
894,738 professionals have used our research since 2012.