Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs ReversingLabs comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Threat Intelligence Platforms (TIP)
4th
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
89
Ranking in other categories
Log Management (11th), Advanced Threat Protection (ATP) (10th)
ReversingLabs
Ranking in Threat Intelligence Platforms (TIP)
30th
Average Rating
9.2
Reviews Sentiment
7.0
Number of Reviews
4
Ranking in other categories
Application Security Tools (42nd), Anti-Malware Tools (46th), Container Security (48th), Software Composition Analysis (SCA) (25th), Software Supply Chain Security (19th)
 

Mindshare comparison

As of January 2026, in the Threat Intelligence Platforms (TIP) category, the mindshare of Check Point Security Management is 0.5%, up from 0.3% compared to the previous year. The mindshare of ReversingLabs is 1.7%, down from 1.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Threat Intelligence Platforms (TIP) Market Share Distribution
ProductMarket Share (%)
Check Point Security Management0.5%
ReversingLabs1.7%
Other97.8%
Threat Intelligence Platforms (TIP)
 

Featured Reviews

RL
TI at a security firm with 51-200 employees
Simplified threat detection and reduced policy deployment time
The standout features of Check Point Security Management are unified policy management, real-time visibility, and automation capabilities, making it a powerful tool for security management. Consistency across environments with Check Point Security Management helps me ensure that instead of maintaining separate rules for firewalls, cloud workloads, and data centers, we apply one unified policy that covers them all. This reduces misconfigurations and ensures compliance, proving to be a time-saver because rolling out a new rule or updating an existing one takes minutes, not hours, because it is propagated everywhere automatically. Automation is one of the most valuable aspects of Check Point Security Management, and it often does not get enough attention compared to headline features like unified policies or visibility. With policy automation, routine tasks such as rule creation, compliance checks, or policy updates can be automated, reducing human error and saving hours of manual work. Check Point Security Management has simplified administration in my organization because instead of juggling multiple consoles, everything is managed from a single pane of glass. This has reduced complexity and saved significant time for our IT team, improving our operational efficiency. For a policy update, I used to spend two or three hours across multiple consoles. Now, with unified management in Check Point Security Management, it takes thirty to forty minutes, resulting in about a seventy percent reduction in effort, greatly boosting productivity.
TC
Forensic Lead, Global Security Fusion Center at a insurance company with 10,001+ employees
Very good malware and goodware repository and enables us to look more deeply at indicators of compromise
The automated static analysis of malware is the most valuable feature. Its detection abilities are very good. It hits all of the different platforms out there, platforms that see the items in the wild. Also, the solution’s object and file analysis provide us with actionable insights. Its malware and goodware repository is very good. It's very robust. It gets all of the different repositories that are out there that do analysis and brings them under one roof where we can statically analyze for those indicators of compromise and look at them more deeply. If we need to go deeper into things, we can do that.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It's a great complete endpoint security solution that prevents the most imminent threats to the endpoint such as ransomware, phishing, or malware."
"The centralized logs and management are helpful."
"The intuitive interface also allows new team members to adapt to the technology if they are not familiar with it initially. It doesn't take much for one to familiarize themselves with the product."
"The log dashboard in the SmartConsole is very useful and convenient for monitoring and tracking."
"The product has done a great job in protecting our business network and SCADA systems."
"Check Point Security Management has improved our organization because all corporate firewalls can be managed with a single interface."
"This solution is easy to install and deploy. It is also user-friendly."
"The best feature Check Point Security Management offers is the GUI, which shows everything in different categories such as mobile phones, connected devices, laptops, and desktops, making it easy to understand what is connected to what."
"It offers reports on a great many more file types than the other analysis solutions we have. It can give us a more in-depth analysis and better reporting on a larger number of file types. It also gives us a more comprehensive score on a number of things as well, and that's why we're using it as a front-end filter. It gives us more information... It's valuable because of its depth of information, as well as the breadth it gives us. There aren't a lot of tools that cover all of the different file types."
"ReversingLabs has a large sample size."
"The automated static analysis of malware is the most valuable feature. Its detection abilities are very good. It hits all of the different platforms out there, platforms that see the items in the wild."
"As far as the malware repository is concerned, it's extensive. It's a good source for finding samples, where we are unable to find them on other channels or by leveraging other sources."
"As far as static analysis information is concerned, we use most of the information that is available in order to determine whether or not we might be dealing with a malware variant. This includes information that is related to Java rules. This is also related to malware families indicated or specific malicious software variants that are labeled by name."
 

Cons

"Check Point Security Management can be improved in terms of policies management and workflow efficiency. For example, the interface can be overwhelming for new users, and simplifying rule creation, offering guided workflows or templates will reduce onboarding time."
"You need some technical expertise to use the solution. I don't think it's accessible to the typical end-user. You need to access the box and use some command lines or the web interface. It would be nice to have a user-friendly dashboard and comprehensive reporting."
"The documentation of Check Point Security Management is not intuitive because it is for advanced technical support, and when I need to deploy different features, it is complicated for junior support or technical personnel."
"Check Point Security Management could be improved by enhancing its user interface, expanding third-party integrations, and refining reports and automation capabilities to make it more intuitive and scalable for diverse enterprise environments."
"Check Point is highly regarded for its effectiveness and the three-layer architecture for security, comprising the client, Security Management, and secure management console, integrated with firewall capabilities."
"Being a security appliance, there should be the ability for the Security Management server to send email alerts via authenticated email."
"In my experience, the place they can improve the most is in the technical support where I have had some serious problems that could not be solved in time due to a lack of knowledge of the assigned engineer."
"We are not sure if there is a centralized security console available."
"The product support could be better at times. Sometimes, the resources that they provide could be of higher quality."
"I would like to see if we could do a little bit more of bulk uploading of hash sets. Right now, I can only do them individually."
"The solution needs to improve integrations."
"While the company is very helpful, it would be very much appreciated to have extensive proof of concept scripts for the different APIs available, though not for all the APIs that we have purchased. Respective scripts are available, but those scripts which are available are typically not of very high quality."
"We would really like further integration with our threat intelligence platform, which is called ThreatConnect. We would also really like further integrations with an endpoint protection product we use called Tanium. The reason I mentioned both of these is that ReversingLabs claims to have extensive integrations with both of them, but they did not work for us."
 

Pricing and Cost Advice

"Price-wise, it is an expensive solution."
"This product can be used for 25 security gateways on a basic license."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"Do the homework because Check Point is rather expensive."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"The solution is expensive and there is an annual license."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"The solution is expensive."
"We have a yearly contract based on the number of queries and malicious programs which can be processed."
"Currently, the license number of lookups that we purchased has not been reached yet, because the integration has only recently been completed. However, our usage is expected and planned to increase over the next couple of months."
report
Use our free recommendation engine to learn which Threat Intelligence Platforms (TIP) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Outsourcing Company
18%
Security Firm
11%
Computer Software Company
7%
Manufacturing Company
6%
Financial Services Firm
14%
Computer Software Company
13%
Manufacturing Company
8%
Retailer
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business55
Midsize Enterprise32
Large Enterprise43
No data available
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
Based on my experience with Check Point Security Management, I do not see anything lacking. It is currently managing all the gateways, and we are able to achieve what we want from our perspective. ...
What is your primary use case for Check Point Security Management?
I am using Check Point Security Management in our day-to-day operations to centrally manage all Check Point Security Gateways within my organization. All of these Check Point Security Gateways are ...
Ask a question
Earn 20 points
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
ReversingLabs Titanium, ReversingLabs secure.software
 

Overview

 

Sample Customers

Hedgetec, Geiger
Financial services, healthcare, government, manufacturing, oil & gas, telecommunications, information technology
Find out what your peers are saying about Check Point Security Management vs. ReversingLabs and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.