No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point Security Management vs SentinelOne Singularity Hologram [EOL] comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 31, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
86
Ranking in other categories
Log Management (10th), Advanced Threat Protection (ATP) (10th), Threat Intelligence Platforms (TIP) (3rd)
SentinelOne Singularity Hol...
Average Rating
7.0
Reviews Sentiment
7.1
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Featured Reviews

RL
TI at a security firm with 51-200 employees
Simplified threat detection and reduced policy deployment time
The standout features of Check Point Security Management are unified policy management, real-time visibility, and automation capabilities, making it a powerful tool for security management. Consistency across environments with Check Point Security Management helps me ensure that instead of maintaining separate rules for firewalls, cloud workloads, and data centers, we apply one unified policy that covers them all. This reduces misconfigurations and ensures compliance, proving to be a time-saver because rolling out a new rule or updating an existing one takes minutes, not hours, because it is propagated everywhere automatically. Automation is one of the most valuable aspects of Check Point Security Management, and it often does not get enough attention compared to headline features like unified policies or visibility. With policy automation, routine tasks such as rule creation, compliance checks, or policy updates can be automated, reducing human error and saving hours of manual work. Check Point Security Management has simplified administration in my organization because instead of juggling multiple consoles, everything is managed from a single pane of glass. This has reduced complexity and saved significant time for our IT team, improving our operational efficiency. For a policy update, I used to spend two or three hours across multiple consoles. Now, with unified management in Check Point Security Management, it takes thirty to forty minutes, resulting in about a seventy percent reduction in effort, greatly boosting productivity.
Graham Peck - PeerSpot reviewer
Data Security Manager at Leeds United FC
Lockdown devices and ports on endpoints so that you can stop propagation of any virus if it's detected but performance utilization can be better
It's scalable in the form of it now covers mobile devices as well as a number of other different types of devices, not just Windows. Also, there's no limit as to how many devices you can install it on. We plan to expand the number of devices/users as we get more people onboard or upgrade to more mobile devices; we will then increase the number of licenses for mobile devices. We've got 450 licenses, but we've got about 375 devices and users currently. I would rate the scalability a ten out of ten. There's not a product yet that I've found that I can't put it on, especially now that they've got the new release, which was the mobile agents.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The best feature Check Point Security Management offers is the GUI, which shows everything in different categories such as mobile phones, connected devices, laptops, and desktops, making it easy to understand what is connected to what."
"The additional features offered by the solution are excellent. We didn't have a lot fo these on a previous solution, and they've proven to be an advantage for us."
"The SSL VPN monitoring based on users and tunnel monitoring are great value-added features present in the management console."
"Check Point Security Management has improved the way to manage several VPN communities depending on the needs, giving us the ability to centralize the management and administration of about 300 Check Point firewalls all over the world."
"Check Point Security Management GAIA R 80.40 tremendously helped us in securing our network perimeter against various threats."
"One of the most outstanding characteristics of its centralized administration is its great computing power."
"It has a central management log server that helps us to easily identify faults and issues in the environment, especially during outages and incidents during the implementation of policy rules."
"Check Point Security Management has positively impacted my organization because the department can publish different policies or search different events or try to know different threats in one security management center for different gateways."
"The automated response capability in SentinelOne enhances security operations. It means I don't have to worry about having too many security people watching it because you can automate a lot of the tasks."
 

Cons

"Also, the cost of the license is too high, it's too expensive."
"At least once a day, the application crashes with some random error message. Then you have to close it out and open it up again."
"You need some technical expertise to use the solution. I don't think it's accessible to the typical end-user."
"Some of the configuration elements could be improved."
"The upgrade procedure already made huge improvements, yet it remains more challenging compared to other products."
"While Check Point Security Management handles large environments well, performance and scalability could be improved because log queries and reporting generation can sometimes be slower under heavy loads."
"Check Point Security Management lacks some of the competitor features."
"The interface can be overwhelming for new users, and simplifying rule creation, offering guided workflows or templates will reduce onboarding time."
"The performance utilization on the device that it's monitoring. This aspect needs improvement."
 

Pricing and Cost Advice

"Price-wise, it is an expensive solution."
"This product can be used for 25 security gateways on a basic license."
"The solution is expensive and there is an annual license."
"Do the homework because Check Point is rather expensive."
"The solution is expensive."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"I would rate the pricing a three out of ten; one is very expensive, and ten is an absolutely cheap product."
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
895,990 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Outsourcing Company
15%
Financial Services Firm
14%
Security Firm
8%
Marketing Services Firm
7%
Manufacturing Company
14%
Comms Service Provider
12%
Construction Company
12%
Outsourcing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business55
Midsize Enterprise31
Large Enterprise43
No data available
 

Questions from the Community

What needs improvement with Check Point Security Management?
Based on my experience with Check Point Security Management, I do not see anything lacking. It is currently managing all the gateways, and we are able to achieve what we want from our perspective. ...
What is your primary use case for Check Point Security Management?
I am using Check Point Security Management in our day-to-day operations to centrally manage all Check Point Security Gateways within my organization. All of these Check Point Security Gateways are ...
What advice do you have for others considering Check Point Security Management?
I advise anyone having multiple security gateways that are managed stand-alone to deploy Check Point Security Management and manage all security gateways from a central console and central team. Th...
What is your experience regarding pricing and costs for SentinelOne Singularity Hologram?
It's obviously increased my cost when it comes to security management because I didn't have it before, and it isn't the cheapest one on the market. But at the same time, it has brought down my cybe...
What needs improvement with SentinelOne Singularity Hologram?
The performance utilization on the device that it's monitoring. This aspect needs improvement.
What advice do you have for others considering SentinelOne Singularity Hologram?
Overall, I would rate the solution a seven out of ten. I won't give it a ten. I've seen some others that I may next time decide to go with rather than SentinelOne.
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
Attivo Networks
 

Overview

 

Sample Customers

Hedgetec, Geiger
NSS Labs., Fierce IT security, FireEye
Find out what your peers are saying about Palo Alto Networks, Microsoft, Proofpoint and others in Advanced Threat Protection (ATP). Updated: May 2026.
895,990 professionals have used our research since 2012.