Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs The NodeZero Platform by Horizon3.ai comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Advanced Threat Protection (ATP)
10th
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
89
Ranking in other categories
Log Management (11th), Threat Intelligence Platforms (TIP) (4th)
The NodeZero Platform by Ho...
Ranking in Advanced Threat Protection (ATP)
13th
Average Rating
9.0
Reviews Sentiment
5.7
Number of Reviews
11
Ranking in other categories
Vulnerability Management (9th), Penetration Testing Services (1st), Breach and Attack Simulation (BAS) (2nd), Risk-Based Vulnerability Management (5th)
 

Mindshare comparison

As of January 2026, in the Advanced Threat Protection (ATP) category, the mindshare of Check Point Security Management is 0.5%, up from 0.3% compared to the previous year. The mindshare of The NodeZero Platform by Horizon3.ai is 0.5%, up from 0.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP) Market Share Distribution
ProductMarket Share (%)
Check Point Security Management0.5%
The NodeZero Platform by Horizon3.ai0.5%
Other99.0%
Advanced Threat Protection (ATP)
 

Featured Reviews

RL
TI at a security firm with 51-200 employees
Simplified threat detection and reduced policy deployment time
The standout features of Check Point Security Management are unified policy management, real-time visibility, and automation capabilities, making it a powerful tool for security management. Consistency across environments with Check Point Security Management helps me ensure that instead of maintaining separate rules for firewalls, cloud workloads, and data centers, we apply one unified policy that covers them all. This reduces misconfigurations and ensures compliance, proving to be a time-saver because rolling out a new rule or updating an existing one takes minutes, not hours, because it is propagated everywhere automatically. Automation is one of the most valuable aspects of Check Point Security Management, and it often does not get enough attention compared to headline features like unified policies or visibility. With policy automation, routine tasks such as rule creation, compliance checks, or policy updates can be automated, reducing human error and saving hours of manual work. Check Point Security Management has simplified administration in my organization because instead of juggling multiple consoles, everything is managed from a single pane of glass. This has reduced complexity and saved significant time for our IT team, improving our operational efficiency. For a policy update, I used to spend two or three hours across multiple consoles. Now, with unified management in Check Point Security Management, it takes thirty to forty minutes, resulting in about a seventy percent reduction in effort, greatly boosting productivity.
SH
Chief Information Officer at a construction company with 1,001-5,000 employees
Has unified our IT teams by providing clear visibility into network vulnerabilities and accelerated remediation with real-world attack testing
One of the things that we've shared with Horizon is just the reporting. They've made a lot of changes over time, but when examining computers, most average normal people don't look at a computer and identify it as 114.82.117.180. They identify it as 'the printer for accounting.' When many of the reports give the very detailed technical IP address or serial number, that's really not helpful for anyone other than the person, the hands-on person that's trying to remediate it. All the managers, all the leaders, having information in that format isn't helpful. Being able to have information about what those devices are would be very helpful. There's a technical reason they can't just have an easy button because some people have really complicated networks. When examining things for the average company, the average executive, that 114 number, there's only one of those. But if examining an AT&T or a Walmart, it isn't unique. They haven't solved that problem. But for the 90% of companies, being able to have just a human readable name for all devices on your network in all of the reports all of the time would be the most beneficial.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Check Point Security Management has positively impacted my organization, with one benefit being that I create one security management for controlling any gateways."
"Check Point Security Management has positively impacted my organization, with one benefit being that I create one security management for controlling any gateways."
"It's a reliable solution for security."
"The most valuable feature for me is Identity Awareness."
"The compliance is great."
"The control is granular, so you can set policy profiles for different organizational profiles."
"Check Point management is one of the most complete solutions for managing Check Point Firewall appliances."
"Check Point Security Management has positively impacted my organization because our IT person is not always busy with troubleshooting or manageability after deploying this solution, as they can manage multiple security gateways from a single console."
"Penetration testing and scans are useful features."
"My favorite feature about The NodeZero Platform is that it's autonomous, and it truly delivers on that promise—it can be set and forgotten while it performs its tasks, and it does exactly what it claims to do."
"Honestly, it's one of the most transformational technologies we've implemented in our company."
"After the third party conducts the pen test, The NodeZero Platform is run, and it finds the same things they found and sometimes a few other things that they did not even identify."
"For us, The NodeZero Platform is literally the single best security solution we have because the way that it works is we're able to scan every part of our network, both internally and externally, and then get completely actionable feedback that doesn't matter if it's for an application developer or a network admin."
"Overall, I'd rate NodeZero at nine to 9.5 out of ten."
"I rate the stability of the NodeZero Platform a ten out of ten."
"The NodeZero Platform's real attack capabilities help in identifying vulnerabilities on our on-prem systems because it provides actual vulnerabilities by attacking our systems."
 

Cons

"Check Point Security Management could be improved by enhancing the documentation, as Check Point needs to create more and easier documentation."
"The application filtering and URL filtering could be better."
"The initial configuration and setup knowledge base document for Check Point Security Management could be upgraded to make it more helpful for configuration reference."
"SD-WAN functionality could be added."
"I believe they can improve the management by allowing better API functionality because the API now is a little complicated, making it difficult to do automation."
"They need to make a Mac version of the SmartConsole, in my opinion."
"Check Point Security Management lacks some of the competitor features."
"For the first deployment, Check Point Security Management is not so easy and can be difficult for the first implementation."
"You need to be cautious about what it scans, as it could potentially cause issues."
"I encountered challenges with patch management, as we struggled to test and implement patches due to time constraints. This led to our patch management process being ineffective."
"The reports are quite useless."
"One of the areas where improvement is needed is in the visibility and reporting for large enterprises."
"The speed of the scans takes some time, but in my opinion, it is not surprising for what it is doing."
"The areas for improvement for The NodeZero Platform involve integration and automation. It would be beneficial if it could integrate directly with vulnerability management tools that would allow the platform to automatically import data, identify vulnerable systems, and test targets immediately, potentially even enabling automated feedback loops for rescanning since the process is currently manual."
"I think The NodeZero Platform could improve by leveraging GPUs for password cracking, which would be pretty good."
"The only issue we’ve encountered is that sometimes the scans take a long time to complete."
 

Pricing and Cost Advice

"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"The solution is expensive."
"This product can be used for 25 security gateways on a basic license."
"The solution is expensive and there is an annual license."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"Do the homework because Check Point is rather expensive."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"Price-wise, it is an expensive solution."
Information not available
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
879,422 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Outsourcing Company
18%
Security Firm
11%
Computer Software Company
9%
Financial Services Firm
6%
Computer Software Company
10%
Manufacturing Company
8%
Educational Organization
8%
Comms Service Provider
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business55
Midsize Enterprise32
Large Enterprise43
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise1
Large Enterprise4
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
Based on my experience with Check Point Security Management, I do not see anything lacking. It is currently managing all the gateways, and we are able to achieve what we want from our perspective. ...
What is your primary use case for Check Point Security Management?
I am using Check Point Security Management in our day-to-day operations to centrally manage all Check Point Security Gateways within my organization. All of these Check Point Security Gateways are ...
What do you like most about Horizon3.ai?
Penetration testing and scans are useful features.
What needs improvement with Horizon3.ai?
I think The NodeZero Platform could improve by leveraging GPUs for password cracking, which would be pretty good.
What is your primary use case for Horizon3.ai?
We use The NodeZero Platform for control validation and we are also looking for the likelihood of vulnerabilities.
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
Horizon3.ai
 

Overview

 

Sample Customers

Hedgetec, Geiger
Government agencies, Defense Industrial Base organizations, and enterprises in regulated industries such as finance, healthcare, manufacturing, and criticalinfrastructure rely on NodeZero to meet rigorous security and compliance requirements with continuous, scheduled, and on-demand testing.
Find out what your peers are saying about Check Point Security Management vs. The NodeZero Platform by Horizon3.ai and other solutions. Updated: December 2025.
879,422 professionals have used our research since 2012.