Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs ThreatBook Threat Intelligence Platform (TIP) comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 4, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Threat Intelligence Platforms (TIP)
4th
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
89
Ranking in other categories
Log Management (11th), Advanced Threat Protection (ATP) (10th)
ThreatBook Threat Intellige...
Ranking in Threat Intelligence Platforms (TIP)
13th
Average Rating
9.6
Reviews Sentiment
7.6
Number of Reviews
4
Ranking in other categories
No ranking in other categories
 

Featured Reviews

RL
TI at a security firm with 51-200 employees
Simplified threat detection and reduced policy deployment time
The standout features of Check Point Security Management are unified policy management, real-time visibility, and automation capabilities, making it a powerful tool for security management. Consistency across environments with Check Point Security Management helps me ensure that instead of maintaining separate rules for firewalls, cloud workloads, and data centers, we apply one unified policy that covers them all. This reduces misconfigurations and ensures compliance, proving to be a time-saver because rolling out a new rule or updating an existing one takes minutes, not hours, because it is propagated everywhere automatically. Automation is one of the most valuable aspects of Check Point Security Management, and it often does not get enough attention compared to headline features like unified policies or visibility. With policy automation, routine tasks such as rule creation, compliance checks, or policy updates can be automated, reducing human error and saving hours of manual work. Check Point Security Management has simplified administration in my organization because instead of juggling multiple consoles, everything is managed from a single pane of glass. This has reduced complexity and saved significant time for our IT team, improving our operational efficiency. For a policy update, I used to spend two or three hours across multiple consoles. Now, with unified management in Check Point Security Management, it takes thirty to forty minutes, resulting in about a seventy percent reduction in effort, greatly boosting productivity.
RG
Security Technician at ZhongTianKeJi
Enhancement in incident response through reduced false positives and contextual intelligence
ThreatBook has positively impacted our organization by allowing us to detect all alerts and threats effectively. In the past, we needed to search logs from various sources, including terminals, DI servers, and firewalls, collecting a lot of logs and searching the internet for contextual information about threat actors. After using ThreatBook TDP, all alerts and contexts are easily displayed on the dashboard, making it very helpful for us. During the incident response scenario, ThreatBook saves us over 80% of the time for each incident. We usually took about one day or two days for attribution and understanding how the attacker attacked us, but after using ThreatBook TDP, we usually take around one or two hours to finish all these tasks. Additionally, their AI techniques save a lot of time, allowing me to ask in natural language for explanations about the meaning and target of the attacker.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The interface also makes it easy for us to configure the VPN from the GUI rather than the command line, which makes it easy even for less experienced engineers to work with."
"We can easily push the policies to any of our gateways."
"Check Point has been very effective in terms of threat management and comprehensive protection against vulnerabilities, and it has given us confidence that our data is not going anywhere."
"The best feature Check Point Security Management offers is the GUI, which shows everything in different categories such as mobile phones, connected devices, laptops, and desktops, making it easy to understand what is connected to what."
"Based on my experience with Check Point Security Management, it is an excellent solution for managing all security gateways from a central console where I can access all logs and security events triggering on different security gateways."
"It's a great solution for management. We can manage a lot at the same time with one security management system. Also, each gateway depends on the other, which is helpful."
"Check Point Security Management has positively impacted our organization by streamlining different policy management in a single console, and incident response has also become faster because all alerts and logs feed into one security tool or management tool, giving us immediate visibility without needing to switch between tools."
"Check Point Security Management has improved our organization because all corporate firewalls can be managed with a single interface."
"ThreatBook saves us over 80% of time for each incident, reducing the usual time taken from one or two days for attribution to just one or two hours, thanks to their AI techniques."
"We have not suffered from any attack for the past few months, which has relatively improved our network security."
"ThreatBook Threat Intelligence Platform (TIP) has positively impacted our organization by helping us generate the strategic threat focus reports and aiding us in decision-making, leading to improved cybersecurity operation efficiency."
"ThreatBook saves us over 80% of the time for each incident."
 

Cons

"We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners."
"The graphical interface is nice but it is a bit heavy."
"I like that the Compliance software blade is available for free with the Security Management server purchase, but it is free for only one year - after that you have to buy an additional license to continue using it. I think such an important feature is vital for the management server, and should not be licensed separately."
"Check Point Tech Support will not assist with new configurations if we encounter any issues during the configuration process."
"The documentation of Check Point Security Management is not intuitive because it is for advanced technical support, and when I need to deploy different features, it is complicated for junior support or technical personnel."
"I would like it to be the administrator of equipment or Next Generation firewalls (which have to be managed on this platform) and to be able to manage other services (like Harmony) that also belong to Check Point."
"Check Point Security Management can be improved in terms of policies management and workflow efficiency. For example, the interface can be overwhelming for new users, and simplifying rule creation, offering guided workflows or templates will reduce onboarding time."
"SD-WAN functionality could be added."
"ThreatBook Threat Intelligence Platform (TIP) could be improved by providing more integrations to support additional platforms."
"We’ve seen strong ROI through reduced incident response times, increased threat visibility, and less time wasted on false positives."
"I hope that ThreatBook can integrate a feature where if I detect any internal compromised hosts, I can block or isolate those compromised hosts within my internal network; that would be good."
"It would be great if ThreatBook could integrate with our ITSM system to streamline the tasks and incident management"
 

Pricing and Cost Advice

"The solution is expensive and there is an annual license."
"The solution is expensive."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"Do the homework because Check Point is rather expensive."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"Price-wise, it is an expensive solution."
"This product can be used for 25 security gateways on a basic license."
Information not available
report
Use our free recommendation engine to learn which Threat Intelligence Platforms (TIP) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Outsourcing Company
18%
Security Firm
11%
Computer Software Company
7%
Manufacturing Company
6%
Recreational Facilities/Services Company
40%
Financial Services Firm
14%
Real Estate/Law Firm
6%
Performing Arts
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business55
Midsize Enterprise32
Large Enterprise43
No data available
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
Based on my experience with Check Point Security Management, I do not see anything lacking. It is currently managing all the gateways, and we are able to achieve what we want from our perspective. ...
What is your primary use case for Check Point Security Management?
I am using Check Point Security Management in our day-to-day operations to centrally manage all Check Point Security Gateways within my organization. All of these Check Point Security Gateways are ...
What is your experience regarding pricing and costs for ThreatBook?
My experience with pricing, setup cost, and licensing is that it is cost-effective and the price is reasonable, with very good overall value and quality.
What needs improvement with ThreatBook?
I hope that ThreatBook can integrate a feature where if I detect any internal compromised hosts, I can block or isolate those compromised hosts within my internal network; that would be good. I wou...
What is your primary use case for ThreatBook?
We use ThreatBook to have overview visibility of all our assets including if there are any compromised hosts or if there are any incoming attacks from external threats. When we first deployed Threa...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
No data available
 

Overview

 

Sample Customers

Hedgetec, Geiger
Information Not Available
Find out what your peers are saying about Check Point Security Management vs. ThreatBook Threat Intelligence Platform (TIP) and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.