No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point Security Management vs ThreatBook Threat Intelligence Platform (TIP) comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Apr 5, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Threat Intelligence Platforms (TIP)
3rd
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
86
Ranking in other categories
Log Management (10th), Advanced Threat Protection (ATP) (10th)
ThreatBook Threat Intellige...
Ranking in Threat Intelligence Platforms (TIP)
14th
Average Rating
9.6
Reviews Sentiment
7.6
Number of Reviews
4
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Threat Intelligence Platforms (TIP) category, the mindshare of Check Point Security Management is 0.8%, up from 0.3% compared to the previous year. The mindshare of ThreatBook Threat Intelligence Platform (TIP) is 1.5%, up from 0.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Threat Intelligence Platforms (TIP) Mindshare Distribution
ProductMindshare (%)
Check Point Security Management0.8%
ThreatBook Threat Intelligence Platform (TIP)1.5%
Other97.7%
Threat Intelligence Platforms (TIP)
 

Featured Reviews

RL
TI at a security firm with 51-200 employees
Simplified threat detection and reduced policy deployment time
The standout features of Check Point Security Management are unified policy management, real-time visibility, and automation capabilities, making it a powerful tool for security management. Consistency across environments with Check Point Security Management helps me ensure that instead of maintaining separate rules for firewalls, cloud workloads, and data centers, we apply one unified policy that covers them all. This reduces misconfigurations and ensures compliance, proving to be a time-saver because rolling out a new rule or updating an existing one takes minutes, not hours, because it is propagated everywhere automatically. Automation is one of the most valuable aspects of Check Point Security Management, and it often does not get enough attention compared to headline features like unified policies or visibility. With policy automation, routine tasks such as rule creation, compliance checks, or policy updates can be automated, reducing human error and saving hours of manual work. Check Point Security Management has simplified administration in my organization because instead of juggling multiple consoles, everything is managed from a single pane of glass. This has reduced complexity and saved significant time for our IT team, improving our operational efficiency. For a policy update, I used to spend two or three hours across multiple consoles. Now, with unified management in Check Point Security Management, it takes thirty to forty minutes, resulting in about a seventy percent reduction in effort, greatly boosting productivity.
RG
Security Technician at ZhongTianKeJi
Enhancement in incident response through reduced false positives and contextual intelligence
ThreatBook has positively impacted our organization by allowing us to detect all alerts and threats effectively. In the past, we needed to search logs from various sources, including terminals, DI servers, and firewalls, collecting a lot of logs and searching the internet for contextual information about threat actors. After using ThreatBook TDP, all alerts and contexts are easily displayed on the dashboard, making it very helpful for us. During the incident response scenario, ThreatBook saves us over 80% of the time for each incident. We usually took about one day or two days for attribution and understanding how the attacker attacked us, but after using ThreatBook TDP, we usually take around one or two hours to finish all these tasks. Additionally, their AI techniques save a lot of time, allowing me to ask in natural language for explanations about the meaning and target of the attacker.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is ideal for use and deployment in a large infrastructure environment."
"Check Point Security Management has had a very positive impact on my organization by making security operations more efficient and reliable."
"I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation."
"As the security administrator, who is responsible for the day-to-day tasks (e.g. creating new firewall rules, monitoring the security alerts and incidents etc.) and the maintenance (e.g. installing the new Jumbo Hotfixes), I find the Check Point Security Management R80.10 to be the great solution."
"Check Point Security Management has positively impacted my organization, with one benefit being that I create one security management for controlling any gateways."
"This solution is easy to install and deploy. It is also user-friendly."
"The additional features offered by the solution are excellent. We didn't have a lot fo these on a previous solution, and they've proven to be an advantage for us."
"The best feature Check Point Security Management offers is definitely the log management; I've worked with other firewall vendors and the overview of the logs that you get in Check Point Security Management is superb."
"ThreatBook saves us over 80% of time for each incident, reducing the usual time taken from one or two days for attribution to just one or two hours, thanks to their AI techniques."
"We have not suffered from any attack for the past few months, which has relatively improved our network security."
"ThreatBook Threat Intelligence Platform (TIP) has positively impacted our organization by helping us generate the strategic threat focus reports and aiding us in decision-making, leading to improved cybersecurity operation efficiency."
"ThreatBook saves us over 80% of the time for each incident."
 

Cons

"We sometimes have trouble with the performance of the solution."
"As it stands, performing a smart view monitor will still open the old R77 SmartView monitor session, which is a bit flaky and slow."
"As it stands, it will still open the old R77 SmartView monitor session, which is a bit flaky and slow."
"Check Point Security Management could be improved with more intuitive documentation, as it is not currently intuitive. When I needed to deploy for the first time, it was very difficult."
"SD-WAN functionality could be added."
"There is room for improvement in reliability."
"The application filtering and URL filtering could be better."
"The migration from R77 Manager to R80 is a major upgrade. It's not very easy to do."
"I hope that ThreatBook can integrate a feature where if I detect any internal compromised hosts, I can block or isolate those compromised hosts within my internal network; that would be good."
"It would be great if ThreatBook could integrate with our ITSM system to streamline the tasks and incident management"
"We’ve seen strong ROI through reduced incident response times, increased threat visibility, and less time wasted on false positives."
"ThreatBook Threat Intelligence Platform (TIP) could be improved by providing more integrations to support additional platforms."
 

Pricing and Cost Advice

"Do the homework because Check Point is rather expensive."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"The solution is expensive and there is an annual license."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"Price-wise, it is an expensive solution."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"The solution is expensive."
"This product can be used for 25 security gateways on a basic license."
Information not available
report
Use our free recommendation engine to learn which Threat Intelligence Platforms (TIP) solutions are best for your needs.
894,738 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Outsourcing Company
15%
Financial Services Firm
14%
Security Firm
8%
Marketing Services Firm
7%
Recreational Facilities/Services Company
30%
Financial Services Firm
16%
Construction Company
7%
Real Estate/Law Firm
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business55
Midsize Enterprise31
Large Enterprise43
No data available
 

Questions from the Community

What needs improvement with Check Point Security Management?
Based on my experience with Check Point Security Management, I do not see anything lacking. It is currently managing all the gateways, and we are able to achieve what we want from our perspective. ...
What is your primary use case for Check Point Security Management?
I am using Check Point Security Management in our day-to-day operations to centrally manage all Check Point Security Gateways within my organization. All of these Check Point Security Gateways are ...
What advice do you have for others considering Check Point Security Management?
I advise anyone having multiple security gateways that are managed stand-alone to deploy Check Point Security Management and manage all security gateways from a central console and central team. Th...
What is your experience regarding pricing and costs for ThreatBook?
My experience with pricing, setup cost, and licensing is that it is cost-effective and the price is reasonable, with very good overall value and quality.
What needs improvement with ThreatBook?
I hope that ThreatBook can integrate a feature where if I detect any internal compromised hosts, I can block or isolate those compromised hosts within my internal network; that would be good. I wou...
What is your primary use case for ThreatBook?
We use ThreatBook to have overview visibility of all our assets including if there are any compromised hosts or if there are any incoming attacks from external threats. When we first deployed Threa...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
No data available
 

Overview

 

Sample Customers

Hedgetec, Geiger
Information Not Available
Find out what your peers are saying about Check Point Security Management vs. ThreatBook Threat Intelligence Platform (TIP) and other solutions. Updated: April 2026.
894,738 professionals have used our research since 2012.