Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs ThreatConnect Threat Intelligence Platform (TIP) comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Threat Intelligence Platforms (TIP)
6th
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
70
Ranking in other categories
Log Management (8th), Advanced Threat Protection (ATP) (11th)
ThreatConnect Threat Intell...
Ranking in Threat Intelligence Platforms (TIP)
7th
Average Rating
8.4
Reviews Sentiment
6.5
Number of Reviews
6
Ranking in other categories
Security Orchestration Automation and Response (SOAR) (16th)
 

Mindshare comparison

As of October 2025, in the Threat Intelligence Platforms (TIP) category, the mindshare of Check Point Security Management is 0.6%, up from 0.3% compared to the previous year. The mindshare of ThreatConnect Threat Intelligence Platform (TIP) is 5.6%, down from 6.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Threat Intelligence Platforms (TIP) Market Share Distribution
ProductMarket Share (%)
Check Point Security Management0.6%
ThreatConnect Threat Intelligence Platform (TIP)5.6%
Other93.8%
Threat Intelligence Platforms (TIP)
 

Featured Reviews

reviewer2751156 - PeerSpot reviewer
Years of using the solution significantly improve log management and troubleshooting efficiency
Check Point Security Management has positively impacted my organization because, after migrating from our previous firewall, a Cisco ASA, we were able to see what traffic was passing through the firewall and from that, build out least access privilege firewall rules. So only what's actually needed by the organization is being let through. The rest is being dropped. The measurable outcomes with Check Point Security Management show that the troubleshooting is definitely quicker. Now it just takes a few minutes to find out where the error is and resolve it. Before, it was at least an hour or two of troubleshooting to locate the issue.
Aadarsh Dawn - PeerSpot reviewer
Offers features like response capabilities and automation response and automation orchestration
ThreatConnect aggregates and operationalizes Threat intelligence data and sources across internal client environments. It leverages Automation and built in Case Management to streamline and automate threat intelligence-driven processes and investigations within client environments ThreatConnect…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as TLS violations or content violations."
"The intuitive interface also allows new team members to adapt to the technology if they are not familiar with it initially. It doesn't take much for one to familiarize themselves with the product."
"The additional features offered by the solution are excellent. We didn't have a lot fo these on a previous solution, and they've proven to be an advantage for us."
"The product's installation phase was easy."
"It's already helped secure our organization effectively."
"The best feature Check Point Security Management offers is the GUI, which shows everything in different categories such as mobile phones, connected devices, laptops, and desktops, making it easy to understand what is connected to what."
"The log dashboard in the SmartConsole is very useful and convenient for monitoring and tracking."
"Check Point Security Management Server offers a wide range of security features, including firewall, intrusion prevention, VPN, application control, and threat prevention capabilities."
"The product automatically generated a threat score based on the maliciousness of an IP."
"I like their customer support."
"The most valuable features are ease of use and the ability to customize it."
"ThreatConnect has a highly user-friendly interface."
"It's a solid platform and is stable enough. It is not complicated and is easy to use."
"The tool's installation, integration, and playbooks are very straightforward."
"We have been able to see a return on investment as our clients believe in us more."
 

Cons

"For those not familiar with the Command Line interface, there should be an option in the GUI for operating backups."
"I would like for users to have more control over the platform in the next release. Right now, the system is very central and general requiring new rules to be created that better-suite our requirements."
"In my experience, the place they can improve the most is in the technical support where I have had some serious problems that could not be solved in time due to a lack of knowledge of the assigned engineer."
"The customer support rates at five out of 10."
"I would like the ability to have an overview, cross-site: One portal that does all firewalls. Also, the user interface is overly complicated."
"Check Point Security Management lacks some of the competitor features."
"Support is the main area that they need to improve. Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region. I would like a feature where there is a workflow to provide authorization to some users before they're able to create and apply rules. Such a feature should be integrated with the management. It should not be in the box that comes with it."
"It could improve by showing DNS-specific information for connections to unknown public IPs."
"Sometimes, when using the solution, it slows down, affecting our ability to mitigate threats."
"They should make it a little bit easier to generate events and share them with the community"
"Integration is an area that could use some improvement."
"I couldn’t get any training videos online when I was working with the tool."
"Support is an area with which nobody is ever fully satisfied, so it can be improved."
"I would like to see improvements in the time zone support of their customer service, considering users are from different time zones."
"It would be good to have more feeds and more integrated sources for enrichment."
 

Pricing and Cost Advice

"Price-wise, it is an expensive solution."
"Do the homework because Check Point is rather expensive."
"The solution is expensive."
"The solution is expensive and there is an annual license."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"This product can be used for 25 security gateways on a basic license."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"The tool is expensive."
"The price of this product is in the mid-range, not too expensive, nor inexpensive."
"The price could be better."
"I rate the product price as six on a scale of one to ten, where one is extremely expensive, and ten means it is cheap."
report
Use our free recommendation engine to learn which Threat Intelligence Platforms (TIP) solutions are best for your needs.
869,566 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Comms Service Provider
9%
Financial Services Firm
8%
Manufacturing Company
7%
Financial Services Firm
17%
Computer Software Company
8%
Government
7%
Educational Organization
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business37
Midsize Enterprise28
Large Enterprise41
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise23
Large Enterprise4
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
Performance with logs needs improvement as Check Point Security Management has large-scale environments that need dedicated log servers. If you store logs on the central management server or Check ...
What is your primary use case for Check Point Security Management?
We need central management for our policy, monitoring, and different day-to-day administrative tasks, so Check Point Security Management fits all the requirements for our needs. As we know, Check P...
What do you like most about ThreatConnect Threat Intelligence Platform (TIP)?
The product automatically generated a threat score based on the maliciousness of an IP.
What is your experience regarding pricing and costs for ThreatConnect Threat Intelligence Platform (TIP)?
The pricing seems a bit high for smaller companies. It would be beneficial if they had pricing tailored to different client sizes.
What needs improvement with ThreatConnect Threat Intelligence Platform (TIP)?
The platform needs improvement in its customization of the tagging mechanism. Some filtering options are not available based on individual tags, and we cannot export more types of data. The initial...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
No data available
 

Interactive Demo

 

Overview

 

Sample Customers

Hedgetec, Geiger
Customer Case Studies & Use Cases
Find out what your peers are saying about Check Point Security Management vs. ThreatConnect Threat Intelligence Platform (TIP) and other solutions. Updated: September 2025.
869,566 professionals have used our research since 2012.