Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Trellix Advanced Threat Defense comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Advanced Threat Protection (ATP)
11th
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
70
Ranking in other categories
Log Management (8th), Threat Intelligence Platforms (TIP) (6th)
Trellix Advanced Threat Def...
Ranking in Advanced Threat Protection (ATP)
21st
Average Rating
7.8
Reviews Sentiment
5.6
Number of Reviews
9
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Advanced Threat Protection (ATP) category, the mindshare of Check Point Security Management is 0.7%, up from 0.3% compared to the previous year. The mindshare of Trellix Advanced Threat Defense is 2.0%, up from 1.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP) Market Share Distribution
ProductMarket Share (%)
Check Point Security Management0.7%
Trellix Advanced Threat Defense2.0%
Other97.3%
Advanced Threat Protection (ATP)
 

Featured Reviews

reviewer2751156 - PeerSpot reviewer
Years of using the solution significantly improve log management and troubleshooting efficiency
Check Point Security Management has positively impacted my organization because, after migrating from our previous firewall, a Cisco ASA, we were able to see what traffic was passing through the firewall and from that, build out least access privilege firewall rules. So only what's actually needed by the organization is being let through. The rest is being dropped. The measurable outcomes with Check Point Security Management show that the troubleshooting is definitely quicker. Now it just takes a few minutes to find out where the error is and resolve it. Before, it was at least an hour or two of troubleshooting to locate the issue.
PP
Ensuring long-term reliability while seeking internal email management enhancements
Prisma is a commercial name of the firewall now, but we don't work with the cloud product. Only our company is using it and we do not recommend it to customers. For us, it's transparent because it's a cloud product, so we don't really know the version as it's always updated. We have not had any problem, but it's difficult to report on what's going on because some days they can wash out perhaps 100 mails, and then it's difficult to say how many attacks you have reached. The right email has been washed out and then nobody has complained. We do not use the Threat Visualization feature; as we are in MX, the mail is washed out before it is in the mail inbox of the user, thus avoiding any problem requiring a reservation. In fact, there is no integration with existing security frameworks. The only problem we can have is that as we have no API interface, there is no inspection of internal mail. I rate Trellix Advanced Threat Defense a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The control is granular, so you can set policy profiles for different organizational profiles."
"Check Point Security Management has helped my team save time, improve security, and reduce manual work significantly."
"The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration."
"Check Point Security Management has helped my team save time, improve security, and reduce manual work significantly."
"The firewall cleverly handles such attacks without compromising on performance."
"Security Management gives us complete visibility into our security operations, allowing administrators to identify and address problem areas, reduce unnecessary costs, and improve efficiency. It offers detailed reports on network usage and security, which helps my company to monitor and control its security expenses."
"With the generation and review of logs, we have verified some vulnerabilities and attempted attacks to generate improvements in our infrastructure and policies to help avoid issues in the future."
"It offers numerous features and blades, including intrusion prevention (IPS) and malware detection. It excels in network security and VPN capabilities, including IPSec VPNs. IPS is particularly powerful due to its signature-based detection, which automatically checks for and identifies malicious software."
"Its greatest strength is the DXL client which can rapidly disseminate attack information to all clients via the McAfee Agent instead of going through the ePO server."
"It is very scalable."
"The fact that in 10 years, we have had no problem is the most valuable feature for us; it's really a washing machine, but the only problem we face is that it's difficult to report on this product."
"Provides good exfiltration, and is an all-in-one product."
"It stops in excess of twenty-five malware events per month, all of which could be critical to the business."
"I recommend this solution because of its ease of use."
"The most valuable features are the administration console and its detection and response module."
"It is stable and reliable."
 

Cons

"The management API can be further developed so that all functions offered by the dashboard are also available via the API (for example, Network Topology)."
"They need to make a Mac version of the SmartConsole, in my opinion."
"The reporting should be improved in future releases. It needs to be very explicit. This is very important."
"They need to change the support resolution time."
"I would like this solution to be integrated directly into the Cluster XL equipment."
"In the last version from 80.20, there are some issues around SSNA Diction. I would like this to be improved."
"Some costs are ridiculously high."
"Even though the platform is simple, and creating security policies is a fairly quick task, creating a bulk of policies at once (ie. for a migration) could be a useful tool. This is probably possible through scripting, however, having an easy-to-use "import CSV" button would be beneficial."
"We'd like them to be better at dealing with script threats."
"The initial setup was industry standard complex. It takes awhile and has a lot of planning involved. It could be simplified with product redesign."
"Lacks remote capabilities not dependent on the internet."
"The only problem we can have is that as we have no API interface, there is no inspection of internal mail."
"Make the ATD system a part of the whole product and take the whole thing onto the cloud. While it is there already, it is not to the same level as the on-premise version."
"I would like to see future versions of the solution incorporate artificial intelligence technology."
"There could be a tool that automatically updates all-new Microsoft IPs, which are available for free to connect to the client."
"This solution needs to be made "cloud ready"."
 

Pricing and Cost Advice

"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"Do the homework because Check Point is rather expensive."
"The solution is expensive and there is an annual license."
"The solution is expensive."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"Price-wise, it is an expensive solution."
"This product can be used for 25 security gateways on a basic license."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"Our licensing fees for this solution are approximately one million dollars per year."
"The product is expensive, but it is better than the rest of them in the industry."
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
869,566 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Comms Service Provider
9%
Financial Services Firm
8%
Manufacturing Company
7%
Government
16%
Comms Service Provider
14%
Performing Arts
11%
Financial Services Firm
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business37
Midsize Enterprise28
Large Enterprise41
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise4
Large Enterprise5
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
Performance with logs needs improvement as Check Point Security Management has large-scale environments that need dedicated log servers. If you store logs on the central management server or Check ...
What is your primary use case for Check Point Security Management?
We need central management for our policy, monitoring, and different day-to-day administrative tasks, so Check Point Security Management fits all the requirements for our needs. As we know, Check P...
What do you like most about McAfee Advanced Threat Defense?
I recommend this solution because of its ease of use.
What needs improvement with McAfee Advanced Threat Defense?
I would like to see an API interface for internal email and control of outgoing email to make it closer to 10. It's necessary; today we have an MX interface, and it would be interesting to have an ...
What is your primary use case for McAfee Advanced Threat Defense?
We are working with Palo Alto products, specifically firewalls. We are only using Palo Alto Firewalls and not Cortex. With FireEye and Trellix, we only work with ETP now because the NDR function wh...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
McAfee Advanced Threat Defense
 

Overview

 

Sample Customers

Hedgetec, Geiger
The Radicati Group, Florida International University, MGM Resorts International, County Durham andDarlington NHS Foundation Trust
Find out what your peers are saying about Check Point Security Management vs. Trellix Advanced Threat Defense and other solutions. Updated: September 2025.
869,566 professionals have used our research since 2012.