Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Trellix Insights comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 12, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Threat Intelligence Platforms (TIP)
6th
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
73
Ranking in other categories
Log Management (8th), Advanced Threat Protection (ATP) (11th)
Trellix Insights
Ranking in Threat Intelligence Platforms (TIP)
22nd
Average Rating
9.0
Reviews Sentiment
1.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Featured Reviews

reviewer2751156 - PeerSpot reviewer
Years of using the solution significantly improve log management and troubleshooting efficiency
Check Point Security Management has positively impacted my organization because, after migrating from our previous firewall, a Cisco ASA, we were able to see what traffic was passing through the firewall and from that, build out least access privilege firewall rules. So only what's actually needed by the organization is being let through. The rest is being dropped. The measurable outcomes with Check Point Security Management show that the troubleshooting is definitely quicker. Now it just takes a few minutes to find out where the error is and resolve it. Before, it was at least an hour or two of troubleshooting to locate the issue.
Daniel_Martins - PeerSpot reviewer
Provides comprehensive threat insights but needs more defensive playbooks
For Trellix Insights, there are both positive and negative aspects. Playbooks is a very good feature. We have about 12 Playbooks, which are actions that we can implement for adjusting the infrastructure to stop threats and vulnerabilities. That's the positive aspect. However, for the defensive Playbooks, when connecting with Trellix Insights, we have only one defensive Playbook. Some customers question why there is only one. While Playbooks and defensive Playbooks serve similar purposes, in Trellix Insights, defensive Playbooks appear at the top. It would be beneficial to have more than just one defensive Playbook. Trellix Insights has existed for many years, and since this new product was released, there has only been one defensive Playbook. This is an area that needs improvement. They need to add more defensive Playbooks quickly, considering many years have passed.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The tool is cost-effective."
"After deploying Check Point Security Management, we improved our productivity by integrating all devices into a single console instead of managing separate log-ins for each branch's gateways, making our admin team's tasks easier."
"I find very useful the central view offered by Check Point Security Management, as you're able to have all your gateways and policy and different policy packages."
"The fact that everything starts from the same unified management console makes it very easy to integrate new equipment or functionalities once the operator has become familiar with it, as everything will follow similar management or operation mechanisms."
"It has a central management log server that helps us to easily identify faults and issues in the environment, especially during outages and incidents during the implementation of policy rules."
"The unique management using Smart Console for all firewalls is very useful."
"It's a great complete endpoint security solution that prevents the most imminent threats to the endpoint such as ransomware, phishing, or malware."
"It's a reliable solution for security."
"The most important benefit of Trellix Insights is its capability to integrate with EPO and provide comprehensive information."
 

Cons

"They need to change the support resolution time."
"Even though the platform is simple, and creating security policies is a fairly quick task, creating a bulk of policies at once (ie. for a migration) could be a useful tool. This is probably possible through scripting, however, having an easy-to-use "import CSV" button would be beneficial."
"The management API can be further developed so that all functions offered by the dashboard are also available via the API (for example, Network Topology)."
"While the console and administration work well, they have to work on performance since it consumes a lot of CPU and memory."
"The migration from R77 Manager to R80 is a major upgrade. It's not very easy to do. There should be some kind of Wizard for a direct upgrade from the R77 to the R80. There should be an easy way for the customers to do the upgrade."
"Check Point is highly regarded for its effectiveness and the three-layer architecture for security, comprising the client, Security Management, and secure management console, integrated with firewall capabilities."
"Check Point EDR has room for improvement, especially in the area of Data Loss Prevention where it currently lacks functionality."
"I would like the ability to have an overview, cross-site: One portal that does all firewalls. Also, the user interface is overly complicated."
"It would be beneficial to have more than just one defensive Playbook. Trellix Insights has existed for many years, and since this new product was released, there has only been one defensive Playbook."
 

Pricing and Cost Advice

"The solution is expensive and there is an annual license."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"This product can be used for 25 security gateways on a basic license."
"Do the homework because Check Point is rather expensive."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"Price-wise, it is an expensive solution."
"The solution is expensive."
Information not available
report
Use our free recommendation engine to learn which Threat Intelligence Platforms (TIP) solutions are best for your needs.
872,019 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Outsourcing Company
10%
Computer Software Company
10%
Comms Service Provider
8%
Financial Services Firm
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business41
Midsize Enterprise29
Large Enterprise41
No data available
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
Performance with logs needs improvement as Check Point Security Management has large-scale environments that need dedicated log servers. If you store logs on the central management server or Check ...
What is your primary use case for Check Point Security Management?
We need central management for our policy, monitoring, and different day-to-day administrative tasks, so Check Point Security Management fits all the requirements for our needs. As we know, Check P...
What needs improvement with Trellix Insights?
For Trellix Insights, there are both positive and negative aspects. Playbooks is a very good feature. We have about 12 Playbooks, which are actions that we can implement for adjusting the infrastru...
What advice do you have for others considering Trellix Insights?
We use Trellix Insights for all clients that buy an endpoint solution. All users of endpoint solutions use Trellix Insights. The real-time reporting capabilities of Trellix Insights for compliance ...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
No data available
 

Overview

 

Sample Customers

Hedgetec, Geiger
Information Not Available
Find out what your peers are saying about CrowdStrike, Recorded Future, VirusTotal and others in Threat Intelligence Platforms (TIP). Updated: October 2025.
872,019 professionals have used our research since 2012.