Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Trellix Network Detection and Response comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.4
Check Point Security Management offers time savings, incident reduction, and ROI increase, ensuring satisfaction and system protection.
Sentiment score
8.5
Trellix Network Detection and Response exceeded expectations by improving threat prevention and detection, boosting productivity and reducing response times.
I have seen a return on investment with Check Point Security Management, as my security concerns regarding data production have been greatly diminished, and my time is also saved.
I have seen a strong ROI from using Check Point Security Management through unified policy management, reduced misconfigurations, and faster incident response.
 

Customer Service

Sentiment score
6.3
Check Point Security Management support receives mixed reviews, with experiences varying by region and service level, suggesting improvements needed.
Sentiment score
6.8
Trellix's support is praised for responsiveness, but improvements in expertise and incident response promptness are suggested by some.
We have partner support that helps us mitigate vulnerabilities reported by our infrastructure team.
The challenge was with drivers due to the size, and we had not provisioned the partition to the right size.
Technical support needs improvement as sometimes engineers are not available promptly, especially during high-severity incidents.
 

Scalability Issues

Sentiment score
7.8
Check Point Security Management is scalable and effective for centralizing firewalls but faces challenges in complex deployments and licensing.
Sentiment score
7.8
Trellix Network Detection and Response scales effectively in various industries, performing well in large enterprises without latency issues.
So far, it has been functioning smoothly without any issues in the past 1.5 years.
When you upgrade multiple times, you leave many files that are useless. They are dated, so it's always better to create a new machine every few versions, for example, three or four major versions.
 

Stability Issues

Sentiment score
7.9
Check Point Security Management is stable with high availability, though some users report minor VPN and connectivity issues.
Sentiment score
7.7
Trellix Network Detection and Response is stable and reliable, with consistent performance and high user satisfaction despite occasional minor issues.
In my environment, Check Point Security Management is stable, as I do not see any downtime.
 

Room For Improvement

Check Point Security Management needs improved third-party integration, intuitive interfaces, faster policy application, and enhanced reporting capabilities.
Trellix Network Detection needs improved customization, integration, AI capabilities, support services, and a more user-friendly interface at reduced pricing.
Each time this happens, I need to upgrade to the latest version of the firmware, and this frequent updating affects my productivity negatively.
Check Point Security Management can be improved by making the AI more accurate in providing better threat detection, traffic and data analysis.
We had to provision the virtual machine twice.
There should be improvements in AI intelligence, faster decision-making, and a more responsive technical support team.
 

Setup Cost

Check Point Security Management is costly but valued for its features; discounts and trials offer added benefits for users.
Trellix Network Detection is costly but effective, with yearly licensing, discounts, and competitive pricing against some competitors like Palo Alto.
Licensing is quite expensive.
My experience with pricing, setup costs, and licensing for Check Point Security Management involves a bit of a challenge in pricing, as it is somewhat costlier than previous devices.
Since we are using it extensively, we get significant discounts during procurement.
 

Valuable Features

Check Point Security Management offers centralized controls, seamless integration, and robust security features for effective network administration and full visibility.
Trellix excels in threat protection with AI-driven analysis, automation, and enhanced visibility, benefiting security operations and incident management.
The real-time monitoring and logging helps us provide real visibility into our network traffic and security events across the various security devices and network activity.
Check Point Security Management does not operate like that; it shows the mobile device, tablet, smartphone, laptop, and desktop separately so that I can easily find out how many desktops are connected, how many mobile devices are connected, and I can easily block mobile devices and free up the IPs.
Check Point Security Management has positively impacted my organization by providing centralized control, allowing us to manage all security policies and gateways from a single console, reducing complexity and saving time.
Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch.
 

Categories and Ranking

Check Point Security Manage...
Ranking in Advanced Threat Protection (ATP)
13th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
67
Ranking in other categories
Log Management (9th), Threat Intelligence Platforms (7th)
Trellix Network Detection a...
Ranking in Advanced Threat Protection (ATP)
12th
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
39
Ranking in other categories
Network Detection and Response (NDR) (11th)
 

Mindshare comparison

As of August 2025, in the Advanced Threat Protection (ATP) category, the mindshare of Check Point Security Management is 0.8%, up from 0.1% compared to the previous year. The mindshare of Trellix Network Detection and Response is 5.4%, up from 4.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP)
 

Featured Reviews

NareshKumar10 - PeerSpot reviewer
Enhanced Internal Security and Efficiency
Check Point Security Management can be improved by addressing a negative challenge I face: sometimes it does not show internet utilization in the GUI. When I ask support, they tell me to upgrade the firmware, which happens quite frequently. Since I deployed the device in my on-premises environment 1.5 years ago, I have experienced this issue three times. Check Point Security Management has not impacted my daily work or decision-making in any negative way. As an IT person, I occasionally need to check how much internet bandwidth has been used in the internal network over the past month, day, or week. During those times, when I open the data utilization column, it shows nothing available. Each time this happens, I need to upgrade to the latest version of the firmware, and this frequent updating affects my productivity negatively. If Check Point addresses this issue in the future, it will be beneficial for all customers using Check Point SMBs.
BiswabhanuPanda - PeerSpot reviewer
Offers in-depth investigation capabilities, integrates well and smoothly transitioned from a lower-capacity appliance to a higher one
The in-depth investigation capabilities are a major advantage. When the system flags something as malicious, it provides a packet capture of that activity within the environment. That helps my team quickly identify additional context that most other tools wouldn't offer – like source IP or base64 encoded data. We can also see DNS requests and other details that aren't readily available in solutions like Check Point or others that we've tried. The detection itself is solid, and their sandboxing is powerful. There's a learning curve – you need a strong grasp of OS-level changes, process forking, registry changes, and the potential impact of those. But with that knowledge, the level of information Trellix provides is far greater than what we've seen elsewhere. The real-time response capability of Trellix has been quite effective, although it's not very fast. The key is this solution's concept of 'preference zero.' They don't immediately act on a zero-day. For example, the solution has seen a piece of malware for the first time. It'll let it in, then do sandboxing. Maybe after four or five minutes, it identifies that specific file's DNX Secure Store as malicious. At that point, they update the static analysis engine, and it gets detected if anything else tries to download the same file. There is that initial 'preference zero' concept, like with Panda. You may not hold traffic in the network. That's standard in the industry; we don't do much about it. To address that, we also have endpoint solutions. We use SentinelOne in our environment, which helps us identify threats like Western Bureaus and others.
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Comms Service Provider
8%
Financial Services Firm
7%
Manufacturing Company
6%
Financial Services Firm
13%
Comms Service Provider
12%
Manufacturing Company
10%
Government
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
I see areas of improvement for Check Point Security Management such as GUI stability and performance, and simplified firmware upgrades. I and my colleagues occasionally report glitches or missing d...
What is your primary use case for Check Point Security Management?
My main use case for Check Point Security Management is to unify firewall and threat prevention policies across multiple international sites, so I use SmartConsole to streamline rule updates and mo...
What do you like most about FireEye Network Security?
We wanted to cross-reference that activity with the network traffic just to be sure there was no lateral movement. With Trellix, we easily confirmed that there was no lateral network involvement an...
What is your experience regarding pricing and costs for FireEye Network Security?
While I do not handle pricing directly, it is known that there is a variety of customers with different licensing needs, which depends on the organization's size and policy.
What needs improvement with FireEye Network Security?
The Trellix solution could be improved by enhancing the Central Management Console for faster visibility, which would help in network detection response. Networking often involves complexity that c...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
FireEye Network Security, FireEye
 

Overview

 

Sample Customers

Hedgetec, Geiger
FFRDC, Finansbank, Japan Advanced Institute of Science and Technology, Investis, Kelsey-Seybold Clinic, Bank of Thailand, City of Miramar, Citizens National Bank, D-Wave Systems
Find out what your peers are saying about Check Point Security Management vs. Trellix Network Detection and Response and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.