We performed a comparison between Check Point Security Management and VirusTotal based on real PeerSpot user reviews.
Find out in this report how the two Threat Intelligence Platforms solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The layered architecture is really understandable and easy to use."
"The cluster solution made our job easier any fault to the device will not halt entire internet connectivity."
"The control is granular, so you can set policy profiles for different organizational profiles."
"The unique management using Smart Console for all firewalls is very useful."
"The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as TLS violations or content violations."
"The log dashboard in the SmartConsole is very useful and convenient for monitoring and tracking."
"We can track logs of each firewall which is very helpful."
"HA Structure provides good coverage and works fine."
"The most valuable feature is the worldwide malware information database."
"It can scan the dark web and find if an email ID has been compromised. This is another area that we have not explored yet."
"With VirusTotal, I can check for any hash, malware, file, domain, IP URL, or malicious URL, and Kaspersky stays clean."
"I would like for users to have more control over the platform in the next release. Right now, the system is very central and general requiring new rules to be created that better-suite our requirements."
"SD-WAN functionality could be added."
"It could improve by showing DNS-specific information for connections to unknown public IPs."
"The application filtering and URL filtering could be better."
"It also offers compatibility with third-party security solutions, however, it is not a lot. This needs to be improved."
"Support is the main area that they need to improve. Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region. I would like a feature where there is a workflow to provide authorization to some users before they're able to create and apply rules. Such a feature should be integrated with the management. It should not be in the box that comes with it."
"Check Point could improve by enhancing the networking in their solution in order to align it with the existing network architecture."
"Even though the platform is simple, and creating security policies is a fairly quick task, creating a bulk of policies at once (ie. for a migration) could be a useful tool. This is probably possible through scripting, however, having an easy-to-use "import CSV" button would be beneficial."
"VirusTotal is hard to understand because you need to know Google Docs to create queries, and it doesn't have documentation for that."
"I would like to see an improved user interface and some automation."
"VirusTotal has predefined reports, but there is a lot of manual effort involved."
More Check Point Security Management Pricing and Cost Advice →
Check Point Security Management is ranked 2nd in Threat Intelligence Platforms with 55 reviews while VirusTotal is ranked 6th in Threat Intelligence Platforms with 3 reviews. Check Point Security Management is rated 8.8, while VirusTotal is rated 9.0. The top reviewer of Check Point Security Management writes "Great DDoS protection, high availability, and useful firewall rule implementation". On the other hand, the top reviewer of VirusTotal writes "A highly stable solution that can be used to manually investigate data leaks, compromised information, and malware". Check Point Security Management is most compared with Wazuh, Fortinet FortiAnalyzer, IBM Security QRadar, LogRhythm SIEM and Splunk Cloud Platform, whereas VirusTotal is most compared with Cuckoo Sandbox, Microsoft Defender for Endpoint, MetaDefender, ANY.RUN and Recorded Future. See our Check Point Security Management vs. VirusTotal report.
See our list of best Threat Intelligence Platforms vendors.
We monitor all Threat Intelligence Platforms reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.