We changed our name from IT Central Station: Here's why

Check Point Security Management vs vRealize Log Insight comparison

Cancel
You must select at least 2 products to compare!
Featured Review
Find out what your peers are saying about Check Point Security Management vs. vRealize Log Insight and other solutions. Updated: January 2022.
565,689 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Devo helps us to unlock the full power of our data because they have more than 450 parsers, which means that we can ingest pretty much any type of log data.""The ability to have high performance, high-speed search capability is incredibly important for us. When it comes to doing security analysis, you don't want to be doing is sitting around waiting to get data back while an attacker is sitting on a network, actively attacking it. You need to be able to answer questions quickly. If I see an indicator of attack, I need to be able to rapidly pivot and find data, then analyze it and find more data to answer more questions. You need to be able to do that quickly. If I'm sitting around just waiting to get my first response, then it ends up moving too slow to keep up with the attacker. Devo's speed and performance allows us to query in real-time and keep up with what is actually happening on the network, then respond effectively to events.""The user interface is really modern. As an end-user, there are a lot of possibilities to tailor the platform to your needs, and that can be done without needing much support from Devo. It's really flexible and modular. The UI is very clean.""The thing that Devo does better than other solutions is to give me the ability to write queries that look at multiple data sources and run fast. Most SIEMs don't do that. And I can do that by creating entity-based queries. Let's say I have a table which has Okta, a table which has G Suite, a table which has endpoint telemetry, and I have a table which has DNS telemetry. I can write a query that says, 'Join all these things together on IP, and where the IP matches in all these tables, return to me that subset of data, within these time windows.' I can break it down that way.""The real-time analytics of security-related data are super. There are a lot of data feeds going into it and it's very quick at pulling up and correlating the data and showing you what's going on in your infrastructure. It's fast. The way that their architecture and technology works, they've really focused on the speed of query results and making sure that we can do what we need to do quickly. Devo is pulling back information in a fast fashion, based on real-time events.""Even if it's a relatively technical tool or platform, it's very intuitive and graphical. It's very appealing in terms of the user interface. The UI has a graphically interface with the raw data in a table. The table can be as big as you want it, depending on your use case. You can easily get a report combining your data, along with calculations and graphical dashboards. You don't need a lot of training, because the UI is relatively very intuitive.""One of the biggest features of the UI is that you see the actual code of what you're doing in the graphical user interface, in a little window on the side. Whatever you're doing, you see the code, what's happening. And you can really quickly switch between using the GUI and using the code. That's really useful.""The user experience [is] well thought out and the workflows are logical. The dashboards are intuitive and highly customizable."

More Devo Pros →

"It has a central management log server that helps us to easily identify faults and issues in the environment, especially during outages and incidents during the implementation of policy rules.""The management API is the best new feature for me. It allows us to further automate our customers' automated server ordering.""It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution. Check Point is effective when it comes to security control and threat prevention.""The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other.""We love the ability to monitor performance in real-time, and gather critical information about network flows and traffic.""Having the possibility to use Smart Event to check for threats on a broader scale helps after a security incident and also makes it easier to check - instead of looking through different logs.""Mobile access has helped us cater to more than 4000 users so that they can work from home.""The solution is ideal for use and deployment in a large infrastructure environment."

More Check Point Security Management Pros →

"The interface of the solution is good.""It is very scalable and can handle a large workload.""The setup and installation are very easy."

More vRealize Log Insight Pros →

Cons
"We only use the core functionality and one of the reasons for this is that their security operation center needs improvement.""Some third-parties don't have specific API connectors built, so we had to work with Devo to get the logs and parse the data using custom parsers, rather than an out-of-the-box solution.""The Activeboards feature is not as mature regarding the look and feel. Its functionality is mature, but the look and feel is not there. For example, if you have some data sets and are trying to get some graphics, you cannot change anything. There's just one format for the graphics. You cannot change the size of the font, the font itself, etc.""One major area for improvement for Devo... is to provide more capabilities around pre-built monitoring. They're working on integrations with different types of systems, but that integration needs to go beyond just onboarding to the platform. It needs to include applications, out-of-the-box, that immediately help people to start monitoring their systems. Such applications would include dashboards and alerts, and then people could customize them for their own needs so that they aren't starting from a blank slate.""From our experience, the Devo agent needs some work. They built it on top of OS Query's open-source framework. It seems like it wasn't tuned properly to handle a large volume of Windows event logs. In our experience, there would definitely be some room for improvement. A lot of SIEMs on the market have their own agent infrastructure. I think Devo's working towards that, but I think that it needs some improvement as far as keeping up with high-volume environments.""Some basic reporting mechanisms have room for improvement. Customers can do analysis by building Activeboards, Devo’s name for interactive dashboards. This capability is quite nice, but it is not a reporting engine. Devo does provide mechanisms to allow third-party tools to query data via their API, which is great. However, a lot of folks like or want a reporting engine, per se, and Devo simply doesn't have that. This may or may not be by design.""Technical support could be better.""Devo has a lot of cloud connectors, but they need to do a little bit of work there. They've got good integrations with the public cloud, but there are a lot of cloud SaaS systems that they still need to work with on integrations, such as Salesforce and other SaaS providers where we need to get access logs."

More Devo Cons →

"In my experience, the place they can improve the most is in the technical support where I have had some serious problems that could not be solved in time due to a lack of knowledge of the assigned engineer.""I've found the solution was a bit unstable.""The graphical interface is nice but it is a bit heavy.""I would like to bind users to their network, as well as their local office machine.""The management API can be further developed so that all functions offered by the dashboard are also available via the API (for example, Network Topology).""It would be helpful if we could enable URL and application traffic control remote access.""Even though the platform is simple, and creating security policies is a fairly quick task, creating a bulk of policies at once (ie. for a migration) could be a useful tool. This is probably possible through scripting, however, having an easy-to-use "import CSV" button would be beneficial.""It would be great if the SmartView Monitor could become integrated into the SmartView Console Platform."

More Check Point Security Management Cons →

"It needs better integration with third-party analytics tools.""The pricing of the solution could be improved.""Log retention should have more options for user control."

More vRealize Log Insight Cons →

Pricing and Cost Advice
  • "We have an OEM agreement with Devo. It is very similar to the standard licensing agreement because we are charged in the same way as any other customer, e.g., we use the backroom."
  • "I'm not involved in the financial aspect, but I think the licensing costs are similar to other solutions. If all the solutions have a similar cost, Devo provides more for the money."
  • "Devo is definitely cheaper than Splunk. There's no doubt about that. The value from Devo is good. It's definitely more valuable to me than QRadar or LogRhythm or any of the old, traditional SIEMs."
  • "[Devo was] in the ballpark with at least a couple of the other front-runners that we were looking at. Devo is a good value and, given the quality of the product, I would expect to pay more."
  • "Be cautious of metadata inclusion for log types in pricing, as there are some "gotchas" with that."
  • "Devo was very cost-competitive... Devo did come with that 400 days of hot data, and that was not the case with other products."
  • "Our licensing fees are billed annually and per terabyte."
  • "I like the pricing very much. They keep it simple. It is a single price based on data ingested, and they do it on an average. If you get a spike of data that flows in, they will not stick it to you or charge you for that. They are very fair about that."
  • More Devo Pricing and Cost Advice →

  • "This product can be used for 25 security gateways on a basic license."
  • More Check Point Security Management Pricing and Cost Advice →

  • "The license cost for any other monitoring tool is too high compared to this product."
  • More vRealize Log Insight Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Log Management solutions are best for your needs.
    565,689 professionals have used our research since 2012.
    Questions from the Community
    Top Answer: 
    It's very, very versatile.
    Top Answer: 
    Devo, like other vendors, doesn't charge extra for playbooks and automation. That way, you are only paying for the side… more »
    Top Answer: 
    I need more empowerment in reporting. For example, when I'm using Qlik or Power BI in terms of reporting for the… more »
    Top Answer: 
    It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution… more »
    Top Answer: 
    Support is the main area that they need to improve. Our support experience is not very smooth. We are based in Africa… more »
    Top Answer: 
    We use it for both perimeter and internal defense.
    Ask a question

    Earn 20 points

    Comparisons
    Also Known As
    R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
    Learn More
    Overview

    Devo is the only cloud-native logging and security analytics platform that releases the full potential of all your data to empower bold, confident action when it matters most. Only the Devo platform delivers the powerful combination of real-time visibility, high-performance analytics, scalability, multitenancy, and low TCO crucial for monitoring and securing business operations as enterprises accelerate their shift to the cloud.

    R80.30 Cyber Security Management features centralized management control across all networks and cloud environments, increasing operational efficiency and lowering the complexity of managing your security. Learn more about Security Management.

    vRealize Log Insight delivers indexing and machine learning based Intelligent Grouping, to enable searching, for faster troubleshooting across physical, virtual and cloud environments. It help monitors and manages Machine Data at Scale through analyzing massive amounts of log data and delivers near real-time monitoring, search and log analytics, coupled with a dashboard for stored queries, reports and alerts. Speeds correlation of events across an entire IT environment. vRealize Log Insight creates Structure from Unstructured Data by collects and automatically identifies structure in all types of machine-generated log data (application logs, network traces, configuration files, messages, performance data, system state dumps, etc.) to build an index for performing analytics. And it offers a pricing model that includes unlimited data and does not require buying licenses based on peak usage and worst-case scenarios.
    Offer
    See Devo in Action

    See how Devo allows you to free yourself from data management, and make machine data and insights accessible.

    Learn more about Check Point Security Management
    Learn more about vRealize Log Insight
    Sample Customers
    United States Air Force, Rubrik, SentinelOne, Critical Start, NHL, Panda Security, Telefonica, CaixaBank, OpenText, IGT, OneMain Financial, SurveyMonkey, FanDuel, H&R Block, Ulta Beauty, Manulife, Moneylion, Chime Bank, Magna International, American Express Global Business Travel
    Hedgetec, Geiger
    Wildlands Adventure Zoo, Medic Mobile, IBM, Seventy Seven Energy, Baystate Health, Osis, Oxford University, Columbia University, Siemens, Cardinal Health, Ashdod Port, Vasakronan, Sydney Adventist Hospital, University of Derby
    Top Industries
    REVIEWERS
    Computer Software Company57%
    Comms Service Provider14%
    Retailer14%
    Insurance Company14%
    VISITORS READING REVIEWS
    Computer Software Company27%
    Comms Service Provider21%
    Government7%
    Financial Services Firm7%
    REVIEWERS
    Manufacturing Company38%
    Financial Services Firm19%
    Security Firm12%
    Comms Service Provider8%
    VISITORS READING REVIEWS
    Comms Service Provider31%
    Computer Software Company31%
    Financial Services Firm6%
    Manufacturing Company3%
    VISITORS READING REVIEWS
    Computer Software Company25%
    Comms Service Provider17%
    Government11%
    Financial Services Firm7%
    Company Size
    REVIEWERS
    Small Business14%
    Midsize Enterprise14%
    Large Enterprise71%
    VISITORS READING REVIEWS
    Small Business49%
    Midsize Enterprise15%
    Large Enterprise36%
    REVIEWERS
    Small Business12%
    Midsize Enterprise42%
    Large Enterprise45%
    REVIEWERS
    Small Business27%
    Midsize Enterprise45%
    Large Enterprise27%
    Find out what your peers are saying about Check Point Security Management vs. vRealize Log Insight and other solutions. Updated: January 2022.
    565,689 professionals have used our research since 2012.

    Check Point Security Management is ranked 5th in Log Management with 16 reviews while vRealize Log Insight is ranked 21st in Log Management with 2 reviews. Check Point Security Management is rated 9.2, while vRealize Log Insight is rated 7.6. The top reviewer of Check Point Security Management writes "Helps our security team create policies in a centralized way". On the other hand, the top reviewer of vRealize Log Insight writes "A log analysis and alerts system that is inexpensive compared to the competition". Check Point Security Management is most compared with Fortinet FortiAnalyzer, ELK Logstash, Wazuh, IBM QRadar and LogRhythm NextGen SIEM, whereas vRealize Log Insight is most compared with Splunk, ELK Logstash, Graylog, IBM QRadar and ManageEngine Log360. See our Check Point Security Management vs. vRealize Log Insight report.

    See our list of best Log Management vendors.

    We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.