We performed a comparison between Check Point Security Management and Elastic Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point Security Management is praised for its centralized management features, user-friendly interface, and extensive monitoring capabilities. Elastic Security is commended for its adaptability, extensive customization options, and seamless integration with the ELK Stack. Check Point Security Management could improve by simplifying the migration of security policies, optimizing performance, and expanding its management API. Other pain points include threat tracking and documentation. Elastic Security could improve by reducing resource usage, automating threat response, and simplifying the user experience.
Service and Support: Check Point Security Management's customer service is widely praised for being knowledgeable, supportive, and reliable. Although some users had problems with inexperienced agents and coordination issues, the overall support experience is positive. Some Elastic Security users found their support helpful, while others experienced difficulties and delays.
Ease of Deployment: Check Point Security Management is generally seen as easy to set up if the user has some expertise. Elastic Security generally has a straightforward setup but may require trained specialists.
Pricing: Check Point Security Management is seen as a solid investment, offering flexibility and a good value for the price. Elastic Security is considered affordable and cost-effective, with pricing based on the size of the monitored environment.
ROI: Check Point users said the solution offers a steady ROI over time. Elastic Security has shown mixed results in terms of ROI, with some users expressing concerns about the quality of their premium support.
"The rulebase management and the shared layers concept is implemented well."
"HA Structure provides good coverage and works fine."
"The control is granular, so you can set policy profiles for different organizational profiles."
"Mobile access has helped us cater to more than 4000 users so that they can work from home."
"Regarding the tool's valuable features, I would say that Check Point is a very accessible and fast tool, especially when dealing with logs for the first time."
"The unique management using Smart Console for all firewalls is very useful."
"Check Point Security Management Server offers a wide range of security features, including firewall, intrusion prevention, VPN, application control, and threat prevention capabilities."
"Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it."
"Elastic has a lot of beats, such as Winlogbeat and Filebeat. Beats are the agents that have to be installed on the terminals to send the data. When we install beats or Elastic agents on every terminal, they don't overload the terminals. In other SIEM solutions such as Splunk or QRadar, when beats or agents are installed on endpoints, they are very heavy for the terminals. They consume a lot of power of the terminals, whereas Elastic agents hardly consume any power and don't overload the terminals."
"The performance is good and it is faster than IBM QRadar."
"Elastic is straightforward, easy to integrate, and highly customizable."
"The most valuable feature is the speed, as it responds in a very short time."
"It's a good platform and the very best in the current market. We looked at the Forester report from December 2022 where it was said to be a leader."
"What customers found most valuable in Elastic Security feature-wise is the search capability, in particular, the way of writing the search query and the speed of searching for results."
"The most valuable features are the speed, detail, and visualization. It has the latest standards."
"The most valuable feature is the search function, which allows me to go directly to the target to see the specific line a customer is searching for."
"Among the things that I would like in the future is for the solution to have its application on Android and iOS, as many of the administrators have adopted remote administration positions due to what has happened since the pandemic. This would help us to have an easier and simpler administration."
"Some of the configuration elements could be improved."
"It could improve by showing DNS-specific information for connections to unknown public IPs."
"In the last version from 80.20, there are some issues around SSNA Diction. I would like this to be improved."
"It also offers compatibility with third-party security solutions, however, it is not a lot. This needs to be improved."
"In my experience, the place they can improve the most is in the technical support where I have had some serious problems that could not be solved in time due to a lack of knowledge of the assigned engineer."
"Check Point could improve by enhancing the networking in their solution in order to align it with the existing network architecture."
"Being a security appliance, there should be the ability for the Security Management server to send email alerts via authenticated email."
"I would like the process of retrieving archived data and viewing it in Kibana to be simplified."
"They don't provide user authentication and authorisation features (Shield) as a part of their open-source version."
"Elastic Security has a steep learning curve, so it takes some time to tune it and set it up for your environment. There are some costs associated with logging things that don't have value. So you need to be cautious to only log things that make sense and keep them around for as long as you need. You shouldn't hold onto things just because you think you might need them."
"It could use maybe a little more on the Linux side."
"With Elastic Security, the challenge arises from the fact that there is a learning curve in relation to queries and understanding the query language provided to extract usable data."
"With Elastic, you have to build the use cases for the specific requirement. Other products have a simple integration and more use cases to integrate out-of-the-box solutions for SIEM."
"The tool needs to integrate with legacy servers. Big companies can have legacy servers that may not always be updated."
"The process of designing dashboards is a little cumbersome in Kibana. Unless you are an expert, you will not be able to use it. The process should be pretty straightforward. The authentication feature is what we are looking for. We would love to have a central authentication system in the open-source edition without the need for a license or an enterprise license. If they can give at least a simple authentication system within a company. In a large organization, authentication is very essential for security because logs can contain a lot of confidential data. Therefore, an authentication feature for who accesses it should be there."
More Check Point Security Management Pricing and Cost Advice →
Check Point Security Management is ranked 9th in Log Management with 55 reviews while Elastic Security is ranked 5th in Log Management with 59 reviews. Check Point Security Management is rated 8.8, while Elastic Security is rated 7.6. The top reviewer of Check Point Security Management writes "Great DDoS protection, high availability, and useful firewall rule implementation". On the other hand, the top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". Check Point Security Management is most compared with Wazuh, Fortinet FortiAnalyzer, IBM Security QRadar, LogRhythm SIEM and Splunk Cloud Platform, whereas Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint. See our Check Point Security Management vs. Elastic Security report.
See our list of best Log Management vendors.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.