We compared Check Point Security Management and IBM Security QRadar based on our users' reviews in five categories. We reviewed all of the data, and you can find the conclusion below.
Features: Check Point Security Management is praised for its centralized management features, user-friendly interface, and extensive monitoring capabilities. QRadar users say the solution provides extensive information and helpful leads for locating pertinent data. QRadar stands out with its comprehensive network visibility and strong SIEM capabilities. Check Point Security Management could improve by simplifying the migration of security policies, optimizing performance, and expanding its management API. Other pain points include threat tracking and documentation. QRadar could improve its rule deployment and lower its false positive rate. Users would also like expanded storage capacity, streamlined user management, and a more mature architecture.
Service and Support: Check Point Security Management's customer service is widely praised for being knowledgeable, supportive, and reliable. Although some users had problems with inexperienced agents and coordination issues, the overall support experience is positive. Some QRadar customers have had trouble connecting with knowledgeable support staff and experienced delayed responses.
Ease of Deployment: Check Point Security Management is generally seen as easy to set up if the user has some expertise. QRadar's initial setup can be complex for users without expertise, and the difficulty may vary depending on the size of the data set.
Pricing: Check Point Security Management is seen as a solid investment, offering flexibility and a good value for the price. QRadar can be costly because users need to buy new hardware to upgrade.
ROI: Check Point users said the solution offers a steady ROI over time. QRadar delivers a high return on investment, improving security through its advanced user behavior analytics.
"The solution is easy to use and comes with few vulnerabilities. You don't have to worry about release upgrades. Life cycle management is very easy."
"It provides for capabilities and has allowed us to be more scalable."
"The most valuable feature for me is Identity Awareness."
"With the generation and review of logs, we have verified some vulnerabilities and attempted attacks to generate improvements in our infrastructure and policies to help avoid issues in the future."
"Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it."
"The unique management using Smart Console for all firewalls is very useful."
"The layered architecture is really understandable and easy to use."
"The cluster solution made our job easier any fault to the device will not halt entire internet connectivity."
"I have found IBM QRadar to be stable."
"Search capabilities are sufficient for most tasks."
"The ability to add extensions is the most valuable feature. For example, extensions that provide valuable test ports."
"The simplicity of the solution is the best feature."
"The tool is already automated in many ways, but there are some additional functions which should be automated, like sending an email, mobile notification, and integration of XFS."
"The threat protection network is the most valuable feature, because when you get an offense, you can actually trace it back to where it originated from, how it originated, and why."
"IBM Qradar's ability to simplify the number of events, not only on a technical level but by making that information easy to pan through the orchestration deduplication. It is very impressive given that we have hundreds of devices that send event logs through."
"I have found its network traffic log, network bit log, and QBI most valuable."
"For those not familiar with the Command Line interface, there should be an option in the GUI for operating backups."
"Even though the platform is simple, and creating security policies is a fairly quick task, creating a bulk of policies at once (ie. for a migration) could be a useful tool. This is probably possible through scripting, however, having an easy-to-use "import CSV" button would be beneficial."
"Some costs are ridiculously high."
"It also offers compatibility with third-party security solutions, however, it is not a lot. This needs to be improved."
"Support is the main area that they need to improve. Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region. I would like a feature where there is a workflow to provide authorization to some users before they're able to create and apply rules. Such a feature should be integrated with the management. It should not be in the box that comes with it."
"I guess it lacks in providing visibility of the many incidents."
"SD-WAN functionality could be added."
"It would be helpful if we could enable URL and application traffic control remote access."
"The solution is highly used here in Pakistan and in many sectors, they could improve it by having more SIEM connectors."
"The implementation and configuration are not easy."
"The released patch quality is poor. IBM should test those patches on their side, not on the client's side."
"From a functionality point of view there are issues sometimes."
"Do your research before implementing it, because it is tough to implement."
"IBM QRadar Advisor with Watson could be more user-friendly. You need some skills and understanding of what you're looking at, especially if you're going to draw down specific information."
"Needs better visualization options beyond the time series charts and a few other options that they have."
"You can scale IBM QRadar User Behavior Analytics, but it has room for improvement."
More Check Point Security Management Pricing and Cost Advice →
Check Point Security Management is ranked 10th in Log Management with 56 reviews while IBM Security QRadar is ranked 6th in Log Management with 198 reviews. Check Point Security Management is rated 8.8, while IBM Security QRadar is rated 8.0. The top reviewer of Check Point Security Management writes "Great DDoS protection, high availability, and useful firewall rule implementation". On the other hand, the top reviewer of IBM Security QRadar writes "A highly stable and scalable solution that provides good technical support". Check Point Security Management is most compared with Wazuh, Fortinet FortiAnalyzer, LogRhythm SIEM, Splunk Cloud Platform and Graylog, whereas IBM Security QRadar is most compared with Splunk Enterprise Security, Microsoft Sentinel, Wazuh, LogRhythm SIEM and Elastic Security. See our Check Point Security Management vs. IBM Security QRadar report.
See our list of best Log Management vendors.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.