We performed a comparison between Check Point Security Management and Datadog based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point Security Management is praised for its centralized management features, user-friendly interface, and extensive monitoring capabilities. Datadog users like its customizable displays, error tracking, and advanced AI/ML capabilities. Check Point Security Management could improve by simplifying the migration of security policies, optimizing performance, and expanding its management API. Other pain points include threat tracking and documentation. Datadog could enhance its usability and reduce its learning curve. Users said integration was another pain point.
Service and Support: Check Point Security Management's customer service is widely praised for being knowledgeable, supportive, and reliable. Although some users had problems with inexperienced agents and coordination issues, the overall support experience is positive. While many users spoke highly of Datadog’s support team, others reported slow support, especially in the Asia-Pacific region.
Ease of Deployment: Check Point Security Management is generally seen as easy to set up if the user has some expertise. Datadog’s setup is considered straightforward, and users often receive help from a partner or vendor.
Pricing: Check Point Security Management is seen as a solid investment, offering flexibility and a good value for the price. Opinions about Datadog's price are divided. Some users found it costly, but others thought it was acceptable. Some said the pricing model could be clearer and better explained.
ROI: Check Point users said the solution offers a steady ROI over time. Users said Datadog saved them time and improved visibility into security blind spots.
"The log dashboard in the SmartConsole is very useful and convenient for monitoring and tracking."
"Check Point has been very effective in terms of threat management and comprehensive protection against vulnerabilities, and it has given us confidence that our data is not going anywhere."
"The layered architecture is really understandable and easy to use."
"The solution is ideal for use and deployment in a large infrastructure environment."
"It's a great complete endpoint security solution that prevents the most imminent threats to the endpoint such as ransomware, phishing, or malware."
"The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration."
"The support is pretty incredible. Check Point has support rep programs that go all the way up to putting one of their own people in your business to help you. Then, they have support programs. If you're an expert, you just need to be able to download updated files and stuff. They have support programs like that, too."
"The rulebase management and the shared layers concept is implemented well."
"This spectrum of solutions has allowed us to track down bugs faster and more rapidly, which allows us to limit revenue lost during downtime."
"The most valuable aspect is the APM which can monitor the metrics and latencies."
"The visibility that it provides is valuable. It is helping in being proactive around incident management. It is helping us to be able to get more visibility into our customers' applications so that we can assist them at the application layer. We also provide them the infrastructure from an AWS standpoint. We are able to make sure that our customers are aware of certain critical things around the analytical piece of either the network or the application. We're able to call customers before they even know about the issue. From there, we can start putting together some change management processes and help them a bit."
"The most valuable aspect is for us to have everything in one place."
"Datadog's log aggregation is really helpful since it lets me and every other engineer on my team login, view, and share logs when we need to debug our application."
"Datadog has proven to be easy to set up and legible for both development and operational teams."
"The most valuable feature I have found is the elastic container service."
"They have a very good foundation in capturing metrics, logs, and traces. It's a very nice tool for that and it allows you to apply these monitoring tools in almost any technology."
"We sometimes have trouble with the performance of the solution. Maybe some performance tuning options could be added in a future release. There should be more visibility about which blade in your firewall is causing the latency."
"The upgrade procedure already made huge improvements, yet it remains more challenging compared to other products."
"It would be helpful if we could enable URL and application traffic control remote access."
"Check Point Security Management lacks some of the competitor features."
"Troubleshooting is quite complicated within multi-domain management. If an issue arises, the local administrator has to keep in mind that there are other domains that could be also affected."
"You need some technical expertise to use the solution. I don't think it's accessible to the typical end-user. You need to access the box and use some command lines or the web interface. It would be nice to have a user-friendly dashboard and comprehensive reporting."
"The web administration tool that allows administration in the browser must be developed even more."
"I like that the Compliance software blade is available for free with the Security Management server purchase, but it is free for only one year - after that you have to buy an additional license to continue using it. I think such an important feature is vital for the management server, and should not be licensed separately."
"One thing we have run into is that it is so easy to add monitoring that we turn on things without really understanding the costs."
"We need a lot of modules since we collect all data logs from all operating systems."
"It could use some additional features when working with metrics like Grafana or like New Relic has. Datadog does not use library technologies like Dynatrace does. Datadog has machine learning too, but it does not have this option in all layers of monitoring like infrastructure service process in applications."
"At the beginning, when we started throwing logs at it, there was a bit of hiccup. However, this was during their beta period, so hiccups were expected."
"I'm not sure what kind of features are in the roadmap right now, but I encourage the development of features for defining your organization, and allowing the visibility of what kind of metrics you can get. Those features would be really useful for us."
"Since the Datadog platform has so many separate features, solving so many use cases, there are often inconsistencies in feature availability and interoperability between products."
"The way data is represented can be limiting. When I first tried it out a long time ago, you could graph a metric and another metric, and they'd overlay, but you couldn't take the ratio between the two."
"Lacks some flexibility in the customization."
More Check Point Security Management Pricing and Cost Advice →
Check Point Security Management is ranked 9th in Log Management with 55 reviews while Datadog is ranked 3rd in Log Management with 137 reviews. Check Point Security Management is rated 8.8, while Datadog is rated 8.6. The top reviewer of Check Point Security Management writes "Great DDoS protection, high availability, and useful firewall rule implementation". On the other hand, the top reviewer of Datadog writes "Very good RUM, synthetics, and infrastructure host maps". Check Point Security Management is most compared with Wazuh, Fortinet FortiAnalyzer, IBM Security QRadar, LogRhythm SIEM and ArcSight Logger, whereas Datadog is most compared with Dynatrace, Azure Monitor, New Relic, AWS X-Ray and Elastic Observability. See our Check Point Security Management vs. Datadog report.
See our list of best Log Management vendors.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.