Check Point Security Management vs Fortinet FortiAnalyzer comparison

Cancel
You must select at least 2 products to compare!
Check Point Software Technologies Logo
2,206 views|1,075 comparisons
98% willing to recommend
Fortinet Logo
9,888 views|5,537 comparisons
90% willing to recommend
Comparison Buyer's Guide
Executive Summary
Updated on Jul 23, 2023

We compared Check Point Security Management and Fortinet FortiAnalyzer based on our users' reviews in five categories. We reviewed all of the data and you can find the conclusion below.

  • Features: Check Point Security Management is praised for its centralized management features, user-friendly interface, and extensive monitoring capabilities. Fortinet FortiAnalyzer features exceptional log collection capabilities and customizable reporting. FortiAnalyzer enables users to centrally manage and analyze logs in real time. Check Point Security Management could improve by simplifying the migration of security policies, optimizing performance, and expanding its management API. Other pain points include threat tracking and documentation. Fortinet FortiAnalyzer could simplify its reporting module and cloud storage capabilities.

  • Service and Support: Check Point Security Management's customer service is widely praised for being knowledgeable, supportive, and reliable. Although some users had problems with inexperienced agents and coordination issues, the overall support experience is positive. Some Fortinet customers were dissatisfied with support, but others said it was helpful and responsive.

  • Ease of Deployment: Check Point Security Management is generally seen as easy to set up if the user has some expertise. FortiAnalyzer's initial setup is uncomplicated and manageable, typically taking approximately 30 minutes to a few hours. Some IT knowledge may be required.

  • Pricing: Check Point Security Management is seen as a solid investment, offering flexibility and a good value for the price. While FortiAnalyzer isn't the most expensive option, users say the pricing could be more competitive. FortiAnalyzer's cost depends on the storage requirements, and many customers consider it reasonable.

  • ROI: Check Point users said the solution offers a steady ROI over time. FortiAnalyzer helps customers by providing insight into network traffic and speeding up issue resolution.

Conclusion: Users appreciate Check Point's extensive security features, automatic updates, centralized access, and excellent visibility and accessibility. On the other hand, Fortinet FortiAnalyzer receives criticism for its pricing, technical support, integration capabilities, user interface, and performance. In conclusion, Check Point Security Management offers a more efficient and comprehensive network security management solution.
To learn more, read our detailed Check Point Security Management vs. Fortinet FortiAnalyzer Report (Updated: April 2024).
771,157 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It provides for capabilities and has allowed us to be more scalable.""Mobile access has helped us cater to more than 4000 users so that they can work from home.""The rulebase management and the shared layers concept is implemented well.""We love the ability to monitor performance in real-time, and gather critical information about network flows and traffic.""As the security administrator, who is responsible for the day-to-day tasks (e.g. creating new firewall rules, monitoring the security alerts and incidents etc.) and the maintenance (e.g. installing the new Jumbo Hotfixes), I find the Check Point Security Management R80.10 to be the great solution.""It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering.""Check Point Security Management Server offers a wide range of security features, including firewall, intrusion prevention, VPN, application control, and threat prevention capabilities.""The reporting system provides real-time insights into the security situation and shows measures that can be taken to protect our data."

More Check Point Security Management Pros →

"The most valuable is its robust and comprehensive reporting functionality, providing a thorough overview of various metrics.""We have the most data visibility.""The ability to gather all gateway information and logs in a single location is the most valuable feature.""Storage in SSD helps in generating customized reports.""The user interface is good and it is quite easy to use.""The program is stable and it gives me great visibility.""Special notifications about compromised phones are valuable because we have some guest networks, and sometimes, people are connecting phones that are connected to compromised websites. We want to be informed about it. We sometimes have some cases where we want to analyze the connection from inside to outside ports. So, it helps with a lot of things. It depends on our needs.""The most valuable feature of Fortinet FortiAnalyzer is its performance."

More Fortinet FortiAnalyzer Pros →

Cons
"In order to work management console, you need some good appliance or you need to provide more CPU and Memory to the appliance.""Even though the platform is simple, and creating security policies is a fairly quick task, creating a bulk of policies at once (ie. for a migration) could be a useful tool. This is probably possible through scripting, however, having an easy-to-use "import CSV" button would be beneficial.""In future releases I'd like to see better integration with other applications and solutions. Also, the cost of the license is too high, it's too expensive.""Among the things that I would like in the future is for the solution to have its application on Android and iOS, as many of the administrators have adopted remote administration positions due to what has happened since the pandemic. This would help us to have an easier and simpler administration.""The web administration tool that allows administration in the browser must be developed even more.""Sometimes the security system slows down when it is overloaded.""I would like it to be the administrator of equipment or Next Generation firewalls (which have to be managed on this platform) and to be able to manage other services (like Harmony) that also belong to Check Point.""We sometimes have trouble with the performance of the solution. Maybe some performance tuning options could be added in a future release. There should be more visibility about which blade in your firewall is causing the latency."

More Check Point Security Management Cons →

"From my point of view, at this time, the solution isn't lacking any features or functionalities.""There are a lot of solutions on the market and Fortinet FortiAnalyzer is limited. It cannot be used across multiple vendors. They can improve by advancing their technology.""The solution lacks business intelligence features. It's much too basic.""I'm looking for something more efficient to analyze different foreign things. That's why FortiSIEM could compete with FortiAnalyzer.""Fortinet FortiAnalyzer should come bundled with other Fortinet solutions. Additionally, the performance and updates could improve. They need to test their updates better so there are not as many bugs.""The solution could use more graphics and be more specific in the dashboard. This way, I'm able to understand everything and effectively understand what's going on, including what's incoming and outgoing. Right now, I have to look up everything. I need a dashboard so that I can see specific items right there in one place.""The pricing could be better. They could work to make it more competitive on the market.""The solution could improve by allowing the ability to search logs in integrated solutions."

More Fortinet FortiAnalyzer Cons →

Pricing and Cost Advice
  • "Do the homework because Check Point is rather expensive."
  • "This product can be used for 25 security gateways on a basic license."
  • "Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
  • "The solution is expensive and there is an annual license."
  • "Price-wise, it is an expensive solution."
  • "The solution is expensive."
  • "The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
  • More Check Point Security Management Pricing and Cost Advice →

  • "Its worth spending on FortiAnalyzer if you have multiple firewalls in your network."
  • "The hardware cost and services contract are fair."
  • "​It depends upon the company.​"
  • "The cost and pricing should be in accordance with the calculation of log storage capacity for a time period required for historical analysis."
  • "All Fortinet programs come at a good price."
  • "We have several products including Fortinet Wireless, FortiGate Firewalls, and FortiAnalyzer, which are bundled together and cost approximately $50,000 USD annually."
  • "We have around 12 devices and yearly we spend approximately $14,000."
  • "The price is quite expensive. Fortinet products are very expensive. That is something which they should also look at, because if you compare Fortinet product to, say, Sophos for example, Fortinet is really high and that's the only thing which is a drawback for most users."
  • More Fortinet FortiAnalyzer Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Log Management solutions are best for your needs.
    771,157 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as… more »
    Top Answer:Check Point EDR has room for improvement, especially in the area of Data Loss Prevention where it currently lacks functionality. I'd also like to see enhancements in content filtering and… more »
    Top Answer:We utilize Check Point Security Management for our daily security operations, including managing firewall rules, reviewing alerts, and generating reports on a weekly basis.
    Top Answer:The reporting features, which offer customization, real-time insights, and compliance support, are particularly noteworthy aspects.
    Top Answer:The pricing model is subscription-based. It involves payment for both the license and ongoing support. I would rate it seven out of ten.
    Top Answer:It would be beneficial to enhance the streamlining of the generation of automated reports related to compliance, such as PCI DSS or HIPAA, based on the logs collected. Automated reports focusing on… more »
    Ranking
    9th
    out of 95 in Log Management
    Views
    2,206
    Comparisons
    1,075
    Reviews
    29
    Average Words per Review
    479
    Rating
    9.0
    8th
    out of 95 in Log Management
    Views
    9,888
    Comparisons
    5,537
    Reviews
    38
    Average Words per Review
    415
    Rating
    8.0
    Comparisons
    Also Known As
    R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
    Learn More
    Overview

    Check Point Security Management is an advanced security management platform for enterprises. The platform integrates all aspects of security. A single platform manages the entire infrastructure, from data centers to private/public cloud deployments.

    Check Point Security Management is a reliable and easy-to-use security platform. It integrates all aspects of your security environment to strengthen the security posture without impairing productivity. The system has a layered policy model. This means the security policy can be separated into layers for network segmentation. Different administrators can manage different policies. The policy layer automates the tasks.

    The platform is extensible, scalable, and integrates easily with orchestration systems and change management.

    Basic Components of the Infrastructure

    1. Smart Console: The Check Point Graphical User Interface for connecting and managing Security Management Servers. The smart console provides an integrated solution via the following features:


    • Security policy management
    • System health monitoring
    • Multi-domain management


    The smart console offers several advantages. Changes in security policies and logs can be done with a click. You can navigate from an item within a log to the policy. There are also built-in multi-language support and accessibility features.

    1. Security Management Server: The server manages security gateways with set security policies and monitors security events on the network.

      The automation server is an integrated part of the management server. The API server is active by default on servers with 4 GB of RAM or more and on standalone servers with 8 or more GB of RAM.

      The automation server communicates with the management server the same way as the Smart Console. This architecture allows the same validation errors and warnings to be presented when using an automation session.

      The same audit logs generated using the Smart Console are also generated using an automation session. If you have a multi-domain environment, there is only one automation server that monitors all the IP addresses of the multi-domain management server.

      2. Security Gateway is placed at the edge of the network. It monitors and filters traffic and enforces security policies.

        Logging, Event management, and Monitoring

        With Check Point Security Management, logging, reporting, event management, and monitoring are integrated. The platform features widgets and chart templates that optimize visibility. One of the best features is the one-click exploration. This simplifies going from a general overview to specific event details.

        Benefits of Check Point Security Management

        • The platform keeps pace with dynamic network changes
        • Helps align security with business goals
        • Helps with threat prevention.
        • Reduces operational costs

        The unified console also means a single policy for users, data, applications, and networks. The granularity control helps accelerate administration processes. This feature, together with automation, is key to achieving reduced operational overhead. Security teams can automate tasks and even create self-service security web portals with the Check Point Security Management platform.

        Threat management is fully integrated, with reporting, logging, and monitoring all in one dashboard. This provides full visibility into the security of the network.

        Security Management Suite

        The Security Management Suite consists of the following modules:

        • Policy Management: Includes central management of different security policies across multiple domains and browser-based security management.
        • Operations Management: Includes compliance, provisioning, workflow automation, and user directory centralization.
        • Threat Management: Includes centralizing security event correlation for enforcement points. Centrally monitors Check Point devices.

        Reviews from Real Users

        A Network Security Engineer/Architect at a tech services company says, "The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other."

        "The management API is the best new feature for me. It allows us to further automate our customers' automated server ordering," says a System Engineer Network & Security at OTTO GmbH & Co KG.

        A Senior Infrastructure Services Specialist at St.George Bank Limited adds that "The solution is ideal for use and deployment in a large infrastructure environment."





        Fortinet FortiAnalyzer is a powerful platform used for log management, analytics, and reporting. The solution is designed to provide organizations with automation, single-pane orchestration, and response for simplified security operations, as well as proactive identification and remediation of risks and complete visibility of the entire attack surface.

        Fortinet FortiAnalyzer Features

        Fortinet FortiAnalyzer has many valuable key features. Some of the most useful ones include:

        • Advanced threat detection capabilities
        • Centralized security analytics
        • End-to-end security posture awareness
        • Integration with FortiGate NGFWs, FortiClient, FortiSandbox, FortiWeb, and FortiMail
        • Incident detection and response
        • Playbook automation
        • Event management
        • Security services
        • Analytics and reporting

        Fortinet FortiAnalyzer Benefits

        There are many l benefits to implementing Fortinet FortiAnalyzer. Some of the biggest advantages the solution offers include:

        • Flexible deployment options
        • Enterprise-grade high availability
        • Security automation to reduce complexity, leveraging REST API, scripts, connectors, and automation stitches
        • Multi-tenancy solution with quota management, leveraging (ADOMs) to separate customer data and manage domains for operational effectiveness and compliance

        Reviews from Real Users

        Below are some reviews and helpful feedback written by PeerSpot users currently using the Fortinet FortiAnalyzer solution.

        PeerSpot user Imad A., Group IT Manager at a manufacturing company, says, “You can monitor all appliances from a centralized location. You have a front dashboard for all our operations and all the logs. If you need to search for anything you can just dig deep into the logs. The solution offers excellent customizable reports. In our case, we needed a monthly report of all internet consumption, and we were able to easily create this.” He goes on to add, “There are pre-defined templates. The logs cover any question or need that we populate within these templates. However, you can also build your own template. There is great analytics that can be used in different departments. For example, our marketing department can go more into media patterns and not just into browsing patterns. Everything is easily visible and can be tracked and studied.”

        Luis G., Systems Architect at Zentius, mentions, “Log collection is the most valuable [feature]. The UI looks great. It has a very good look and feel. We don't have the need to use solid state drives. We use mechanic drives, and we don't see any performance issues, so basically, it is doing fine.”

        Rupsan S., Technical Presales Engineer at Dristi Tech Pvt.ltd., comments, "The feature that I have found the most valuable is to be able to see everything in our network in a single task. A single menu and the graphical bar charts that it provides to give insights are very useful. It also gives very good metrics on bandwidth utilization, CPU, and device performance. It is very simple and easy to use as well."

        Dilip S., Regional Head at Mass Infonet (P) Ltd., explains, “With FortiAnalyzer, you can see what the user is doing and what sites he goes to. You can also see how much quota there is and how much (size-wise) you want to hit, as well as what the incoming or outbound traffic is, and if it is through the ISP or not. Basically, you can see absolutely all activity using FortiAnalyzer. The solution is very complete. The product is very simple to use. It's regularly updated with many versions constantly adding more content and information. The solution has sandboxing, IPS, and DPS as well. The solution allows for a lot of customization.”

        Sample Customers
        Hedgetec, Geiger
        General Directorate of Information Technology
        Top Industries
        REVIEWERS
        Manufacturing Company19%
        Security Firm16%
        Financial Services Firm14%
        Computer Software Company10%
        VISITORS READING REVIEWS
        Security Firm13%
        Computer Software Company13%
        Comms Service Provider9%
        Government8%
        REVIEWERS
        Comms Service Provider19%
        Manufacturing Company15%
        Computer Software Company15%
        Financial Services Firm13%
        VISITORS READING REVIEWS
        Computer Software Company18%
        Government8%
        Comms Service Provider8%
        Manufacturing Company7%
        Company Size
        REVIEWERS
        Small Business34%
        Midsize Enterprise28%
        Large Enterprise38%
        VISITORS READING REVIEWS
        Small Business37%
        Midsize Enterprise15%
        Large Enterprise48%
        REVIEWERS
        Small Business51%
        Midsize Enterprise22%
        Large Enterprise27%
        VISITORS READING REVIEWS
        Small Business28%
        Midsize Enterprise21%
        Large Enterprise51%
        Buyer's Guide
        Check Point Security Management vs. Fortinet FortiAnalyzer
        April 2024
        Find out what your peers are saying about Check Point Security Management vs. Fortinet FortiAnalyzer and other solutions. Updated: April 2024.
        771,157 professionals have used our research since 2012.

        Check Point Security Management is ranked 9th in Log Management with 55 reviews while Fortinet FortiAnalyzer is ranked 8th in Log Management with 85 reviews. Check Point Security Management is rated 8.8, while Fortinet FortiAnalyzer is rated 8.0. The top reviewer of Check Point Security Management writes "Great DDoS protection, high availability, and useful firewall rule implementation". On the other hand, the top reviewer of Fortinet FortiAnalyzer writes "We can automate event-based handling solutions, is stable, and is great for heavy traffic". Check Point Security Management is most compared with Wazuh, IBM Security QRadar, LogRhythm SIEM, Splunk Cloud Platform and Graylog, whereas Fortinet FortiAnalyzer is most compared with Wazuh, Splunk Enterprise Security, Graylog, Grafana Loki and IBM Security QRadar. See our Check Point Security Management vs. Fortinet FortiAnalyzer report.

        See our list of best Log Management vendors.

        We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.