We performed a comparison between Check Point Security Management and Datadog based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point Security Management is praised for its centralized management features, user-friendly interface, and extensive monitoring capabilities. Datadog users like its customizable displays, error tracking, and advanced AI/ML capabilities. Check Point Security Management could improve by simplifying the migration of security policies, optimizing performance, and expanding its management API. Other pain points include threat tracking and documentation. Datadog could enhance its usability and reduce its learning curve. Users said integration was another pain point.
Service and Support: Check Point Security Management's customer service is widely praised for being knowledgeable, supportive, and reliable. Although some users had problems with inexperienced agents and coordination issues, the overall support experience is positive. While many users spoke highly of Datadog’s support team, others reported slow support, especially in the Asia-Pacific region.
Ease of Deployment: Check Point Security Management is generally seen as easy to set up if the user has some expertise. Datadog’s setup is considered straightforward, and users often receive help from a partner or vendor.
Pricing: Check Point Security Management is seen as a solid investment, offering flexibility and a good value for the price. Opinions about Datadog's price are divided. Some users found it costly, but others thought it was acceptable. Some said the pricing model could be clearer and better explained.
ROI: Check Point users said the solution offers a steady ROI over time. Users said Datadog saved them time and improved visibility into security blind spots.
"It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering."
"As the security administrator, who is responsible for the day-to-day tasks (e.g. creating new firewall rules, monitoring the security alerts and incidents etc.) and the maintenance (e.g. installing the new Jumbo Hotfixes), I find the Check Point Security Management R80.10 to be the great solution."
"The log dashboard in the SmartConsole is very useful and convenient for monitoring and tracking."
"The reporting system provides real-time insights into the security situation and shows measures that can be taken to protect our data."
"The most valuable feature of Check Point Security Management is the high level of visibility"
"The compliance is great."
"This solution is easy to install and deploy. It is also user-friendly."
"The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration."
"The most valuable feature of Datadog is its logs."
"I don't have to worry about upgrades with the AWS version."
"Using the data, our operation teams works with the dashboards to get their statistics, analytics, etc."
"Datadog is easy to use and easy to deploy. It's a better solution compared to others on the market in terms of being budget friendly for our customers."
"The application performance monitoring is pretty good."
"Even if we don't end up using Datadog, it revealed problems and optimizations to us that weren't obvious before."
"Having a wealth of information has helped us investigate outages, and having historical data helps us tune our system."
"I like that you can build out a dashboard pretty quickly. There are some things that come out of the box that you don't really need to do, which is great because they're default settings."
"In my experience, the place they can improve the most is in the technical support where I have had some serious problems that could not be solved in time due to a lack of knowledge of the assigned engineer."
"Sometimes the security system slows down when it is overloaded."
"Policy installation time can be reduced."
"There is room for improvement in reliability."
"The usability of the solution could be improved."
"If the SmartView monitor can be integrated in the R80.40 and R81 versions, that would be ideal in understanding the trends and graphs of how traffic is observed hitting the different Check Point Firewall Gateways that the Security Management controls."
"I guess it lacks in providing visibility of the many incidents."
"Being a security appliance, there should be the ability for the Security Management server to send email alerts via authenticated email."
"We need more integration with security tools like Drata."
"I would love to see support for front-end and mobile applications. Right now, it is mostly all back-end stuff. Being able to do some integration with our front-end products would be awesome."
"We need to learn more about the session reply feature inside of DD."
"Could be a little more user friendly."
"There is occasional UI slowness and bugs."
"At times, it can be hard to generate metrics out of logs."
"It seems that admin cost control granularity is an afterthought."
"The current way accounts are billed could be vastly improved - especially when involving multiple organizations across multiple accounts in combination with reserved commitments."
More Check Point Security Management Pricing and Cost Advice →
Check Point Security Management is ranked 9th in Log Management with 55 reviews while Datadog is ranked 2nd in Log Management with 136 reviews. Check Point Security Management is rated 8.8, while Datadog is rated 8.6. The top reviewer of Check Point Security Management writes "Great DDoS protection, high availability, and useful firewall rule implementation". On the other hand, the top reviewer of Datadog writes "Very good RUM, synthetics, and infrastructure host maps". Check Point Security Management is most compared with Wazuh, Fortinet FortiAnalyzer, IBM Security QRadar, LogRhythm SIEM and VMware Aria Operations for Logs, whereas Datadog is most compared with Dynatrace, Azure Monitor, New Relic, AWS X-Ray and AppDynamics. See our Check Point Security Management vs. Datadog report.
See our list of best Log Management vendors.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.