Check Point Security Management vs Datadog comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary
Updated on Jul 23, 2023

We performed a comparison between Check Point Security Management and Datadog based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.

  • Features: Check Point Security Management is praised for its centralized management features, user-friendly interface, and extensive monitoring capabilities. Datadog users like its customizable displays, error tracking, and advanced AI/ML capabilities. Check Point Security Management could improve by simplifying the migration of security policies, optimizing performance, and expanding its management API. Other pain points include threat tracking and documentation.  Datadog could enhance its usability and reduce its learning curve. Users said integration was another pain point.

  • Service and Support: Check Point Security Management's customer service is widely praised for being knowledgeable, supportive, and reliable. Although some users had problems with inexperienced agents and coordination issues, the overall support experience is positive. While many users spoke highly of Datadog’s support team, others reported slow support, especially in the Asia-Pacific region.

  • Ease of Deployment: Check Point Security Management is generally seen as easy to set up if the user has some expertise. Datadog’s setup is considered straightforward, and users often receive help from a partner or vendor.

  • Pricing: Check Point Security Management is seen as a solid investment, offering flexibility and a good value for the price. Opinions about Datadog's price are divided. Some users found it costly, but others thought it was acceptable. Some said the pricing model could be clearer and better explained.

  • ROI: Check Point users said the solution offers a steady ROI over time. Users said Datadog saved them time and improved visibility into security blind spots.

Conclusion: Users find Datadog's initial setup to be easy, straightforward, and efficient, while Check Point Security Management can be complex during deployment. Datadog offers a wide range of valuable features such as dashboards, reporting, error reporting, log centralization, and a user-friendly interface with integrations. Users have mixed experiences with the pricing and licensing of Datadog, while Check Point Security Management is considered high but worth it. Both products have positive ROI and customer service, but Datadog consistently receives more praise in these areas.
To learn more, read our detailed Check Point Security Management vs. Datadog Report (Updated: March 2024).
765,386 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering.""As the security administrator, who is responsible for the day-to-day tasks (e.g. creating new firewall rules, monitoring the security alerts and incidents etc.) and the maintenance (e.g. installing the new Jumbo Hotfixes), I find the Check Point Security Management R80.10 to be the great solution.""The log dashboard in the SmartConsole is very useful and convenient for monitoring and tracking.""The reporting system provides real-time insights into the security situation and shows measures that can be taken to protect our data.""The most valuable feature of Check Point Security Management is the high level of visibility""The compliance is great.""This solution is easy to install and deploy. It is also user-friendly.""The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration."

More Check Point Security Management Pros →

"The most valuable feature of Datadog is its logs.""I don't have to worry about upgrades with the AWS version.""Using the data, our operation teams works with the dashboards to get their statistics, analytics, etc.""Datadog is easy to use and easy to deploy. It's a better solution compared to others on the market in terms of being budget friendly for our customers.""The application performance monitoring is pretty good.""Even if we don't end up using Datadog, it revealed problems and optimizations to us that weren't obvious before.""Having a wealth of information has helped us investigate outages, and having historical data helps us tune our system.""I like that you can build out a dashboard pretty quickly. There are some things that come out of the box that you don't really need to do, which is great because they're default settings."

More Datadog Pros →

Cons
"In my experience, the place they can improve the most is in the technical support where I have had some serious problems that could not be solved in time due to a lack of knowledge of the assigned engineer.""Sometimes the security system slows down when it is overloaded.""Policy installation time can be reduced.""There is room for improvement in reliability.""The usability of the solution could be improved.""If the SmartView monitor can be integrated in the R80.40 and R81 versions, that would be ideal in understanding the trends and graphs of how traffic is observed hitting the different Check Point Firewall Gateways that the Security Management controls.""I guess it lacks in providing visibility of the many incidents.""Being a security appliance, there should be the ability for the Security Management server to send email alerts via authenticated email."

More Check Point Security Management Cons →

"We need more integration with security tools like Drata.""I would love to see support for front-end and mobile applications. Right now, it is mostly all back-end stuff. Being able to do some integration with our front-end products would be awesome.""We need to learn more about the session reply feature inside of DD.""Could be a little more user friendly.""There is occasional UI slowness and bugs.""At times, it can be hard to generate metrics out of logs.""It seems that admin cost control granularity is an afterthought.""The current way accounts are billed could be vastly improved - especially when involving multiple organizations across multiple accounts in combination with reserved commitments."

More Datadog Cons →

Pricing and Cost Advice
  • "Do the homework because Check Point is rather expensive."
  • "This product can be used for 25 security gateways on a basic license."
  • "Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
  • "The solution is expensive and there is an annual license."
  • "Price-wise, it is an expensive solution."
  • "The solution is expensive."
  • "The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
  • More Check Point Security Management Pricing and Cost Advice →

  • "​Pricing seems reasonable. It depends on the size of your organization, the size of your infrastructure, and what portion of your overall business costs go toward infrastructure."
  • "It has always scaled for us. Cost scales up too, but that is not necessarily a bad thing. It's reasonable for what they're providing."
  • "Pricing and licensing are reasonable for what they give you. You get the first five hosts free, which is fun to play around with. Then it's about four dollars a month per host, which is very affordable for what you get out of it. We have a lot of hosts that we put a lot of custom metrics into, and every host gives you an allowance for the number of custom metrics."
  • "At my last company, we did see ROI, specifically around response time. We could get to mission critical things that were down and losing revenue on immediately. So, the product paid itself back."
  • "The pricing and licensing through AWS Marketplace has been good. It would be nice if it was cheaper, but their pricing is reasonable for what it is. Sometimes, for their newer features, they charge as if it's fully fleshed out, even though it is a newer feature and it may have less stuff than their other items."
  • "It costs the same amount it would if we were hosting it ourselves, so we are incredibly happy with the cost."
  • "The pricing came up a bit compared to their competitors. It is not that the price has risen, but that the competitors have gone down. They keep adding more features that I would have expected to be baked in at a more nominal price. I have been increasingly dissatisfied with the pricing, but not enough to jump ship."
  • "It didn't scale well from the cost perspective. We had a custom package deal."
  • More Datadog Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Log Management solutions are best for your needs.
    765,386 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:There are many factors and we know little about your requirements (size of org, technology stack, management systems, the scope of implementation). Our goal was to consolidate APM and infra… more »
    Top Answer:With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several times lately using the dashboards we have created with Datadog; they are very good core… more »
    Top Answer:Our organization ran comparison tests to determine whether the Datadog or Dynatrace network monitoring software was the better fit for us. We decided to go with Dynatrace. Dynatrace offers network… more »
    Ranking
    9th
    out of 94 in Log Management
    Views
    2,380
    Comparisons
    1,173
    Reviews
    28
    Average Words per Review
    490
    Rating
    9.0
    2nd
    out of 94 in Log Management
    Views
    26,001
    Comparisons
    15,508
    Reviews
    94
    Average Words per Review
    433
    Rating
    8.6
    Comparisons
    Also Known As
    R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
    Learn More
    Overview

    Check Point Security Management is an advanced security management platform for enterprises. The platform integrates all aspects of security. A single platform manages the entire infrastructure, from data centers to private/public cloud deployments.

    Check Point Security Management is a reliable and easy-to-use security platform. It integrates all aspects of your security environment to strengthen the security posture without impairing productivity. The system has a layered policy model. This means the security policy can be separated into layers for network segmentation. Different administrators can manage different policies. The policy layer automates the tasks.

    The platform is extensible, scalable, and integrates easily with orchestration systems and change management.

    Basic Components of the Infrastructure

    1. Smart Console: The Check Point Graphical User Interface for connecting and managing Security Management Servers. The smart console provides an integrated solution via the following features:


    • Security policy management
    • System health monitoring
    • Multi-domain management


    The smart console offers several advantages. Changes in security policies and logs can be done with a click. You can navigate from an item within a log to the policy. There are also built-in multi-language support and accessibility features.

    1. Security Management Server: The server manages security gateways with set security policies and monitors security events on the network.

      The automation server is an integrated part of the management server. The API server is active by default on servers with 4 GB of RAM or more and on standalone servers with 8 or more GB of RAM.

      The automation server communicates with the management server the same way as the Smart Console. This architecture allows the same validation errors and warnings to be presented when using an automation session.

      The same audit logs generated using the Smart Console are also generated using an automation session. If you have a multi-domain environment, there is only one automation server that monitors all the IP addresses of the multi-domain management server.

      2. Security Gateway is placed at the edge of the network. It monitors and filters traffic and enforces security policies.

        Logging, Event management, and Monitoring

        With Check Point Security Management, logging, reporting, event management, and monitoring are integrated. The platform features widgets and chart templates that optimize visibility. One of the best features is the one-click exploration. This simplifies going from a general overview to specific event details.

        Benefits of Check Point Security Management

        • The platform keeps pace with dynamic network changes
        • Helps align security with business goals
        • Helps with threat prevention.
        • Reduces operational costs

        The unified console also means a single policy for users, data, applications, and networks. The granularity control helps accelerate administration processes. This feature, together with automation, is key to achieving reduced operational overhead. Security teams can automate tasks and even create self-service security web portals with the Check Point Security Management platform.

        Threat management is fully integrated, with reporting, logging, and monitoring all in one dashboard. This provides full visibility into the security of the network.

        Security Management Suite

        The Security Management Suite consists of the following modules:

        • Policy Management: Includes central management of different security policies across multiple domains and browser-based security management.
        • Operations Management: Includes compliance, provisioning, workflow automation, and user directory centralization.
        • Threat Management: Includes centralizing security event correlation for enforcement points. Centrally monitors Check Point devices.

        Reviews from Real Users

        A Network Security Engineer/Architect at a tech services company says, "The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other."

        "The management API is the best new feature for me. It allows us to further automate our customers' automated server ordering," says a System Engineer Network & Security at OTTO GmbH & Co KG.

        A Senior Infrastructure Services Specialist at St.George Bank Limited adds that "The solution is ideal for use and deployment in a large infrastructure environment."





        Datadog is a cloud monitoring solution that is designed to assist administrators, IT teams, and other members of an organization who are charged with keeping a close eye on their networks. Administrators can use Datadog to set real-time alerts and schedule automated report generation. They can deal with issues as they arise and keep up to date with the overall health of their network while still being able to focus on other tasks. Users can also track the historical performance of their networks and ensure that they operate at the highest possible level.

        Datadog Benefits

        Some of the ways that organizations can benefit by deploying Datadog include:

        • Gain an integrated view of the services and programs that IT teams are employing across their networks. Users can view and monitor all of the disparate programs that they have running across their networks with this one solution. They can track these programs across the entirety of the data’s life cycle.
        • Analyze and utilize massive amounts of data in real time. Datadog’s dashboards gather data in real time. Administrators can utilize their network’s data the minute that it becomes relevant to them. Decisions can be made based on the most current information available.
        • Keep your cloud network secured against digital threats. Datadog enables users to create alerts that will notify the minute that threats arise. IT teams and administrators can rapidly address any issue that comes up and prevent any existing problem from growing worse.
        • Easily get it up and running. Users can set up Datadog, configure it, and employ API integrations to connect it to external solutions with ease.

        Datadog Features

        • Customizable and prefabricated monitoring dashboards. Administrators are supplied with two different types of dashboards that they can choose from when they are setting up Datadog. They can customize the dashboards to fit any specialized monitoring need. Additionally, users can choose to use prefabricated dashboards that come with the solution.
        • Disaster recovery feature. Datadog has a built-in feature that enables organizations to continue functioning if some disaster strikes their network. If the network suffers damage, Datadog can restore lost data and infrastructure. Should a digital threat do damage to the network, Datadog ensures that the damage is not irreparable.
        • Vulnerability scanning tool. Users can keep ahead of threats to their networks by employing Datadog’s vulnerability scanning feature. This tool scans the entirety of a user’s network and warns them if a vulnerability is detected. Users can then move to patch these holes in their security before the threat to their network can escalate.

        Reviews from Real Users

        Datadog is a solution that stands out when compared to many of its competitors. It can offer organizations many advantages. Two major advantages are the dashboards that users can create and the monitoring capability that it gives system administrators.

        A senior manager in charge of site reliability engineering at Extra Space Storage writes, “The dashboards we created are core indicators of the health of our system, and it is one of the most reliable sources we have turned to, especially as we have seen APM metrics impacted several times lately. We can usually rely on logs to tell us what the apps are doing.”

        Housecall Pro’s senior director of DevOps writes, “We value the monitoring capability since it allows us to be pushed alerts, rather than having to observe graphs continually.

        Sample Customers
        Hedgetec, Geiger
        Adobe, Samsung, facebook, HP Cloud Services, Electronic Arts, salesforce, Stanford University, CiTRIX, Chef, zendesk, Hearst Magazines, Spotify, mercardo libre, Slashdot, Ziff Davis, PBS, MLS, The Motley Fool, Politico, Barneby's
        Top Industries
        REVIEWERS
        Manufacturing Company19%
        Security Firm16%
        Financial Services Firm14%
        Computer Software Company10%
        VISITORS READING REVIEWS
        Computer Software Company14%
        Security Firm12%
        Comms Service Provider9%
        Government8%
        REVIEWERS
        Financial Services Firm22%
        Computer Software Company14%
        Comms Service Provider11%
        Manufacturing Company5%
        VISITORS READING REVIEWS
        Educational Organization31%
        Computer Software Company12%
        Financial Services Firm10%
        Manufacturing Company6%
        Company Size
        REVIEWERS
        Small Business34%
        Midsize Enterprise28%
        Large Enterprise38%
        VISITORS READING REVIEWS
        Small Business36%
        Midsize Enterprise15%
        Large Enterprise49%
        REVIEWERS
        Small Business37%
        Midsize Enterprise20%
        Large Enterprise43%
        VISITORS READING REVIEWS
        Small Business16%
        Midsize Enterprise38%
        Large Enterprise46%
        Buyer's Guide
        Check Point Security Management vs. Datadog
        March 2024
        Find out what your peers are saying about Check Point Security Management vs. Datadog and other solutions. Updated: March 2024.
        765,386 professionals have used our research since 2012.

        Check Point Security Management is ranked 9th in Log Management with 55 reviews while Datadog is ranked 2nd in Log Management with 136 reviews. Check Point Security Management is rated 8.8, while Datadog is rated 8.6. The top reviewer of Check Point Security Management writes "Great DDoS protection, high availability, and useful firewall rule implementation". On the other hand, the top reviewer of Datadog writes "Very good RUM, synthetics, and infrastructure host maps". Check Point Security Management is most compared with Wazuh, Fortinet FortiAnalyzer, IBM Security QRadar, LogRhythm SIEM and VMware Aria Operations for Logs, whereas Datadog is most compared with Dynatrace, Azure Monitor, New Relic, AWS X-Ray and AppDynamics. See our Check Point Security Management vs. Datadog report.

        See our list of best Log Management vendors.

        We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.