We compared Check Point Security Management and IBM Security QRadar based on our users' reviews in five categories. We reviewed all of the data, and you can find the conclusion below.
Features: Check Point Security Management is praised for its centralized management features, user-friendly interface, and extensive monitoring capabilities. QRadar users say the solution provides extensive information and helpful leads for locating pertinent data. QRadar stands out with its comprehensive network visibility and strong SIEM capabilities. Check Point Security Management could improve by simplifying the migration of security policies, optimizing performance, and expanding its management API. Other pain points include threat tracking and documentation. QRadar could improve its rule deployment and lower its false positive rate. Users would also like expanded storage capacity, streamlined user management, and a more mature architecture.
Service and Support: Check Point Security Management's customer service is widely praised for being knowledgeable, supportive, and reliable. Although some users had problems with inexperienced agents and coordination issues, the overall support experience is positive. Some QRadar customers have had trouble connecting with knowledgeable support staff and experienced delayed responses.
Ease of Deployment: Check Point Security Management is generally seen as easy to set up if the user has some expertise. QRadar's initial setup can be complex for users without expertise, and the difficulty may vary depending on the size of the data set.
Pricing: Check Point Security Management is seen as a solid investment, offering flexibility and a good value for the price. QRadar can be costly because users need to buy new hardware to upgrade.
ROI: Check Point users said the solution offers a steady ROI over time. QRadar delivers a high return on investment, improving security through its advanced user behavior analytics.
"Check Point Security Management has improved our organization because all corporate firewalls can be managed with a single interface."
"Check Point Security Management has a great feature that allows you to automate the request of the automated server."
"It's a great complete endpoint security solution that prevents the most imminent threats to the endpoint such as ransomware, phishing, or malware."
"The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other."
"The management API is the best new feature for me. It allows us to further automate our customers' automated server ordering."
"Key features include the ability to include logs for everything that you do for admin. Also, it has web filtering built in and VPN."
"The intuitive interface also allows new team members to adapt to the technology if they are not familiar with it initially. It doesn't take much for one to familiarize themselves with the product."
"Mobile access has helped us cater to more than 4000 users so that they can work from home."
"The solution is reliable."
"This console gives you the entire view, which makes life easier and allows you to take precautionary measures."
"The tool's most valuable feature is log source management. It enables us to connect to various log sources, including content, authentications, or other customized integrations. These integrations can be tailored for use with other platforms that don’t already have built-in IBM add-ons."
"I have found IBM QRadar to be stable."
"The most valuable thing about QRadar is that you have a single window into your network, SIEM, network flows, and risk management of your assets. If you use Splunk, for instance, then you still need a full packet capture solution, whereas the full packet capture solution is integrated within QRadar. Its application ecosystem makes it very powerful in terms of doing analysis."
"The QNI feature is the one I am very interested in, and I have also been interested in Watson. From the log analysis and the security perspective, we are able to dive deep into any of the logs and anomalies."
"I have found the most important features to be the flexibility, tech framework, and disk manager."
"The most valuable features are the AI assistant, which is good at detecting known types of behavior."
"SD-WAN functionality could be added."
"Some of the configuration elements could be improved."
"I would like to bind users to their network, as well as their local office machine."
"Some costs are ridiculously high."
"Installing a policy takes a very long time to complete."
"The application filtering and URL filtering could be better."
"While the console and administration work well, they have to work on performance since it consumes a lot of CPU and memory."
"The upgrade procedure already made huge improvements, yet it remains more challenging compared to other products."
"I'm not sure about the stability just yet. We've observed a few issues and we raised a supporting ticket for it."
"I have noticed a few things while working on this. After the restart of the server, sometimes, the services misbehave, and you need to manually start or restart the service. I have seen that specifically with the Tomcat service. Sometimes, when you click on log sources, instead of opening the log source extension, it redirects you over the internet."
"The only challenge is that IBM has been a closed enterprise. It should be more open to integrating with other providers at an enterprise level. We're a bank and the core banking system integration is not way straightforward and there is no integration between IBM and these products. If IBM could open up and provide a way of integrating it seamlessly, without charging more for it, that would make a big difference."
"The biggest problem was built on top of the QRadar in the executive operations center network. The integration was not using the network security specialist properly, and all the incidents were inferior with QRadar. Its compatibility is not really good."
"We sometimes get an error about the hard drive. Approximately once in two months, we can't find the logs, and they go missing, which is a terrible issue. We are getting support for this issue from our support company."
"Whenever we are upgrading or installing any type of patch, at that time we have some delays."
"The Indian tech support is not helpful."
"Their technical support is not good. We opened a lot of cases and from my experience, they are not complicated issues but it takes forever to get an answer."
More Check Point Security Management Pricing and Cost Advice →
Check Point Security Management is ranked 9th in Log Management with 55 reviews while IBM Security QRadar is ranked 6th in Log Management with 198 reviews. Check Point Security Management is rated 8.8, while IBM Security QRadar is rated 8.0. The top reviewer of Check Point Security Management writes "Great DDoS protection, high availability, and useful firewall rule implementation". On the other hand, the top reviewer of IBM Security QRadar writes "A highly stable and scalable solution that provides good technical support". Check Point Security Management is most compared with Wazuh, Fortinet FortiAnalyzer, LogRhythm SIEM, Splunk Cloud Platform and Graylog, whereas IBM Security QRadar is most compared with Microsoft Sentinel, Splunk Enterprise Security, Wazuh, LogRhythm SIEM and Elastic Security. See our Check Point Security Management vs. IBM Security QRadar report.
See our list of best Log Management vendors.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.