Most Helpful Review
Enables us to bring all our data sources into a central hub for quick analysis, helping us focus on priorities in our...
Find out what your peers are saying about Check Point Security Management vs. vRealize Log Insight and other solutions. Updated: November 2020.
446,956 professionals have used our research since 2012.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Being able to build and modify dashboards on the fly with Activeboards streamlines my analyst time because my analysts aren't doing it across spreadsheets or five different tools to try to build a timeline out themselves. They can just ingest it all, build a timeline out across all the logging, and all the different information sources in one dashboard. So, it's a huge time saver. It also has the accuracy of being able to look at all those data sources in one view. The log analysis, which would take 40 hours, we can probably get through it in about five to eight hours using Devo."
"The user interface is really modern. As an end-user, there are a lot of possibilities to tailor the platform to your needs, and that can be done without needing much support from Devo. It's really flexible and modular. The UI is very clean."
"One of the biggest features of the UI is that you see the actual code of what you're doing in the graphical user interface, in a little window on the side. Whatever you're doing, you see the code, what's happening. And you can really quickly switch between using the GUI and using the code. That's really useful."
"Even if it's a relatively technical tool or platform, it's very intuitive and graphical. It's very appealing in terms of the user interface. The UI has a graphically interface with the raw data in a table. The table can be as big as you want it, depending on your use case. You can easily get a report combining your data, along with calculations and graphical dashboards. You don't need a lot of training, because the UI is relatively very intuitive."
"The ability to have high performance, high-speed search capability is incredibly important for us. When it comes to doing security analysis, you don't want to be doing is sitting around waiting to get data back while an attacker is sitting on a network, actively attacking it. You need to be able to answer questions quickly. If I see an indicator of attack, I need to be able to rapidly pivot and find data, then analyze it and find more data to answer more questions. You need to be able to do that quickly. If I'm sitting around just waiting to get my first response, then it ends up moving too slow to keep up with the attacker. Devo's speed and performance allows us to query in real-time and keep up with what is actually happening on the network, then respond effectively to events."
"The real-time analytics of security-related data are super. There are a lot of data feeds going into it and it's very quick at pulling up and correlating the data and showing you what's going on in your infrastructure. It's fast. The way that their architecture and technology works, they've really focused on the speed of query results and making sure that we can do what we need to do quickly. Devo is pulling back information in a fast fashion, based on real-time events."
"It's a great solution for management. We can manage a lot at the same time with one security management system. Also, each gateway depends on the other, which is helpful."
"The firewall's blades are the solution's most valuable feature."
"I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation. These allow me to select to whom to do what, and when."
"The additional features offered by the solution are excellent. We didn't have a lot fo these on a previous solution, and they've proven to be an advantage for us."
"As the security administrator, who is responsible for the day-to-day tasks (e.g. creating new firewall rules, monitoring the security alerts and incidents etc.) and the maintenance (e.g. installing the new Jumbo Hotfixes), I find the Check Point Security Management R80.10 to be the great solution."
"The most valuable feature for me is Identity Awareness."
"The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other."
"We are using it because we have a VMware product. It has its own built in dashboards for VMware products, and that's a good thing."
"The trace log is the solution's most valuable feature. It's very helpful in troubleshooting problems."
"We use the on-premises version of this solution for log analysis and to find details about certain issues."
"The most valuable feature is server virtualization. It's been very useful."
"What I like is that you can have different storage locations for different applications."
"The root cause analysis feature is very valuable."
"The virtualization solution supports data center virtualization, network and security."
"Our current costs are too high, and this tool will help us to better optimize our infrastructure."
"Their documentation could be better. They are growing quickly and need to have someone focused on tech writing to ensure that all the different updates, how to use them, and all the new features and functionality are properly documented."
"The Activeboards feature is not as mature regarding the look and feel. Its functionality is mature, but the look and feel is not there. For example, if you have some data sets and are trying to get some graphics, you cannot change anything. There's just one format for the graphics. You cannot change the size of the font, the font itself, etc."
"There's always room to reduce the learning curve over how to deal with events and machine data. They could make the machine data simpler."
"There is room for improvement in the ability to parse different log types. The breadth of overall log parsers that exists right now is an area that they could improve. Natively, there's more that could be done by Devo then what it can and can't understand from a parsing perspective."
"Devo has a lot of cloud connectors, but they need to do a little bit of work there. They've got good integrations with the public cloud, but there are a lot of cloud SaaS systems that they still need to work with on integrations, such as Salesforce and other SaaS providers where we need to get access logs."
"In the last version from 80.20, there are some issues around SSNA Diction. I would like this to be improved."
"We sometimes have trouble with the performance of the solution. Maybe some performance tuning options could be added in a future release. There should be more visibility about which blade in your firewall is causing the latency."
"In future releases I'd like to see better integration with other applications and solutions. Also, the cost of the license is too high, it's too expensive."
"The reporting should be improved in future releases. It needs to be very explicit. This is very important."
"I like that the Compliance software blade is available for free with the Security Management server purchase, but it is free for only one year - after that you have to buy an additional license to continue using it. I think such an important feature is vital for the management server, and should not be licensed separately."
"I would like to bind users to their network, as well as their local office machine."
"The migration from R77 Manager to R80 is a major upgrade. It's not very easy to do. There should be some kind of Wizard for a direct upgrade from the R77 to the R80. There should be an easy way for the customers to do the upgrade."
"The solution is a very good tool, but it has a lot of limitations. One of the main issues is around how you define your retention policy, for instance, in Log Insight. It doesn't have it. You can't define a log retention policy. You also can't define the destination or location for your logs. All of the logs are in one index or one bucket."
"They should improve their web interface to make it more user-friendly."
"Documentation is lacking, including some guide as to how to use the expressions. It is not clear how to look for a log, for example. Some examples in the documentation might be helpful. I think that VMware had good documentation, but it's no longer hosted. The documentation is not as easy to understand as it was before."
"The solution isn't user-friendly for admins."
"I think that it should be able to integrate with other third-party backup and recovery solutions, more that it does now."
"I don't use the solution on a day to day basis, so I'm not sure what specifically can be improved."
"It's great for VMware, but it would be good if they had third-party logins."
"The dashboard needs to be improved because this is what I need to monitor my infrastructure."
Pricing and Cost Advice
"It's a per gigabyte cost for ingestion of data. For every gigabyte that you ingest, it's whatever you negotiated your price for. Compared to other contracts that we've had for cloud providers, it's significantly less."
"I'm not involved in the financial aspect, but I think the licensing costs are similar to other solutions. If all the solutions have a similar cost, Devo provides more for the money."
"We have an OEM agreement with Devo. It is very similar to the standard licensing agreement because we are charged in the same way as any other customer, e.g., we use the backroom."
"We have seen ROI. We have seen cost savings in maintenance, upkeep, and support."
Information Not Available
"Pricing could always be lower. If it were free, I would be more satisfied."
"The license cost for any other monitoring tool is too high compared to this product."
Questions from the Community
Top Answer: Even if it's a relatively technical tool or platform, it's very intuitive and graphical. It's very appealing in terms of… more »
Top Answer: We have an OEM agreement with Devo. It is very similar to the standard licensing agreement because we are charged in the… more »
Top Answer: The additional features offered by the solution are excellent. We didn't have a lot fo these on a previous solution, and… more »
Top Answer: It depends on the user, but all of the checkpoints need improvement. The only place I need a bit of an update, for… more »
Top Answer: We primarily use the solution based on the results that are provided. We've tried others previously and they didn't give… more »
Top Answer: The interface of the solution is good.
Top Answer: The setup costs can sometimes be a bit expensive but I think for the technology they are offering it's top of the mark… more »
Compared 56% of the time.
Compared 18% of the time.
Compared 9% of the time.
Compared 5% of the time.
Compared 4% of the time.
Compared 20% of the time.
Compared 19% of the time.
Compared 13% of the time.
Compared 13% of the time.
Compared 5% of the time.
Compared 39% of the time.
Compared 33% of the time.
Compared 5% of the time.
Compared 5% of the time.
Compared 1% of the time.
Also Known As
|Logtrust||R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management|
Devo, the cloud-native logging and security analytics company, empowers security and operations teams to maximize the value of all their data. Only the Devo platform delivers the powerful combination of real-time visibility, high-performance analytics, scalability, multitenancy, and low TCO crucial for monitoring and securing business operations as enterprises accelerate their shift to the cloud.
R80.30 Cyber Security Management features centralized management control across all networks and cloud environments, increasing operational efficiency and lowering the complexity of managing your security. Learn more about Security Management.
|vRealize Log Insight delivers indexing and machine learning based Intelligent Grouping, to enable searching, for faster troubleshooting across physical, virtual and cloud environments. It help monitors and manages Machine Data at Scale through analyzing massive amounts of log data and delivers near real-time monitoring, search and log analytics, coupled with a dashboard for stored queries, reports and alerts. Speeds correlation of events across an entire IT environment. vRealize Log Insight creates Structure from Unstructured Data by collects and automatically identifies structure in all types of machine-generated log data (application logs, network traces, configuration files, messages, performance data, system state dumps, etc.) to build an index for performing analytics. And it offers a pricing model that includes unlimited data and does not require buying licenses based on peak usage and worst-case scenarios.|
See Devo in Action
See how Devo allows you to free yourself from data management, and make machine data and insights accessible.
Learn more about Check Point Security Management
Learn more about vRealize Log Insight
|United States Air Force, Rubrik, Critical Start, NHL, Panda Security, Telefonica, CaixaBank, OpenText||Hedgetec, Geiger||Wildlands Adventure Zoo, Medic Mobile, IBM, Seventy Seven Energy, Baystate Health, Osis, Oxford University, Columbia University, Siemens, Cardinal Health, Ashdod Port, Vasakronan, Sydney Adventist Hospital, University of Derby|
Computer Software Company30%
Comms Service Provider23%
Financial Services Firm5%
Computer Software Company26%
Comms Service Provider14%
Computer Software Company33%
Comms Service Provider17%
See our list of best Log Management vendors.