We performed a comparison between Check Point Security Management and Wazuh based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point Security Management is praised for its centralized management features, user-friendly interface, and extensive monitoring capabilities. Wazuh stands out for its effortless integration, excellent log monitoring capabilities, and ELK-based investigation. Check Point Security Management could improve by simplifying the migration of security policies, optimizing performance, and expanding its management API. Other pain points include threat tracking and documentation. Wazuh needs improvements in event source coverage, threat intelligence integration, and real-time monitoring of Unix systems.
Service and Support: Check Point Security Management's customer service is widely praised for being knowledgeable, supportive, and reliable. Although some users had problems with inexperienced agents and coordination issues, the overall support experience is positive. Wazuh's customer service is generally deemed satisfactory, and many customers noted that they could easily find answers from community forums.
Ease of Deployment: Check Point Security Management is generally seen as easy to set up if the user has some expertise. Some users said that Wazuh’s setup is easy and fast, while others perceived it as complicated and said it required a significant amount of time.
Pricing: Check Point Security Management is seen as a solid investment, offering flexibility and a good value for the price. Wazuh is a cost-effective option as it is open-source and completely free to acquire.
ROI: Check Point users said the solution offers a steady ROI over time. Wazuh's MSP program and partnerships offer opportunities to generate revenue from the platform.
"The intuitive interface also allows new team members to adapt to the technology if they are not familiar with it initially. It doesn't take much for one to familiarize themselves with the product."
"We love the ability to monitor performance in real-time, and gather critical information about network flows and traffic."
"It provides for capabilities and has allowed us to be more scalable."
"The firewall cleverly handles such attacks without compromising on performance."
"I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation. These allow me to select to whom to do what, and when."
"The rulebase management and the shared layers concept is implemented well."
"Each department can easily share data with the management without fear of data compromise."
"It's a great complete endpoint security solution that prevents the most imminent threats to the endpoint such as ransomware, phishing, or malware."
"The most valuable features are the modules and metrics."
"Wazuh is simple to use for PCI compliance."
"My company implemented Wazuh because it was relatively inexpensive. They could quickly get their hands on it to check a box for some audit and compliance."
"The MITRE ATT&CK correlation is most valuable."
"It's stable."
"Its cost-effectiveness is the most valuable aspect."
"One of the most beneficial features of Wazuh, particularly in the context of security needs, is the machine learning data handling capability."
"The tool is stable."
"It sometimes blocks safe sites when I am researching, affecting the overall output and wasting time."
"Some costs are ridiculously high."
"Troubleshooting is quite complicated within multi-domain management. If an issue arises, the local administrator has to keep in mind that there are other domains that could be also affected."
"In the future, I would like the platform to be able to integrate or manage appliances or third-party equipment."
"The migration from R77 Manager to R80 is a major upgrade. It's not very easy to do. There should be some kind of Wizard for a direct upgrade from the R77 to the R80. There should be an easy way for the customers to do the upgrade."
"We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners."
"The tracking of new threats could be improved."
"We would like to improve the upgrade process in order to do mass upgrades to firewalls and to be able to upgrade target firewalls at the same time."
"The computing resources are consuming and do not make sense."
"Alerts should be specific rather than repeatedly triggered by integrating multiple factors. This issue needs improvement to create a more efficient alert system."
"A more structured approach, perhaps with modular UI components, to facilitate easier integration and navigation within the Wazuh platform for custom integrations would be beneficial."
"The implementation is very complex."
"There's not much I like about Wazuh. Other products I've used were a lot more functional and user friendly. They came with reports and use cases out of the box. We need to configure Wazuh's alerts and monitoring capabilities manually. It'd be nice if we could select from templates and presets for use cases already built and coded."
"The technical support can be improved. Wazuh has some bugs that need to be fixed. It would be good if we can have automation with respect to incidence responses."
"One area where Wazuh could use some improvement is in its reporting mechanism, especially for high-level management like CSOs and CEOs."
"Wazuh is missing many things that a typical SIEM should have."
More Check Point Security Management Pricing and Cost Advice →
Check Point Security Management is ranked 9th in Log Management with 55 reviews while Wazuh is ranked 3rd in Log Management with 38 reviews. Check Point Security Management is rated 8.8, while Wazuh is rated 7.4. The top reviewer of Check Point Security Management writes "Great DDoS protection, high availability, and useful firewall rule implementation". On the other hand, the top reviewer of Wazuh writes "It integrates seamlessly with AWS cloud-native services". Check Point Security Management is most compared with Fortinet FortiAnalyzer, IBM Security QRadar, LogRhythm SIEM, Splunk Cloud Platform and Graylog, whereas Wazuh is most compared with Elastic Security, Security Onion, Splunk Enterprise Security, AlienVault OSSIM and Graylog. See our Check Point Security Management vs. Wazuh report.
See our list of best Log Management vendors.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.