Listing Thumbnail

    Check Point Security Management

     Info
    Deployed on AWS
    Free Trial
    A single pane-of-glass security management console delivers consistent visibility, policy management, logging, reporting and control across all cloud environments and networks

    Overview

    Play video

    Check Point Security Management provides an advanced security management platform for enterprises to deploy protections across their organizations, across public, private and hybrid clouds.

    Efficient: Automation and granular delegation help alleviate operational overhead. The Security Management API allows security teams to automate any task or create web portals for security self-service. Management interface features anticipate the administrator's daily needs, providing security intelligence to make better policy decisions.

    Fully Integrated: Security Management has logging, monitoring, event correlation and reporting in one place. A visual dashboard provides full visibility into security across the network, helping organizations monitor the status of enforcement points and stay alert to potential threats. The customizable dashboard provides a full view of the security posture and drilldown capabilities into incident or log details. Reports are configurable and accessible from any web browser.

    Security Management is required to control CloudGuard Network Security Gateways.

    Customers requiring security management for up to 5 Security Gateways may deploy this offering on instances with less than 8 compute cores. Managing more than 5 Gateways on an instance with less than 8 compute cores is not supported. Customers requiring security management for up to 25 Security Gateways must deploy this offering on instances with 8 or more compute cores.

    Customers requiring security management for more than 25 Security Gateways should contact Check Point or purchase BYOL.

    To maintain the highest quality and security of our management solutions, Check Point recommends installing the latest recommended Jumbo Hotfix, especially after the initial deployment.

    Highlights

    • One Platform, One Policy a single pane of glass console manages the entire IT infrastructure - from the data center to private/public/hybrid cloud deployments - for full visibility, security efficiency and consistency. The policy can be segmented into layers for seamless network segmentation.
    • Extensible, Scalable Platform: The Security Management platform scales to the most complex and dynamic environments. The RESTful APIs make it easy to integrate securely with orchestration, change management and ticketing systems, enabling automated security change control and provisioning.
    • Check Point is an APN Advanced Technology Partner with Networking and Security Competencies. CloudGuard Network Security is integrated with a broad range of AWS services, including Amazon GuardDuty, Amazon CloudWatch, AWS Security Hub, AWS Transit Gateway, AWS CloudTrail and VPC Flow Logs. CloudGuard Network Security also provides a library of CloudGuard CloudFormation templates (CFTs) to simplify deployment.

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    OtherLinux Gaia 3.10

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free for 30 days according to the free trial terms set by the vendor. Usage-based pricing is in effect for usage beyond the free trial terms. Your free trial gets automatically converted to a paid subscription when the trial ends, but may be canceled any time before that.

    Check Point Security Management

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time. Alternatively, you can pay upfront for a contract, which typically covers your anticipated usage for the contract duration. Any usage beyond contract will incur additional usage-based costs.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (129)

     Info
    • ...
    Dimension
    Cost/hour
    c6in.xlarge
    Recommended
    $0.62
    r5a.4xlarge
    $1.83
    r5n.12xlarge
    $1.83
    m6i.2xlarge
    $0.62
    r5b.2xlarge
    $0.62
    c5.18xlarge
    $1.83
    r5n.xlarge
    $0.62
    c5d.18xlarge
    $1.83
    r5a.2xlarge
    $0.62
    c5n.4xlarge
    $1.83

    Vendor refund policy

    Terminate the instance at any given time to stop incurring charges.

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Additional details

    Usage instructions

    Once the instance is running, connect to it using SSH, set an admin password using: 'set user admin password' followed by 'save config'. Then connect to https://[instance] using Internet Explorer (IE) to finalize the configuration. Notes:

    1. SSH password authentication is disabled in /etc/ssh/sshd_config
    2. For information regarding Firefox and Chrome refer to sk121373.

    Support

    Vendor support

    This offer includes Premium Support. For the full list of included support services visit: https://www.checkpoint.com/support-services/support-plans/  To open a support ticket, you would need to have a Check Point user center account. If you do not have a user center account, you can sign up for one here: https://accounts.checkpoint.com . Need support? Contact us at https://www.checkpoint.com/support-services/contact-support/ 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    25
    In Network Infrastructure
    Top
    10
    In Network Infrastructure

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    13 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Security Management Platform
    Advanced security management platform for deploying protections across public, private, and hybrid cloud environments
    Policy Automation
    RESTful APIs enable integration with orchestration, change management, and ticketing systems for automated security control and provisioning
    Centralized Monitoring
    Visual dashboard providing comprehensive visibility into network security status with event correlation and customizable reporting capabilities
    Multi-Environment Integration
    Supports management of security gateways across diverse cloud and network infrastructures with consistent policy enforcement
    Security Intelligence
    Granular delegation and management interface features that provide actionable insights for enhanced security policy decision-making
    Network Virtualization
    Secure virtual private network (VPN) gateway for connecting remote sites and branch offices
    Advanced Threat Protection
    Dynamic security controls with application layer exfiltration security and advanced evasion techniques (AETs) identification
    Intrusion Prevention
    Integrated advanced Intrusion Prevention System (IPS) with capability to stop Advanced Evasion Techniques
    Security Policy Management
    Centralized policy configuration with global update capabilities across network infrastructure
    Malware Detection
    Sandboxing technology for identifying zero-day attacks and advanced malware
    Network Traffic Inspection
    Advanced layer-7 application visibility and control with comprehensive traffic inspection capabilities
    Threat Prevention Technology
    AI/ML-powered security engine with researcher-grade signatures for detecting known and zero-day threats
    Cloud Security Integration
    Native integration with AWS infrastructure components including Gateway Load Balancer, Auto Scaling, and Transit VPC
    Dynamic Policy Management
    Automated policy application using AWS tags, Application IDs, User IDs, geographies, and network zones
    Deployment Flexibility
    Seamless deployment through EC2 instance creation workflow with cloud-native form factor

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.5
    2 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    50%
    50%
    0%
    0%
    0%
    2 AWS reviews
    |
    27 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    NareshKumar10

    Enhanced Internal Security and Efficiency

    Reviewed on May 25, 2025
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Check Point Security Management  is using it as a firewall, which ignores all my data threats, and it is useful to secure my inside IT infrastructure. It secures all the data and all the devices connected to the network. Actually, this is not the one I selected; I used Check Point 1800 Quantum Spark, which is not available in your content sharing, and for that reason, I selected this one.

    What is most valuable?

    Check Point Security Management  helps with my daily operations as I use Check Point 1800, which is connected to the internet and all the networks. Nearly 200 to 350 people connect to the inside internet, and my ISP is connected to the firewall, which gives internet access to all the access points. Everyone who connects their laptop, mobile devices, or any kind of device with internet facility is secured because Check Point has internal visibility into end threats and will not allow any other DNS inside. Whenever any unauthorized access occurs with the devices, it gives me a pop-up, and I immediately go and block them. Check Point Security Management is very useful when compared to other devices.

    One specific situation where Check Point Security Management really helped me catch or block a threat is its best feature: it segregates all the devices such as mobile devices, phone devices, tablets, smartwatches, laptops, and desktops. It shows each and everything in a segregation method. I have an old device as well, which shows everything in a single line, making it difficult to identify which one is a phone device and which one is a laptop. Check Point Security Management does not operate like that; it shows the mobile device, tablet, smartphone, laptop, and desktop separately so that I can easily find out how many desktops are connected, how many mobile devices are connected, and I can easily block mobile devices and free up the IPs. This is the main beautiful thing about Check Point 1800 Quantum Spark.

    What needs improvement?

    Check Point Security Management can be improved by addressing a negative challenge I face: sometimes it does not show internet utilization in the GUI. When I ask support, they tell me to upgrade the firmware, which happens quite frequently. Since I deployed the device in my on-premises environment 1.5 years ago, I have experienced this issue three times.

    Check Point Security Management has not impacted my daily work or decision-making in any negative way. As an IT person, I occasionally need to check how much internet bandwidth has been used in the internal network over the past month, day, or week. During those times, when I open the data utilization column, it shows nothing available. Each time this happens, I need to upgrade to the latest version of the firmware, and this frequent updating affects my productivity negatively. If Check Point addresses this issue in the future, it will be beneficial for all customers using Check Point SMBs.

    For how long have I used the solution?

    I have been using Check Point Security Management for the past 1.5 years.

    What do I think about the stability of the solution?

    In my environment, Check Point Security Management is stable, as I do not see any downtime. The only issue I face is with data utilization not showing, which I have mentioned previously. Other than that, everything is going well.

    What do I think about the scalability of the solution?

    Check Point Security Management's scalability is quite sufficient for my organization with below 500 employees, and it functions very smoothly. Currently, it handles the network well, and I am unsure if the Check Point 1800 will work adequately if my organization increases from 500 to 600 employees, but so far, it has been functioning smoothly without any issues in the past 1.5 years.

    How are customer service and support?

    I would rate the customer support for Check Point Security Management as four out of five, or seven out of ten.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    I previously used a different solution before Check Point Security Management, but I do not want to disclose the product name due to marketing strategies. I switched because that device hung every time when connecting to the network; it could only support 40 to 50 users, while my organization had 150 users when I joined.

    How was the initial setup?

    The initial setup with Check Point Security Management is very straightforward and easy; we implemented the tools within a six-hour timeframe.

    What was our ROI?

    I have seen a return on investment with Check Point Security Management, as my security concerns regarding data production have been greatly diminished, and my time is also saved. Additionally, my reports that I send to management monthly are automated, which also saves time.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup costs, and licensing for Check Point Security Management involves a bit of a challenge in pricing, as it is somewhat costlier than previous devices. However, it is worth paying extra for this product.

    Which other solutions did I evaluate?

    Before choosing Check Point Security Management, I evaluated other options including the same device I had earlier but in a newer version. I found that the latest version and Check Point 1800 have multiple variations and use cases. We checked three other devices as well, which could not match the capabilities of Check Point 1800 due to its significant improvements and multiple use cases. That is why we chose Check Point Security Management for our internal IT infrastructure.

    What other advice do I have?

    I save significant time with the alert system and device management because it provides data in graphs and reports. Whenever a data threat arises, it alerts me when the threat comes inside the device or from the devices to the inside network. I receive alerts and block that device, preventing the threat from affecting the entire network. This is one of the positive aspects of the Check Point 1800 device.

    My advice to others looking into using Check Point Security Management is to first assess your organization's needs regarding how many people will connect to the internal network. This decision depends on that number. If you have more than 500 or 550 people, please check whether this solution will be effective for you. It's important to take demos a few times from Check Point vendors or directly from Check Point before making a purchase.

    I rate Check Point Security Management eight out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Edrisa Biliba

    The solution provides real visibility and secures the infrastructure effectively

    Reviewed on Jan 21, 2025
    Review provided by PeerSpot

    What is our primary use case?

    This is the Wi-Fi documentation. I work with the service, and we are partners with Check Point. One of our clients, Parliament, required an upgrade from physical to virtual implementation. This was my first implementation. We have another client, and the plan is to do something with them this year, although I'm not sure when. I've been involved in some other things, however, this was my first implementation.

    What is most valuable?

    It's a reliable solution for security without mentioning its importance. We can't work without Check Point since it provides the real visibility needed to manage the environment. You can depend on it, as it assures the environment is well-secured. It's doing great work, and we can't work without SQL. We don't work with any other solution.

    What needs improvement?

    One case I saw was with the logs, which gave me the transfer and the vibration. There's a lot of logs, and I'm unsure about their validity, however, they take up a lot of space. We had to provision the virtual machine twice. Another reason is that the database was already large thanks to the numerous logs. I'm not sure how they can be managed comprehensively.

    For how long have I used the solution?

    I have done my first implementation of the solution.

    What do I think about the stability of the solution?

    Ever since I implemented it, we have not had any complaints from the client side. That is a good sign regarding stability.

    How are customer service and support?

    Check support was involved during the implementation. We had support during the migration process. The issue was the size of the partition for logs. After the support, we realized we needed to resize. The challenge was with drivers due to the size, and we had not provisioned the partition to the right size. This was resolved with support.

    How would you rate customer service and support?

    Neutral

    How was the initial setup?

    We had to determine the specifications required for the security of the virtual machine, such as memory, storage, and network setup. The provisioning of the VM depended on the available resources since the box itself had a lot of memory. Specifications are crucial for the setup, and we needed enough storage. The migration was time-consuming but manageable.

    Which other solutions did I evaluate?

    With Check Point, I can compare it with Fortinet. Fortinet is a bit lower, while Check Point is on a higher level in terms of visibility and reliability. I've seen recommendations for Check Point over other products.

    What other advice do I have?

    I would definitely recommend Check Point, especially since our client was already using it. We had considered other options, but Check Point was preferable. The implementation supports an environment with more than one hundred users. 

    Overall, I would rate this product a ten out of ten.

    Pravir KumarSinha

    Helps us secure our organization effectively

    Reviewed on Nov 11, 2024
    Review provided by PeerSpot

    What is our primary use case?

    We work with multiple security tools, including network security and information security solutions. Our primary use case includes using Check Point and other tools like CyberArk for privilege access management, Cisco, and WebSight CloudSec.

    How has it helped my organization?

    The product helps in securing our complete organization. We have not received any alerts that were suspicious, which assures us that it's working as expected.

    What is most valuable?

    It's already helped secure our organization effectively. That said, the integration of all the firewalls should be centralized, which would make management easier.

    What needs improvement?

    We are not sure if there is a centralized security console available. It would be beneficial if all firewalls could be integrated under one management console.

    For how long have I used the solution?

    We have been using the firewall for more than ten years.

    What do I think about the stability of the solution?

    We are confident in the security solution as we have not faced any alerts that were suspicious.

    How are customer service and support?

    We have partner support that helps us mitigate vulnerabilities reported by our infrastructure team. Most of the time, we get good support.

    How would you rate customer service and support?

    Neutral

    How was the initial setup?

    The first deployment takes two to three days. After setup, maintenance and updates are straightforward.

    What's my experience with pricing, setup cost, and licensing?

    Since we are using it extensively, we get significant discounts during procurement. The tool is cost-effective.

    What other advice do I have?

    I'd rate the solution eight out of ten.

    Dhiren

    Centralized logging and management with easy enabling/disabling features

    Reviewed on Jul 31, 2024
    Review provided by PeerSpot

    What is our primary use case?

    The Security Management server provides centralized management to manage all the security gateways.

    Many organizations will have more than one firewall. This may be in the same location or in a different location. Users can manage all the firewalls from a single location.                                    

    It provides centralized logging for all incoming and outgoing traffic.

    How has it helped my organization?

    The solution centralizes licensing and auto-licensing with smart updating. 

    In organizations where there are many firewalls, one firewall license may expire. We can easily update licenses from the smart console from the same location or from different locations.                                               

    It also provides centralized logging that helps during troubleshooting - which provides detailed logging of access rules, NAT rules, application filters, VPNs, etc.                                                                                                              

    What is most valuable?

    The centralized logs and management are helpful. All of the logs are stored in an external server or within the Management Server. All of the logs are very easy to understand and provide detailed information about the instance. 

    Through the Management Server we can easily enable all the features and easily disable them as well. 

    What needs improvement?

    Check Point offers PS services in India. As per personal experience and based on many organizations, Check Point needs to improve PS services. 

    For how long have I used the solution?

    For the past one and a half years, I have been using a Check Point Firewall and Check Point Management Server.

    What do I think about the stability of the solution?

    The stability is the best.

    What do I think about the scalability of the solution?

    I am satisfied with the scalability.

    How are customer service and support?

    So far, there is no point reach out to technical support.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    No, we have not selected any other solution.

    How was the initial setup?

    As a Check Point implementation engineer, I found the setup process easy. 

    What about the implementation team?

    The vendor expertise is very good.

    What's my experience with pricing, setup cost, and licensing?

    The licensing price is a bit expensive. However, it provides very good security at the perimeter level.

    Which other solutions did I evaluate?

    No, we have not evaluated other options.

    What other advice do I have?

    They just need to improve PS service in India.

    Which deployment model are you using for this solution?

    On-premises
    Joachim Kinyua

    Offers firewall and endpoint security that improves the business security posture

    Reviewed on Jul 13, 2024
    Review from a verified AWS customer

    What needs improvement?

    To make the tool better, I think we could have some sort of analysis similar to how some products offer information related to social media sentiments. If we could get that kind of assessment, some sort of analysis of some sort, I think that would be something that can really improve the solution.

    In the future, I would like to see more frequent updates because of the changing security landscape. We should be seeing more updates in the tool, especially those that are not paid. The tool can also put in efforts in terms of maybe the community by conducting some sort of workshop or some sort of online event to bring the community together so that we can all meet. A community portal is needed.

    For how long have I used the solution?

    I have been using Check Point Security Management for five years.

    What do I think about the stability of the solution?

    Stability-wise, I rate the solution a nine to ten out of ten, especially for the cloud version. The on-premises version was a bit unstable, and I think I will give stability a ten out of ten.

    What do I think about the scalability of the solution?

    Speaking about scalability, in terms of maturity, product security, and reliability, I would rate the tool an eight out of ten.

    Around 200 to 250 people in my company use the tool.

    How are customer service and support?

    I have experience with the solution's technical support, and I don't think the product is doing well. We have to reach out to the first level of support and then to the third level of support. I rate the technical support a six out of ten.

    How would you rate customer service and support?

    Neutral

    How was the initial setup?

    The product's initial setup phase had no problems.

    The product's installation phase was easy. The moment we transitioned from on-prem to the cloud, we realized that the on-prem version was a bit more difficult to use, and the cloud version was easier because it has some sort of configuration wizard. The provisioning was easy.

    The solution is deployed on the private cloud version offered by AWS, but we use it across the company's group, and it is hosted in South Africa.

    The solution can be deployed in an hour and a half. The deployment phase was not so bad.

    I was not involved in the deployment since I had my tech team with 12 security engineers for it who can take care of the product and the firewall. My company's IT department has around 30 technical members but only 12 take care of information security matters associated with the tool.

    What was our ROI?

    In terms of the tool's financial and commercial aspects, we do a risk assessment every quarter. There is a huge cycle of risk assessment every quarter. As a part of risk assessment, Check Point reviews threats. When the risk team comes, it assesses the group. They give us some values about the threats that we are facing. They explain that since implementing the solution, this is the threat, and this is the value. Some empirical data is used.

    What's my experience with pricing, setup cost, and licensing?

    Honestly, the tool is expensive. It's a good product, so definitely, it is expensive. I realized that the tool is a bit more expensive than the rest, at over 20 to 30 percent overall. If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten. There are so many other products out there that are more expensive than Check Point. There are also so many other products that are cheaper than Check Point.

    Which other solutions did I evaluate?

    Over the other tools in the market, my company chose Check Point even if it is a bit pricey, but it fits the bill. From a business requirements point of view, it fits the bill. With the tool, we have been able to restructure our infrastructure in terms of the IT landscape. We are also able to bring policies without any fear of infiltration. In a nutshell, it fits before a business case.

    What other advice do I have?

    Check Point Security Management streamlines operations in our specific industry. We used to have a lot of instances, but because of the alerts that come from the kind of configuration the solution offers, we are now able to take care of instances even before they happen. Basically, the tool has really helped us reduce instances by about 40 to 50 percent.

    The tool has a firewall and endpoint security to improve our company's security posture, especially for our mobile devices. Our company has a sort of principle where there is a need to bring your own device, so it is used to take care of things in terms of security. The security team within our department escalates things quickly.

    Speaking about threat prevention in our daily operations, I would say that before the tool's implementation, we used to report a loss of about 50,000,000 dollars, but it has now gone down after the product was installed. It looks like it has helped capture those threats, alert in advance, and anomaly detection. It has been a very helpful product.

    Speaking about the influence of Check Point Security Management on our IT infrastructure, I would say that we have implemented the product across endpoints, including mobile devices and devices that fall under the BYOD category. With Check Point, we were able to implement and allow our staff to bring their devices and work from wherever they want. Without Check Point, we would not have been able to do so, and that changes the landscape and trims down on the devices that we would have been acquiring centrally for our staff.

    My company started the analysis on AI and areas like trends. The trends, especially transactional trends and all that kind of thing, are areas where we have already started some use cases for AI, about five of them, and I think the engine is still in the learning phase. I would say that we haven't really started using AI, but we already have it set up in Check Point, and it will be around the area associated with trends. Basically, we have not really explored the AI part yet.

    I recommend the tool to others.

    The tool's maintenance is done automatically on the cloud. When we were using the tool's on-prem version, we were happy to offer support for the product in our company.

    I rate the tool an eight out of ten.

    Which deployment model are you using for this solution?

    Private Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    View all reviews