We compared Check Point Security Management and USM Anywhere based on our users' reviews in five categories. We reviewed all of the data, and you can find the conclusion below.
Features: Check Point Security Management is praised for its centralized management features, user-friendly interface, and extensive monitoring capabilities. USM Anywhere is highly regarded for its extensive reporting capabilities, thorough vulnerability assessment, seamless file integration, and user-friendly management features. Check Point Security Management could improve by simplifying the migration of security policies, optimizing performance, and expanding its management API. Other pain points include threat tracking and documentation. USM Anywhere users have suggested improvements in self-service plugin management, database optimization, and third-party threat intelligence integration.
Service and Support: Check Point Security Management's customer service is widely praised for being knowledgeable, supportive, and reliable. Although some users had problems with inexperienced agents and coordination issues, the overall support experience is positive. Some users say that USM Anywhere's customer service is knowledgeable and responsive, while others have faced delays and incomplete answers.
Ease of Deployment: Check Point Security Management is generally seen as easy to set up if the user has some expertise. The initial setup for USM Anywhere is generally considered to be straightforward if the user has technical knowledge. Vendor assistance is also available during the deployment phase.
Pricing: Check Point Security Management is seen as a solid investment, offering flexibility and a good value for the price. USM Anywhere is seen as more cost-effective than premium solutions like IBM QRadar and Splunk, with pricing considered reasonable and relatively low.
ROI: Check Point users said the solution offers a steady ROI over time. USM Anywhere has garnered favorable feedback regarding its ROI.
"The most valuable feature of Check Point Security Management is the high level of visibility"
"The rulebase management and the shared layers concept is implemented well."
"It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering."
"HA Structure provides good coverage and works fine."
"Security Management gives us complete visibility into our security operations, allowing administrators to identify and address problem areas, reduce unnecessary costs, and improve efficiency. It offers detailed reports on network usage and security, which helps my company to monitor and control its security expenses."
"The firewall's blades are the solution's most valuable feature."
"We love the ability to monitor performance in real-time, and gather critical information about network flows and traffic."
"I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation. These allow me to select to whom to do what, and when."
"We're using it more for reporting, that's all. We're using it to help our customers to pass any kind of audits that they receive."
"The vulnerability scanning is helpful to identify the areas that need patching or fixes installed."
"OTX is a great module that lets staff maintain and monitor updates regarding events in the infrastructure and takes decision to improve the security perimeter."
"The vulnerability manager and the file integration are very good."
"The solution is stable."
"It brought our logs into one place for review and set up alarms based on changes we were missing due to lack of having one place for everything to go."
"Reports are customized, so you can present them to executives or engineers."
"The most valuable feature of the solution is the ease of deployment that it provides to users. The integrations that the product has with third-party applications are useful."
"You need some technical expertise to use the solution. I don't think it's accessible to the typical end-user. You need to access the box and use some command lines or the web interface. It would be nice to have a user-friendly dashboard and comprehensive reporting."
"The web administration tool that allows administration in the browser must be developed even more."
"I would like it to be the administrator of equipment or Next Generation firewalls (which have to be managed on this platform) and to be able to manage other services (like Harmony) that also belong to Check Point."
"It could improve by showing DNS-specific information for connections to unknown public IPs."
"I guess it lacks in providing visibility of the many incidents."
"While the console and administration work well, they have to work on performance since it consumes a lot of CPU and memory."
"For those not familiar with the Command Line interface, there should be an option in the GUI for operating backups."
"We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners."
"Windows log collection works with HIDS, but documentation is sparse and confusing."
"Sometimes the log is unclear, and the report is a bit ambiguous."
"The solution already has quite good tools, however, they need better integration tools for linking with Office 365, Google Suite, and so on."
"The only complex area of the setup was writing the custom scripts."
"Their threat intelligence platform needs to be broadened. They should integrate it with more threat intelligence platforms. For the threat feed that they get from open intelligence, I would like them to add a few premium threat intelligence platforms. They can provide a bundle in which AlienVault has the threat intelligence background of other premium products."
"The reporting aspect could be improved. While there are a lot of different options available, there are still pieces which are missing."
"Reporting is convoluted and difficult at times, although they claim to have hundreds of pre-built reports, very few of them are actually useful for anything but what the USM is doing."
"The one thing I continue to dislike about the USM is the limitation on reports."
More Check Point Security Management Pricing and Cost Advice →
Check Point Security Management is ranked 9th in Log Management with 56 reviews while USM Anywhere is ranked 15th in Log Management with 113 reviews. Check Point Security Management is rated 8.8, while USM Anywhere is rated 8.4. The top reviewer of Check Point Security Management writes "Great DDoS protection, high availability, and useful firewall rule implementation". On the other hand, the top reviewer of USM Anywhere writes "Easy to use and affordable". Check Point Security Management is most compared with Wazuh, Fortinet FortiAnalyzer, IBM Security QRadar, LogRhythm SIEM and Splunk Cloud Platform, whereas USM Anywhere is most compared with Wazuh, AlienVault OSSIM, IBM Security QRadar, Splunk Enterprise Security and Microsoft Sentinel. See our Check Point Security Management vs. USM Anywhere report.
See our list of best Log Management vendors.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.