We performed a comparison between Check Point Security Management and Wazuh based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point Security Management is praised for its centralized management features, user-friendly interface, and extensive monitoring capabilities. Wazuh stands out for its effortless integration, excellent log monitoring capabilities, and ELK-based investigation. Check Point Security Management could improve by simplifying the migration of security policies, optimizing performance, and expanding its management API. Other pain points include threat tracking and documentation. Wazuh needs improvements in event source coverage, threat intelligence integration, and real-time monitoring of Unix systems.
Service and Support: Check Point Security Management's customer service is widely praised for being knowledgeable, supportive, and reliable. Although some users had problems with inexperienced agents and coordination issues, the overall support experience is positive. Wazuh's customer service is generally deemed satisfactory, and many customers noted that they could easily find answers from community forums.
Ease of Deployment: Check Point Security Management is generally seen as easy to set up if the user has some expertise. Some users said that Wazuh’s setup is easy and fast, while others perceived it as complicated and said it required a significant amount of time.
Pricing: Check Point Security Management is seen as a solid investment, offering flexibility and a good value for the price. Wazuh is a cost-effective option as it is open-source and completely free to acquire.
ROI: Check Point users said the solution offers a steady ROI over time. Wazuh's MSP program and partnerships offer opportunities to generate revenue from the platform.
"The fact that everything starts from the same unified management console makes it very easy to integrate new equipment or functionalities once the operator has become familiar with it, as everything will follow similar management or operation mechanisms."
"Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it."
"The layered architecture is really understandable and easy to use."
"The most valuable feature of Check Point Security Management is the high level of visibility"
"It provides for capabilities and has allowed us to be more scalable."
"Check Point Security Management Server offers a wide range of security features, including firewall, intrusion prevention, VPN, application control, and threat prevention capabilities."
"Security Management gives us complete visibility into our security operations, allowing administrators to identify and address problem areas, reduce unnecessary costs, and improve efficiency. It offers detailed reports on network usage and security, which helps my company to monitor and control its security expenses."
"The control is granular, so you can set policy profiles for different organizational profiles."
"I like the features we use, including malware detection, inventory, detection of hidden processes, and activity logs. Inventory is probably the most important feature. It tells us when processes and packages were installed and what they are, which is helpful."
"I find the PCI DSS feature the most valuable, along with the feature that monitors the compliance of Windows and the CIS benchmarks on other devices like Unix or Linux systems."
"Good for monitoring, active response, and for vulnerabilities."
"Integrates with various open-source and paid products, allowing for flexibility in customization based on use cases."
"It is a stable solution."
"The log monitoring and analysis tools are great in addition to SIEM file activity monitoring."
"The most valuable features are the modules and metrics."
"Wazuh offers numerous features, such as the ability to define custom rules for detecting malicious activities and remembering behaviors."
"The web administration tool that allows administration in the browser must be developed even more."
"Being a security appliance, there should be the ability for the Security Management server to send email alerts via authenticated email."
"The usability of the solution could be improved."
"We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners."
"Check Point could improve by enhancing the networking in their solution in order to align it with the existing network architecture."
"I guess it lacks in providing visibility of the many incidents."
"Installing a policy takes a very long time to complete."
"Among the things that I would like in the future is for the solution to have its application on Android and iOS, as many of the administrators have adopted remote administration positions due to what has happened since the pandemic. This would help us to have an easier and simpler administration."
"Wazuh needs more security and features, particularly visualization features and a health monitor."
"The biggest part that's missing is threat intelligence. It isn't inbuilt, and if a sudden incident occurs, we don't get that feedback inside the SIEM tool. That's a big gap, I see. It would be better if we could get the threat intelligence feeds integrated with the SIEM tools. That would help us push value solutions to the clients in a big way."
"The only challenge we faced with Wazuh was the lack of direct support."
"Wazuh has a drawback with regard to Unix systems. The solution does not allow us to do real-time monitoring for Unix systems. If usage increases, it would be a heavy fall on the other SIEM solutions or event monitoring solutions."
"Wazuh should come up with more in-built rules and integrations for the cloud."
"The support team could be more responsive and provide quicker replies during our working hours in Indonesia, which would be a significant improvement."
"Since it's an open-source tool, scalability is the main issue."
"A lack of certain features creates limitations."
More Check Point Security Management Pricing and Cost Advice →
Check Point Security Management is ranked 9th in Log Management with 56 reviews while Wazuh is ranked 2nd in Log Management with 38 reviews. Check Point Security Management is rated 8.8, while Wazuh is rated 7.4. The top reviewer of Check Point Security Management writes "Great DDoS protection, high availability, and useful firewall rule implementation". On the other hand, the top reviewer of Wazuh writes "It integrates seamlessly with AWS cloud-native services". Check Point Security Management is most compared with Fortinet FortiAnalyzer, IBM Security QRadar, LogRhythm SIEM, Splunk Cloud Platform and Graylog, whereas Wazuh is most compared with Elastic Security, Security Onion, AlienVault OSSIM, Splunk Enterprise Security and Graylog. See our Check Point Security Management vs. Wazuh report.
See our list of best Log Management vendors.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.