This solution is used to validate the firewalls, and it performs this function very well.
Security Specialist at a insurance company with 501-1,000 employees
URL filtering helps us control what people are accessing
Pros and Cons
- "URL filtering is a very important feature."
- "The usability of the solution could be improved."
What is our primary use case?
How has it helped my organization?
It helps us control what people are accessing, inside the company.
What is most valuable?
URL filtering is a very important feature.
What needs improvement?
The usability of the solution could be improved.
Buyer's Guide
Check Point Security Management
February 2026
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
881,757 professionals have used our research since 2012.
What do I think about the stability of the solution?
I think stability is good. We haven't had any trouble.
What do I think about the scalability of the solution?
The scalability looks fine.
How are customer service and support?
My company has used technical support, but I have not.
Which solution did I use previously and why did I switch?
In the past, we had a type of proxy for our URL filtering. The idea was to have everything packaged in the same solution. We removed the proxy and started to use just the firewall to control URL filtering and normal firewall rules in the same solution.
When selecting a vendor, we always check the industry reviews. Then, we analyze the features and, after that, the price-feature combination is the most important factor: which one has the best price and has the features we need.
What other advice do I have?
Pay attention to the stability of the solution because it's very critical.
I would rate this solution a nine out of 10. They need to improve the usability. It's good but it can always be better.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2026
Product Categories
Log Management Advanced Threat Protection (ATP) Threat Intelligence Platforms (TIP)Popular Comparisons
CrowdStrike Falcon
Splunk Enterprise Security
IBM Security QRadar
Elastic Security
Security Onion
Graylog Enterprise
LogRhythm SIEM
Recorded Future
Amazon CloudWatch
IBM SevOne Network Performance Management (NPM)
Fortinet FortiAnalyzer
Buyer's Guide
Download our free Check Point Security Management Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- When evaluating Log Management tools and software, what aspect do you think is the most important to look for?
- Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
- Which Windows event log monitoring tool do you recommend?
- What is the difference between log management and SIEM?
- Splunk vs. Elastic Stack
- How can Cloudtrail logs be used effectively to improve log monitoring?
- Why hot data and cold data differences in SIEM solutions are not discussed sufficiently?
- When evaluating Log Management solutions, what aspect do you think is the most important to look for?
- When evaluating Log Management solutions, what aspects do you think are the most important to look for?
- Why are Log Management tools important for companies?















