Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Graylog comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Apr 20, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
6th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
64
Ranking in other categories
Advanced Threat Protection (ATP) (13th), Threat Intelligence Platforms (6th)
Graylog
Ranking in Log Management
15th
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
21
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of July 2025, in the Log Management category, the mindshare of Check Point Security Management is 0.4%, down from 0.6% compared to the previous year. The mindshare of Graylog is 6.5%, up from 5.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management
 

Featured Reviews

NareshKumar10 - PeerSpot reviewer
Enhanced Internal Security and Efficiency
Check Point Security Management can be improved by addressing a negative challenge I face: sometimes it does not show internet utilization in the GUI. When I ask support, they tell me to upgrade the firmware, which happens quite frequently. Since I deployed the device in my on-premises environment 1.5 years ago, I have experienced this issue three times. Check Point Security Management has not impacted my daily work or decision-making in any negative way. As an IT person, I occasionally need to check how much internet bandwidth has been used in the internal network over the past month, day, or week. During those times, when I open the data utilization column, it shows nothing available. Each time this happens, I need to upgrade to the latest version of the firmware, and this frequent updating affects my productivity negatively. If Check Point addresses this issue in the future, it will be beneficial for all customers using Check Point SMBs.
Ivan Kokalovic - PeerSpot reviewer
Facilitates backend service monitoring with efficient log retrieval and API flexibility
Graylog is valuable because it bridges technical knowledge to non-technical teams, presenting complex backend processes in a simple timeline. It boosts the knowledge of sales and customer support teams by allowing them to see the backend operations without needing to read the code. Its API is flexible for visualization, and its powerful search engine efficiently handles large volumes of log data. Moreover, its stability, fast search capabilities, and compatibility with languages like ANSI SQL enhance its utility in IT infrastructure.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The unique management using Smart Console for all firewalls is very useful."
"The layered architecture is really understandable and easy to use."
"It's a great solution for management. We can manage a lot at the same time with one security management system. Also, each gateway depends on the other, which is helpful."
"The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration."
"Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it."
"The fact that everything starts from the same unified management console makes it very easy to integrate new equipment or functionalities once the operator has become familiar with it, as everything will follow similar management or operation mechanisms."
"We can easily push the policies to any of our gateways."
"Each department can easily share data with the management without fear of data compromise."
"We run a containerized microservices environment. Being able to set up streams and search for errors and anomalies across hundreds of containers is why a log aggregation platform like Graylog is valuable to us."
"What I like about Graylog is that it's real-time and you have access to the raw data. So, you ingest it, and you have access to every message and every data item you ingest. You can then build analytics on top of that. You can look at the raw data, and you can do some volumetric estimations, such as how big traffic you have, how many messages of data of a type you have, etc."
"We have scaled from a single machine installation (a VM with a Graylog + ES + MongoDB) to (2 Graylog + 2 ES + 3 MongoDB). This was done smoothly with a minimal impact on logging."
"The solution's most valuable feature is its new interface."
"I am very proud of how very stable the solution is."
"It is used as a log manager/SIEM. It provides visibility into the infrastructure and security related events."
"Open source and user friendly."
"This had increased productivity for the dev and support teams, because we are directly notifying them."
 

Cons

"The tool is expensive."
"Check Point's hybrid cloud integration needs significant improvements. These resources need to evolve as data transfers to the cloud increase, so hybrid cloud models are easier to implement. Better hybrid cloud integration would improve how we manage our security logs and provide our administrators with a low-cost solution that enables them to meet all our essential requirements."
"There's a lot of logs, and I'm unsure about their validity, however, they take up a lot of space. We had to provision the virtual machine twice."
"License update and upgrade processes can be made a little easier."
"They could offer educational courses to help individuals improve their knowledge and skills."
"The graphical interface is nice but it is a bit heavy."
"If the SmartView monitor can be integrated in the R80.40 and R81 versions, that would be ideal in understanding the trends and graphs of how traffic is observed hitting the different Check Point Firewall Gateways that the Security Management controls."
"Sometimes the security system slows down when it is overloaded."
"When it comes to configuring the processing pipeline, writing the rules can be very tedious, especially since the documentation isn't extensive on how the functions provided for these rules work."
"There should be some user groups and an auto sign-in feature.​"
"I would like to see a default dashboard widget that shows the topology of the clusters defined for the graylog install."
"With technical support, you are on your own without an enterprise license."
"The biggest problem is the collector application, as we wanted to avoid using Graylog Collector Sidecar due to its architecture."
"When it comes to configuring the processing pipeline, writing the rules can be very tedious, especially since the documentation isn't extensive on how the functions provided for these rules work."
"More complex visualizations and the ability to execute custom Elasticsearch queries would be great."
"Elasticsearch recommendations for tuning could be better. Graylog doesn't have direct support for running the system inside of Kubernetes, so it can be challenging to fill in the gaps and set up containers in a way that is both performant and stable."
 

Pricing and Cost Advice

"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"Price-wise, it is an expensive solution."
"The solution is expensive."
"The solution is expensive and there is an annual license."
"This product can be used for 25 security gateways on a basic license."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"Do the homework because Check Point is rather expensive."
"Consider Enterprise support if you have atypical needs or setup requirements.​"
"If you want something that works and do not have the money for Splunk or QRadar, take Graylog.​​"
"​You get a lot out-of-the-box with the non-enterprise version, so give it a try first."
"There is an open source version and an enterprise version. I wouldn't recommend the enterprise version, but as an open source solution, it is solid and works really well."
"I am using a community edition. I have not looked at the enterprise offering from Graylog."
"Having paid official support is wise for projects."
"We're using the Community edition."
"It's an open-source solution that can be used free of charge."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
860,168 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
11%
Government
9%
Comms Service Provider
7%
Computer Software Company
17%
Comms Service Provider
10%
University
7%
Educational Organization
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
Check Point Security Management can be improved by addressing a negative challenge I face: sometimes it does not show internet utilization in the GUI. When I ask support, they tell me to upgrade th...
What is your primary use case for Check Point Security Management?
My main use case for Check Point Security Management is using it as a firewall, which ignores all my data threats, and it is useful to secure my inside IT infrastructure. It secures all the data an...
What do you like most about Graylog?
The product is scalable. The solution is stable.
What is your experience regarding pricing and costs for Graylog?
I am not familiar with the pricing details of Graylog, as I was not responsible for that aspect. It was determined that we didn't need an enterprise plan, which is more suited for clients with less...
What needs improvement with Graylog?
An improvement I would suggest is in Graylog's user interface, such as allowing for font size adjustments. A potential enhancement could be the integration with Ollama to run large language models ...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
Graylog2
 

Overview

 

Sample Customers

Hedgetec, Geiger
Blue Cross Blue Shield, eBay, Cisco, LinkedIn, SAP, King.com, Twilio, Deutsche Presse-Agentur
Find out what your peers are saying about Check Point Security Management vs. Graylog and other solutions. Updated: June 2025.
860,168 professionals have used our research since 2012.