Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Graylog Enterprise comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 8, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Log Management
8th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
69
Ranking in other categories
Advanced Threat Protection (ATP) (11th), Threat Intelligence Platforms (6th)
Graylog Enterprise
Ranking in Log Management
15th
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
21
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of September 2025, in the Log Management category, the mindshare of Check Point Security Management is 0.4%, down from 0.5% compared to the previous year. The mindshare of Graylog Enterprise is 6.2%, up from 6.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Log Management Market Share Distribution
ProductMarket Share (%)
Check Point Security Management0.4%
Graylog6.2%
Other93.4%
Log Management
 

Featured Reviews

NareshKumar10 - PeerSpot reviewer
Enhanced Internal Security and Efficiency
Check Point Security Management can be improved by addressing a negative challenge I face: sometimes it does not show internet utilization in the GUI. When I ask support, they tell me to upgrade the firmware, which happens quite frequently. Since I deployed the device in my on-premises environment 1.5 years ago, I have experienced this issue three times. Check Point Security Management has not impacted my daily work or decision-making in any negative way. As an IT person, I occasionally need to check how much internet bandwidth has been used in the internal network over the past month, day, or week. During those times, when I open the data utilization column, it shows nothing available. Each time this happens, I need to upgrade to the latest version of the firmware, and this frequent updating affects my productivity negatively. If Check Point addresses this issue in the future, it will be beneficial for all customers using Check Point SMBs.
Ivan Kokalovic - PeerSpot reviewer
Facilitates backend service monitoring with efficient log retrieval and API flexibility
Graylog is valuable because it bridges technical knowledge to non-technical teams, presenting complex backend processes in a simple timeline. It boosts the knowledge of sales and customer support teams by allowing them to see the backend operations without needing to read the code. Its API is flexible for visualization, and its powerful search engine efficiently handles large volumes of log data. Moreover, its stability, fast search capabilities, and compatibility with languages like ANSI SQL enhance its utility in IT infrastructure.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We can easily push the policies to any of our gateways."
"The intuitive interface also allows new team members to adapt to the technology if they are not familiar with it initially. It doesn't take much for one to familiarize themselves with the product."
"The tool is cost-effective."
"Check Point Security Management is very useful when compared to other devices."
"The best feature Check Point Security Management offers is definitely the log management; I've worked with other firewall vendors and the overview of the logs that you get in Check Point Security Management is superb."
"Regarding the tool's valuable features, I would say that Check Point is a very accessible and fast tool, especially when dealing with logs for the first time."
"The product's installation phase was easy."
"The most valuable feature of Check Point Security Management is the high level of visibility"
"It is used as a log manager/SIEM. It provides visibility into the infrastructure and security related events."
"Real-time UDP/GELF logging and full text-based searching."
"It has data adapters and lookup tables that utilize HTTP calls to APIs."
"The product is scalable. The solution is stable."
"One of the most valuable features is that you are able to do a very detailed search through the log messages in the overview."
"Graylog is very handy."
"Graylog is valuable because it bridges technical knowledge to non-technical teams, presenting complex backend processes in a simple timeline."
"Storing logs in Elasticsearch means log retrieval is extremely fast, and full text search is available by default."
 

Cons

"I like that the Compliance software blade is available for free with the Security Management server purchase, but it is free for only one year - after that you have to buy an additional license to continue using it. I think such an important feature is vital for the management server, and should not be licensed separately."
"For those not familiar with the Command Line interface, there should be an option in the GUI for operating backups."
"Check Point is highly regarded for its effectiveness and the three-layer architecture for security, comprising the client, Security Management, and secure management console, integrated with firewall capabilities."
"Installing a policy takes a very long time to complete."
"You need some technical expertise to use the solution. I don't think it's accessible to the typical end-user. You need to access the box and use some command lines or the web interface. It would be nice to have a user-friendly dashboard and comprehensive reporting."
"As per personal experience and based on many organizations, Check Point needs to improve PS services."
"The upgrade procedure already made huge improvements, yet it remains more challenging compared to other products."
"In order to work management console, you need some good appliance or you need to provide more CPU and Memory to the appliance."
"Over six months, I had two similar issues where searches were performed on field "messages". It exhausted all the memory of the ES node causing an ES crash and a Graylog halt."
"We ran into problems with Elasticsearch throwing a circuit-breaking exception due to field data size being too large. It turned out that the heap size directly impacted this size in a high-throughput environment, causing unexplained instability in Graylog. We were able to troubleshoot on the Elasticsearch size, but we should have been able to reference some minimum requirements for Graylog to know that our settings weren't sufficient."
"The biggest problem is the collector application, as we wanted to avoid using Graylog Collector Sidecar due to its architecture."
"I would like to see a date and time in the Graylog Grok patterns so that I can save time when searching for a log. I like how the streams and the search query work, but adding a date and time will allow me to pull out a log in a milli-second."
"It would be great if Graylog could provide a better Python package in order to make it easier to use for the Python community."
"More complex visualizations and the ability to execute custom Elasticsearch queries would be great."
"Graylog needs to improve their authentication. Also, the fact that Graylog displays logs from the top down is just ridiculous."
"Dashboards, stream alerts and parsing could be improved."
 

Pricing and Cost Advice

"Do the homework because Check Point is rather expensive."
"The solution is expensive and there is an annual license."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"Price-wise, it is an expensive solution."
"The solution is expensive."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"This product can be used for 25 security gateways on a basic license."
"If you want something that works and do not have the money for Splunk or QRadar, take Graylog.​​"
"Graylog is a free open-source solution. The free version has a capacity limitation of 2 GB daily, if you want to go above this you have to purchase a license."
"There is an open source version and an enterprise version. I wouldn't recommend the enterprise version, but as an open source solution, it is solid and works really well."
"We are using the free version of the product. However, the paid version is expensive."
"Consider Enterprise support if you have atypical needs or setup requirements.​"
"​You get a lot out-of-the-box with the non-enterprise version, so give it a try first."
"I am using a community edition. I have not looked at the enterprise offering from Graylog."
"It's an open-source solution that can be used free of charge."
report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
867,299 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Comms Service Provider
8%
Financial Services Firm
8%
Manufacturing Company
7%
Computer Software Company
16%
Comms Service Provider
11%
Government
8%
University
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business34
Midsize Enterprise30
Large Enterprise41
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise4
Large Enterprise7
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
The needed improvements in Check Point Security Management depend very much on the customer's infrastructure. For example, an appliance has an easier time than someone with VMs. With VMs, there can...
What is your primary use case for Check Point Security Management?
My main use case for Check Point Security Management is to troubleshoot or add policy, depending on the situation. It could be both, but mainly troubleshooting. We go and take care of the customer'...
What do you like most about Graylog?
The product is scalable. The solution is stable.
What is your experience regarding pricing and costs for Graylog?
I am not familiar with the pricing details of Graylog, as I was not responsible for that aspect. It was determined that we didn't need an enterprise plan, which is more suited for clients with less...
What needs improvement with Graylog?
An improvement I would suggest is in Graylog's user interface, such as allowing for font size adjustments. A potential enhancement could be the integration with Ollama to run large language models ...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
Graylog2
 

Overview

 

Sample Customers

Hedgetec, Geiger
Blue Cross Blue Shield, eBay, Cisco, LinkedIn, SAP, King.com, Twilio, Deutsche Presse-Agentur
Find out what your peers are saying about Check Point Security Management vs. Graylog Enterprise and other solutions. Updated: July 2025.
867,299 professionals have used our research since 2012.