Listing Thumbnail

    Check Point Security Management

     Info
    Free Trial
    A single pane-of-glass security management console delivers consistent visibility, policy management, logging, reporting and control across all cloud environments and networks
    Listing Thumbnail

    Check Point Security Management

     Info

    Overview

    Play video

    Check Point Security Management provides an advanced security management platform for enterprises to deploy protections across their organizations, across public, private and hybrid clouds.

    Efficient: Automation and granular delegation help alleviate operational overhead. The Security Management API allows security teams to automate any task or create web portals for security self-service. Management interface features anticipate the administrator's daily needs, providing security intelligence to make better policy decisions.

    Fully Integrated: Security Management has logging, monitoring, event correlation and reporting in one place. A visual dashboard provides full visibility into security across the network, helping organizations monitor the status of enforcement points and stay alert to potential threats. The customizable dashboard provides a full view of the security posture and drilldown capabilities into incident or log details. Reports are configurable and accessible from any web browser.

    Security Management is required to control CloudGuard Network Security Gateways.

    Customers requiring security management for up to 5 Security Gateways may deploy this offering on instances with less than 8 compute cores. Managing more than 5 Gateways on an instance with less than 8 compute cores is not supported. Customers requiring security management for up to 25 Security Gateways must deploy this offering on instances with 8 or more compute cores.

    Customers requiring security management for more than 25 Security Gateways should contact Check Point or purchase BYOL.

    To maintain the highest quality and security of our management solutions, Check Point recommends installing the latest recommended Jumbo Hotfix, especially after the initial deployment.

    Highlights

    • One Platform, One Policy a single pane of glass console manages the entire IT infrastructure - from the data center to private/public/hybrid cloud deployments - for full visibility, security efficiency and consistency. The policy can be segmented into layers for seamless network segmentation.
    • Extensible, Scalable Platform: The Security Management platform scales to the most complex and dynamic environments. The RESTful APIs make it easy to integrate securely with orchestration, change management and ticketing systems, enabling automated security change control and provisioning.
    • Check Point is an APN Advanced Technology Partner with Networking and Security Competencies. CloudGuard Network Security is integrated with a broad range of AWS services, including Amazon GuardDuty, Amazon CloudWatch, AWS Security Hub, AWS Transit Gateway, AWS CloudTrail and VPC Flow Logs. CloudGuard Network Security also provides a library of CloudGuard CloudFormation templates (CFTs) to simplify deployment.

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    OtherLinux Gaia 3.10

    Typical total price

    This estimate is based on use of the seller's recommended configuration (c6in.xlarge) in the US East (N. Virginia) Region. View pricing details

    $0.847/hour

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product at no cost for 30 days according to the free trial terms set by the vendor. Usage-based pricing is in effect for usage beyond the free trial terms. Your free trial gets automatically converted to a paid subscription when the trial ends, but may be canceled any time before that.

    Check Point Security Management

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time. Alternatively, you can pay upfront for a contract, which typically covering your anticipated usage for the contract duration. Any usage beyond contract will incur additional usage-based costs.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (116)

     Info
    • ...
    Instance type
    Product cost/hour
    EC2 cost/hour
    Total/hour
    m5.large
    $0.62
    $0.096
    $0.716
    m5.xlarge
    $0.62
    $0.192
    $0.812
    m5.2xlarge
    $0.62
    $0.384
    $1.004
    m5.4xlarge
    $1.83
    $0.768
    $2.598
    m5.8xlarge
    $1.83
    $1.536
    $3.366
    m5.12xlarge
    $1.83
    $2.304
    $4.134
    m5.16xlarge
    $1.83
    $3.072
    $4.902
    m5.24xlarge
    $1.83
    $4.608
    $6.438
    m6i.large
    $0.62
    $0.096
    $0.716
    m6i.xlarge
    $0.62
    $0.192
    $0.812

    Additional AWS infrastructure costs

    Type
    Cost
    EBS General Purpose SSD (gp2) volumes
    $0.10/per GB/month of provisioned storage

    Vendor refund policy

    Terminate the instance at any given time to stop incurring charges.

    Custom pricing options

    Find a fit for enterprise or unique needs with a private offer.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Additional details

    Usage instructions

    Once the instance is running, connect to it using SSH, set an admin password using: 'set user admin password' followed by 'save config'. Then connect to https://[instance] using Internet Explorer (IE) to finalize the configuration. Notes:

    1. SSH password authentication is disabled in /etc/ssh/sshd_config
    2. For information regarding Firefox and Chrome refer to sk121373.

    Support

    Vendor support

    This offer includes Premium Support. For the full list of included support services visit: https://www.checkpoint.com/support-services/support-plans/  To open a support ticket, you would need to have a Check Point user center account. If you do not have a user center account, you can sign up for one here: https://accounts.checkpoint.com . Need support? Contact us at https://www.checkpoint.com/support-services/contact-support/ 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    26 external reviews
    External reviews are sourced from G2  and are not included in the star rating for this product.
    fabian m.

    An integrated, comprehensive security architecture

    Reviewed on Feb 07, 2023
    Review provided by G2
    What do you like best about the product?
    The tool presents some features that should be highlighted as they are:
    one of the major advantages is that it uses machine learning
    The tool has another great advantage compared to the others on the market, it manages a very low rate of alerts with a false positive
    What do you dislike about the product?
    The tool is very efficient in providing security. It has very good features, but they can make some improvements in different areas.
    They should improve the use of performance since it consumes a lot of CPU and memory. It has problems updating licenses automatically.

    You should offer training in the use of the tool since the learning curve is high.
    They should have more information available about the tool or in one place to be able to find it quickly.
    They should improve the technical support service since it is not one of the best features.
    What problems is the product solving and how is that benefiting you?
    The Check Point Security Management tool has helped our company a lot by improving the management of all the devices we manage and providing the security and proper administration to each one of them.

    Thanks to how practical the tool is, we were able to minimize security times that took us a long time on previous occasions and to be able to take advantage of them in other tasks and to simplify the work of the company's support

    It has a very efficient record management since it provides precise information which, if it is necessary to investigate, will be handy.
    Banking

    Good solution alternative to good old java based Management Console

    Reviewed on Jul 21, 2022
    Review provided by G2
    What do you like best about the product?
    Easy to use, no need to install and upgrade local management agents all the time. Can view logs, can do most of the things Agent-Based Management can do,
    What do you dislike about the product?
    Standart browser-based issues may happen. slowness etc. Also need to add some CLI commands
    What problems is the product solving and how is that benefiting you?
    Good management portal, at least no crashes like agent.
    Management Consulting

    Complete product

    Reviewed on May 06, 2022
    Review provided by G2
    What do you like best about the product?
    It is a complete product, including outstanding capabilities for rulebase management and extensive log investigation tools.
    What do you dislike about the product?
    The upgrades can be challenging, howver, since the introduction of CPUSE, it becomes better.
    What problems is the product solving and how is that benefiting you?
    As the product is easy to use, no expensive trainings are required before using the product. As it works fast and smooth, the workload reduces significantly.
    Consumer Services

    A better way to control everithing

    Reviewed on Nov 02, 2021
    Review provided by G2
    What do you like best about the product?
    What I like most is the centralized way to control most, or all your security environment is accessible to use and manage where you can create profiles for each administrator that has access to this platform
    What do you dislike about the product?
    Sometimes is a little challenging to find some options or settings that can help us to set up any security in a short period to configure new policies, inspection, or VPN setup.
    What problems is the product solving and how is that benefiting you?
    The one access to all firewalls through a one management server that controls all services on your security premises and over all the different profiles that can be created for each site having separate databases for each cluster corporation
    Computer & Network Security

    For PCI compliance, Check point is Excelent!!

    Reviewed on Oct 26, 2021
    Review provided by G2
    What do you like best about the product?
    One of the best thing is that we can get more details of each firewall by getting important data such as security overview, security modules, violations, etc., and the coolest thing is that you can print a report in case that is needed
    What do you dislike about the product?
    It is a little complecated if you want to create your charts or customize your outputs because if you don't have a good idea of what are you doing, you can get lost during the chart creation
    What problems is the product solving and how is that benefiting you?
    As a PCI compliance corporation, it has been beneficial to share any report needed
    View all reviews