Listing Thumbnail

    Check Point Security Management

     Info
    Deployed on AWS
    Free Trial
    A single pane-of-glass security management console delivers consistent visibility, policy management, logging, reporting and control across all cloud environments and networks
    4.4

    Overview

    Play video

    Check Point Security Management provides an advanced security management platform for enterprises to deploy protections across their organizations, across public, private and hybrid clouds.

    Efficient: Automation and granular delegation help alleviate operational overhead. The Security Management API allows security teams to automate any task or create web portals for security self-service. Management interface features anticipate the administrator's daily needs, providing security intelligence to make better policy decisions.

    Fully Integrated: Security Management has logging, monitoring, event correlation and reporting in one place. A visual dashboard provides full visibility into security across the network, helping organizations monitor the status of enforcement points and stay alert to potential threats. The customizable dashboard provides a full view of the security posture and drilldown capabilities into incident or log details. Reports are configurable and accessible from any web browser.

    Security Management is required to control CloudGuard Network Security Gateways.

    Customers requiring security management for up to 5 Security Gateways may deploy this offering on instances with less than 8 compute cores. Managing more than 5 Gateways on an instance with less than 8 compute cores is not supported. Customers requiring security management for up to 25 Security Gateways must deploy this offering on instances with 8 or more compute cores.

    Customers requiring security management for more than 25 Security Gateways should contact Check Point or purchase BYOL.

    To maintain the highest quality and security of our management solutions, Check Point recommends installing the latest recommended Jumbo Hotfix, especially after the initial deployment.

    Highlights

    • One Platform, One Policy a single pane of glass console manages the entire IT infrastructure - from the data center to private/public/hybrid cloud deployments - for full visibility, security efficiency and consistency. The policy can be segmented into layers for seamless network segmentation.
    • Extensible, Scalable Platform: The Security Management platform scales to the most complex and dynamic environments. The RESTful APIs make it easy to integrate securely with orchestration, change management and ticketing systems, enabling automated security change control and provisioning.
    • Check Point is an APN Advanced Technology Partner with Networking and Security Competencies. CloudGuard Network Security is integrated with a broad range of AWS services, including Amazon GuardDuty, Amazon CloudWatch, AWS Security Hub, AWS Transit Gateway, AWS CloudTrail and VPC Flow Logs. CloudGuard Network Security also provides a library of CloudGuard CloudFormation templates (CFTs) to simplify deployment.

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    OtherLinux Gaia 3.10

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free for 30 days according to the free trial terms set by the vendor. Usage-based pricing is in effect for usage beyond the free trial terms. Your free trial gets automatically converted to a paid subscription when the trial ends, but may be canceled any time before that.

    Check Point Security Management

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time. Alternatively, you can pay upfront for a contract, which typically covers your anticipated usage for the contract duration. Any usage beyond contract will incur additional usage-based costs.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (179)

     Info
    • ...
    Dimension
    Cost/hour
    c6in.xlarge
    Recommended
    $0.62
    m8i.4xlarge
    $1.83
    r5a.4xlarge
    $1.83
    r5n.12xlarge
    $1.83
    m8i.metal-96xl
    $97.34
    m6i.2xlarge
    $0.62
    r5b.2xlarge
    $0.62
    m7i.2xlarge
    $0.62
    c5.18xlarge
    $1.83
    r5n.xlarge
    $0.62

    Vendor refund policy

    Terminate the instance at any given time to stop incurring charges.

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Additional details

    Usage instructions

    Once the instance is running, connect to it using SSH, set an admin password using: 'set user admin password' followed by 'save config'. Then connect to https://[instance] using Internet Explorer (IE) to finalize the configuration. Notes:

    1. SSH password authentication is disabled in /etc/ssh/sshd_config
    2. For information regarding Firefox and Chrome refer to sk121373.

    Support

    Vendor support

    This offer includes Premium Support. For the full list of included support services visit: https://www.checkpoint.com/support-services/support-plans/  To open a support ticket, you would need to have a Check Point user center account. If you do not have a user center account, you can sign up for one here: https://accounts.checkpoint.com . Need support? Contact us at https://www.checkpoint.com/support-services/contact-support/ 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    25
    In Network Infrastructure
    Top
    10
    In Network Infrastructure

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Security Management Platform
    Advanced security management platform for deploying protections across public, private, and hybrid cloud environments
    Policy Automation
    RESTful APIs enable integration with orchestration, change management, and ticketing systems for automated security control and provisioning
    Centralized Monitoring
    Visual dashboard providing comprehensive visibility into network security status with event correlation and customizable reporting capabilities
    Multi-Environment Integration
    Supports management of security gateways across diverse cloud and network infrastructures with consistent policy enforcement
    Security Intelligence
    Granular delegation and management interface features that provide actionable insights for enhanced security policy decision-making
    Network Virtualization
    Secure virtual private network (VPN) gateway for connecting remote sites and branch offices
    Advanced Threat Protection
    Dynamic security controls with application layer exfiltration security and advanced evasion techniques (AETs) identification
    Intrusion Prevention
    Integrated advanced Intrusion Prevention System (IPS) with capability to stop Advanced Evasion Techniques
    Security Policy Management
    Centralized policy configuration with global update capabilities across network infrastructure
    Malware Detection
    Sandboxing technology for identifying zero-day attacks and advanced malware
    Network Traffic Inspection
    Advanced layer-7 application visibility and control with comprehensive traffic inspection capabilities
    Threat Prevention Technology
    AI/ML-powered security engine with researcher-grade signatures for detecting known and zero-day threats
    Cloud Security Integration
    Native integration with AWS infrastructure components including Gateway Load Balancer, Auto Scaling, and Transit VPC
    Dynamic Policy Management
    Automated policy application using AWS tags, Application IDs, User IDs, geographies, and network zones
    Deployment Flexibility
    Seamless deployment through EC2 instance creation workflow with cloud-native form factor

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.4
    52 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    29%
    69%
    2%
    0%
    0%
    4 AWS reviews
    |
    48 external reviews
    External reviews are from G2  and PeerSpot .
    Ruben Cordero

    Centralized policies have streamlined operations and improved incident response across multiple environments

    Reviewed on Nov 22, 2025
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Check Point Security Management  is for centralizing my different gateways in different sites, such as Azure , on-premise, and other clouds, which allows me to control, see events, and make different policies over my security in different sites at the same time.

    Managing those different sites with Check Point Security Management  is much easier because the policies can be applied centrally and pushed out across Azure , on-premise, and other cloud environments, allowing me to update changes in one management console that automatically syncs everywhere, which saves time and avoids inconsistency. Monitoring events is also streamlined since all logs and alerts feed into the single dashboard.

    One unique aspect of our setup with Check Point Security Management is how we manage policies across both traditional on-premise firewalls and multiple cloud environments simultaneously, relying on a centralized console to push consistent rules everywhere, which keeps our workflow simple and avoids misconfigurations.

    What is most valuable?

    The best feature of Check Point Security Management for me is the Advanced Threat Prevention because it integrates protection against malware, phishing, and network attacks in different blades or gateways, alongside centralized policy management.

    One more feature worth highlighting about Check Point Security Management is how advanced threat prevention and centralized policy management work together to simplify our daily operations, as threat prevention tools automatically block malware and phishing attempts across all environments while centralized policies ensure those protections apply consistently everywhere, significantly reducing the gaps between sites or platforms and lessening the team's troubleshooting time.

    Check Point Security Management has positively impacted our organization by streamlining different policy management in a single console, and incident response has also become faster because all alerts and logs feed into one security tool or management tool, giving us immediate visibility without needing to switch between tools.

    What needs improvement?

    Check Point Security Management could be improved with better reporting and dashboard customization options, as having more tailored insights for different stakeholders would enhance visibility, but this is a minor concern.

    For how long have I used the solution?

    I have been using Check Point Security Management for five years.

    What do I think about the stability of the solution?

    In my experience, Check Point Security Management is very stable.

    What do I think about the scalability of the solution?

    Check Point Security Management is very scalable in our organization, and we have had no problems with it at all.

    How are customer service and support?

    The customer support is very fast, and I love the support.

    How would you rate customer service and support?

    Positive

    What was our ROI?

    I have seen a return on investment, mainly in terms of the time saved.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup costs, and licensing is great, and I find the pricing to be good for me.

    What other advice do I have?

    Check Point Security Management should be considered by others as the best centralized management for different gateways, as it is an excellent tool that I recommend to others.

    Check Point Security Management is deployed in a hybrid cloud environment in our organization.

    We use Azure as our cloud provider.

    I did purchase Check Point Security Management through the Azure marketplace.

    Incident response has improved significantly; for example, phishing attempts or firewall misconfigurations that used to take a full day to investigate can now be identified and addressed within a couple of hours, freeing up the team around two to five hours per week.

    Check Point Security Management is very scalable in our organization, and we have had no problems with it at all.

    I give this review a rating of ten out of ten.

    Cristopher Z

    Centralized control has saved time and improved policy consistency across hybrid environments

    Reviewed on Nov 21, 2025
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Check Point Security Management  is to centralize my gateways located in different sites, for example, Azure , on-premise, and AWS , and create policies to control all the security management in one site.

    A specific way I use Check Point Security Management  to manage policies or control security across different sites is through the centralized console. For example, I can create one policy for web filtering and endpoint protection and apply it to all branch offices at once. If a new threat emerges, I update the rules in the console and it's pushed instantly to every site without needing to locate chains. This saves time and ensures consistent protection everywhere, and it also gives me clear visibility and activity across all locations from a single dashboard.

    Another important use of Check Point Security Management in my environment is unified visibility across all sites, as I rely on the console not only to push policies but also to monitor logs and alerts in real-time.

    Centralizing sites, management, and control is possible with Check Point Security Management.

    What is most valuable?

    The best feature that Check Point Security Management offers me is the single unified console because I can manage firewall, endpoints, cloud, and threat prevention policies from one place, which reduces complexity and ensures consistency across the organization.

    The unified console in Check Point Security Management helps my team day-to-day by saving time, as the department has more free time because the security management console reduces the network admin security time.

    Check Point Security Management has had a very positive impact on our organization, as the centralized console has reduced the time spent managing policies across sites by more than half. I now push updates instantly instead of coordinating separate changes at each location. The visibility has also improved since I can monitor logs and alerts in real-time from one place, leading to faster incident response and fewer disruptions for users. Overall, it has increased efficiency and given us stronger confidence in our security posture.

    I estimate about a 30-40% reduction in time spent on our routine management tasks with Check Point Security Management, and incident response has improved with alerts consolidated in one place, cutting investigation time by nearly half. This change has freed my team to focus more on proactive security projects and other tasks.

    Another feature I appreciate is the strong role-based access control because it allows me to assign different levels of permissions to administrators so teams can work in parallel without overlapping or risking unauthorized changes. I also appreciate the detailed logging and audit trails which make compliant reporting much easier, giving us both flexibility and accountability while keeping overall management streamlined.

    What needs improvement?

    Check Point Security Management could be improved with more intuitive documentation, as it is not currently intuitive. When I needed to deploy for the first time, it was very difficult.

    For how long have I used the solution?

    I have been using Check Point Security Management for around four years.

    What do I think about the stability of the solution?

    Check Point Security Management is very stable.

    What do I think about the scalability of the solution?

    Check Point Security Management is very scalable as I need to create different security tools and it is always on, providing more flexible scalability.

    How are customer service and support?

    The customer support for Check Point Security Management is great and very fast.

    How would you rate customer service and support?

    Positive

    What was our ROI?

    I have seen a return on investment in Check Point Security Management, mainly because it saves time since employees have more free time to do different tasks in other areas.

    What's my experience with pricing, setup cost, and licensing?

    The pricing is great, and I have no problem with this topic.

    What other advice do I have?

    My advice for others looking into using Check Point Security Management is that centralized policy control and security for their gateways and other blades is excellent, so I recommend this security tool. I am providing this review with an overall rating of 8.

    Luis Zamora

    Centralized management has improved monitoring and streamlined policy control

    Reviewed on Nov 19, 2025
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Check Point Security Management  is centralizing my different gateways into the company, because I have a gateway in Azure  and on-premise, and I typically use it for day-to-day management.

    My main use case for Check Point Security Management  also includes monitoring and logs, as I create sites or portals in one centralized portal because I need to see different events in different sites with my gateways.

    How has it helped my organization?

    Check Point Security Management has positively impacted my organization by defining how we oversee and enforce security policies across the entire infrastructure. Instead of juggling multiple consoles, we now have a single, unified view that makes monitoring and response much faster.

    The specific outcome is about the saved time because the IT support team reduced their workload by 20% hours a day.

    What is most valuable?

    The best features Check Point Security Management offers for me include real granular policy control, as the availability to define very specific rules for different users, applications, and environments ensures that security is tailored rather than one-size-fits-all.

    Granular control has helped me in practice. For example, we had a project team working with an external partner who needed access to certain cloud collaboration tools that weren't normally allowed on the corporate network. Using granular policy control, we created a rule that applied only to the team's device and only during working hours, while keeping the rest of the organization restricted. This meant the project could move forward smoothly without compromising overall security.

    Another feature worth highlighting is the role-based access control, as it allows us to assign different levels of permission to administrators, auditors, and operations, so each person only sees and manages what's relevant to their role. This reduces the risk of accidental misconfigurations and keeps responsibility clearly separate.

    Centralized administration is also a great feature.

    What needs improvement?

    Check Point Security Management could be improved by enhancing the documentation, as Check Point needs to create more and easier documentation.

    For how long have I used the solution?

    I have been using Check Point Security Management for around six years.

    What do I think about the stability of the solution?

    Check Point Security Management is stable.

    What do I think about the scalability of the solution?

    The scalability of Check Point Security Management is wonderful.

    How are customer service and support?

    The customer support is very fast, and I have no problems with this.

    How would you rate customer service and support?

    Neutral

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup cost, and licensing is moderate because I think the pricing is great but somewhat high.

    What other advice do I have?

    Check Point Security Management is a great opportunity for centralizing your gateways, as it presents an excellent opportunity. I would rate this product an 8 out of 10.

    VikasTiwari

    Manages multiple firewalls across locations through one dashboard and simplifies remote VPN configuration

    Reviewed on Nov 18, 2025
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Check Point Security Management  is to use the management server and all the security features of Check Point Gateway, allowing me to easily integrate and manage all firewalls within one dashboard.

    I manage my firewalls through the dashboard by overseeing cluster management of active and standby devices, easily publishing and writing firewall policies based on five-tuples such as source IP, destination IP, source port, destination port, as well as configuring and monitoring both side-to-side and remote VPN activities.

    What is most valuable?

    The best features of Check Point Security Management  are its cluster environment, which speeds up performance through SecureXL and ClusterXL, and its robust threat management tools that provide vulnerability exposure and virus mitigation capabilities.

    ClusterXL and threat management have helped me by enhancing performance through redundancy in active and standby firewalls, allowing for multiple security gateways to operate smoothly within the security management setup.

    Additionally, IPS is enabled, and I can integrate Check Point Infinity  solutions through the Infinity  portal, which allows for easy policy pushing and customization.

    Check Point Security Management has positively impacted my organization by enabling me to set up various location firewalls in one dashboard, which is a significant benefit I have noticed. It saves me time and reduces complexity, as the friendly dashboard allows me to see all logs, policies, monitoring, auditing tools, and issues related to VPN and traffic, making it easy to manage everything efficiently.

    What needs improvement?

    Check Point Security Management can be improved; the recent R82 version is AI-enabled with increased security but I have encountered issues during upgrades, requiring backups to prevent potential disasters.

    I recommend ensuring that backups are taken before any maintenance to avoid complications during upgrades.

    For how long have I used the solution?

    I have been working in my current field for the last six years.

    What do I think about the stability of the solution?

    Check Point Security Management is stable; I have experienced no downtime as long as HA is maintained during upgrades.

    What do I think about the scalability of the solution?

    Check Point Security Management does not have notable scalability options.

    How are customer service and support?

    Customer support for Check Point Security Management is excellent; I would rate it a 10 out of 10.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have not switched from Check Point Security Management; my organization continues to use it.

    How was the initial setup?

    The setup was facilitated by the Azure Marketplace .

    What about the implementation team?

    I purchased Check Point Security Management through the Azure Marketplace .

    What was our ROI?

    I have seen a return on investment, as it only takes one to two employees to understand and manage policies effectively, leading to savings in employee costs.

    What's my experience with pricing, setup cost, and licensing?

    In terms of pricing, I find the pay-as-you-go model convenient, and I have utilized an enterprise license, making it easier on cost management, handled mainly by the procurement and licensing teams.

    Which other solutions did I evaluate?

    Before choosing Check Point Security Management, I evaluated some other management tools based on traffic handling and RMA policy capabilities, which helped me make my choice.

    What other advice do I have?

    I advise others considering Check Point Security Management to choose this product confidently because it has all types of features, including NGFW, VPN policies, DDoS, UTM features, and seamless integration capabilities with Check Point Infinity software for managing gateways across different locations. I would rate this product a 10 out of 10.

    Roy Lopez

    Simplified threat detection and reduced policy deployment time

    Reviewed on Nov 15, 2025
    Review provided by PeerSpot

    What is our primary use case?

    Check Point Security Management  centralizes the management and control over different site gateways, for example, in Azure  or on-premise, allowing me to streamline security processes.

    When I create different policies or VPNs or view activity or logs, I need to look at one site. In this case, Check Point Security Management  provides everything for this scenario, offering me a comprehensive view.

    When I need to prevent different threats over the network, I access Check Point Security Management and view the events or logs for different threats or suspicious activities, which enhances my overall security strategy.

    What is most valuable?

    The standout features of Check Point Security Management are unified policy management, real-time visibility, and automation capabilities, making it a powerful tool for security management.

    Consistency across environments with Check Point Security Management helps me ensure that instead of maintaining separate rules for firewalls, cloud workloads, and data centers, we apply one unified policy that covers them all. This reduces misconfigurations and ensures compliance, proving to be a time-saver because rolling out a new rule or updating an existing one takes minutes, not hours, because it is propagated everywhere automatically.

    Automation is one of the most valuable aspects of Check Point Security Management, and it often does not get enough attention compared to headline features like unified policies or visibility. With policy automation, routine tasks such as rule creation, compliance checks, or policy updates can be automated, reducing human error and saving hours of manual work.

    Check Point Security Management has simplified administration in my organization because instead of juggling multiple consoles, everything is managed from a single pane of glass. This has reduced complexity and saved significant time for our IT team, improving our operational efficiency.

    For a policy update, I used to spend two or three hours across multiple consoles. Now, with unified management in Check Point Security Management, it takes thirty to forty minutes, resulting in about a seventy percent reduction in effort, greatly boosting productivity.

    What needs improvement?

    While Check Point Security Management handles large environments well, performance and scalability could be improved because log queries and reporting generation can sometimes be slower under heavy loads. Optimizing performance for very large data sets would help the enterprise.

    The documentation for Check Point Security Management needs to be more intuitive for all users and for first-time implementations, making it easier to navigate and utilize effectively.

    For how long have I used the solution?

    I have been working in my current field for around five years, gaining extensive experience in technical support roles.

    I have been using Check Point Security Management for around four years, which has significantly enhanced my capabilities in managing security efficiently.

    What do I think about the stability of the solution?

    Check Point Security Management is very stable in my experience, ensuring that our operations run smoothly without interruptions.

    What do I think about the scalability of the solution?

    Check Point Security Management has very good scalability, effectively meeting our needs as our organization has grown over time.

    How are customer service and support?

    The customer support for Check Point Security Management is very fast, and for me, it is very good, providing prompt assistance when needed.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I did not previously use a different solution before Check Point Security Management, as it was my first choice for security management.

    What was our ROI?

    I consider the time saved in the department as a significant return on investment from using Check Point Security Management, which enhances overall productivity.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup cost, and licensing for Check Point Security Management is great because the pricing is normal compared with other solutions in the market.

    Which other solutions did I evaluate?

    I did not evaluate other options before choosing Check Point Security Management; it was a clear decision based on its features and capabilities.

    What other advice do I have?

    Check Point Security Management delivers strong centralized control, unified policies and management, and real-time visibility. It is not a perfect ten because there are areas that could be improved, for example, the documentation.

    I recommend Check Point Security Management as an excellent tool for security and for centralizing your gateway, making it a solid choice for organizations looking to enhance their security posture.

    I rate Check Point Security Management an eight overall, reflecting my experience with the platform.

    View all reviews