Overview
Video 1
Video 1

Product video
Check Point Security Management provides an advanced security management platform for enterprises to deploy protections across their organizations, across public, private and hybrid clouds.
Efficient: Automation and granular delegation help alleviate operational overhead. The Security Management API allows security teams to automate any task or create web portals for security self-service. Management interface features anticipate the administrator's daily needs, providing security intelligence to make better policy decisions.
Fully Integrated: Security Management has logging, monitoring, event correlation and reporting in one place. A visual dashboard provides full visibility into security across the network, helping organizations monitor the status of enforcement points and stay alert to potential threats. The customizable dashboard provides a full view of the security posture and drilldown capabilities into incident or log details. Reports are configurable and accessible from any web browser.
Security Management is required to control CloudGuard Network Security Gateways.
Customers requiring security management for up to 5 Security Gateways may deploy this offering on instances with less than 8 compute cores. Managing more than 5 Gateways on an instance with less than 8 compute cores is not supported. Customers requiring security management for up to 25 Security Gateways must deploy this offering on instances with 8 or more compute cores.
Customers requiring security management for more than 25 Security Gateways should contact Check Point or purchase BYOL.
To maintain the highest quality and security of our management solutions, Check Point recommends installing the latest recommended Jumbo Hotfix, especially after the initial deployment.
Highlights
- One Platform, One Policy a single pane of glass console manages the entire IT infrastructure - from the data center to private/public/hybrid cloud deployments - for full visibility, security efficiency and consistency. The policy can be segmented into layers for seamless network segmentation.
- Extensible, Scalable Platform: The Security Management platform scales to the most complex and dynamic environments. The RESTful APIs make it easy to integrate securely with orchestration, change management and ticketing systems, enabling automated security change control and provisioning.
- Check Point is an APN Advanced Technology Partner with Networking and Security Competencies. CloudGuard Network Security is integrated with a broad range of AWS services, including Amazon GuardDuty, Amazon CloudWatch, AWS Security Hub, AWS Transit Gateway, AWS CloudTrail and VPC Flow Logs. CloudGuard Network Security also provides a library of CloudGuard CloudFormation templates (CFTs) to simplify deployment.
Details
Unlock automation with AI agent solutions

Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Free trial
- ...
| Dimension | Cost/hour | 
|---|---|
| c6in.xlarge  Recommended | $0.62 | 
| r5.xlarge | $0.62 | 
| r6i.24xlarge | $1.83 | 
| r6i.4xlarge | $1.83 | 
| m5.16xlarge | $1.83 | 
| r5.12xlarge | $1.83 | 
| m5.2xlarge | $0.62 | 
| r6i.2xlarge | $0.62 | 
| r6i.xlarge | $0.62 | 
| r5b.large | $0.62 | 
Vendor refund policy
Terminate the instance at any given time to stop incurring charges.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Additional details
Usage instructions
Once the instance is running, connect to it using SSH, set an admin password using: 'set user admin password' followed by 'save config'. Then connect to https://[instance] using Internet Explorer (IE) to finalize the configuration. Notes:
- SSH password authentication is disabled in /etc/ssh/sshd_config
- For information regarding Firefox and Chrome refer to sk121373.
Resources
Support
Vendor support
This offer includes Premium Support. For the full list of included support services visit: https://www.checkpoint.com/support-services/support-plans/ To open a support ticket, you would need to have a Check Point user center account. If you do not have a user center account, you can sign up for one here: https://accounts.checkpoint.com . Need support? Contact us at https://www.checkpoint.com/support-services/contact-support/Â
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Has improved response time through real-time monitoring and centralized administration
What is our primary use case?
My main use case for Check Point Security Management is to control my gateways and the other Check Point security tools.
In this case, I use Check Point Security Management for controller, admin, change different topics in my gateways; my gateways are in Azure and this gateway has only a gateway, with no specific controlling because for this I use Check Point Security Management in other service, specifically in Infinity Portal.
I have no additional information to add about how I use Check Point Security Management in my environment, particularly with Infinity Portal or Azure gateways.
What is most valuable?
I love the real-time monitoring feature of Check Point Security Management because when I need to see different problems or block different traffic, I need to use a tool with real-time capabilities for troubleshooting or the other documentations with the real issue.
Real-time monitoring helps me solve issues, for example, when I have a problem with the VPN; I need to view different traffic and identify different calls about the problem, or when I need to view when I have different user a problem with into others networks or something else.
Check Point Security Management positively impacts my organization as it is a great tool for completing the security checkpoints tools, making it possible to create this solution in different sites, for example, in Azure and on-premise, with the same impact or application.
What needs improvement?
The documentation of Check Point Security Management is not intuitive because it is for advanced technical support, and when I need to deploy different features, it is complicated for junior support or technical personnel.
I would like to see more intuitive documentation or easier documentation for Check Point Security Management.
For how long have I used the solution?
I have been using this solution for two years in my current field.
What do I think about the stability of the solution?
Check Point Security Management is stable in my experience.
What do I think about the scalability of the solution?
Check Point Security Management is very scalable and handles growth or changes in my organization well.
How are customer service and support?
My experience with customer support for Check Point Security Management has been very good.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I did not previously use a different solution before Check Point Security Management.
What about the implementation team?
This is a great tool for admin or controlling your gateway.
What was our ROI?
I have not seen a return on investment from using Check Point Security Management; however, it provides better time response.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing is great because I need to put the licensing in the different tools over or around Check Point. I don't know the price because it's in a different area, not the support area.
Which other solutions did I evaluate?
I did not evaluate other options before choosing Check Point Security Management.
What other advice do I have?
I rate Check Point Security Management a nine out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Centralized interface has improved daily administration and reduced human error
What is our primary use case?
Our main use case for Check Point Security Management is for unified management of our security devices, so our administration can control everything from one centralized interface.
A specific example of how we use Check Point Security Management for shipment security management and administration control is that we have multiple security gateways integrated with security management. For any required configuration, we use the console on security management to implement all changes.
What is most valuable?
The best features Check Point Security Management offers are Smart Logging and Smart Console, which are helpful for log searching and analysis. While we have raw data, these two tools provide better visibility on incident trends and ensure GDPR compliance.
Smart Log and Smart Console help with visibility and compliance by capturing all events and traffic flow from central management. All users and events are captured in security management, providing full visibility.
Check Point Security Management has positively impacted our organization by providing better administration control and a unified central pane of glass for daily configuration.
A specific outcome demonstrating how Check Point Security Management has helped our organization is the reduction in human error through centralized policy management.
What needs improvement?
Check Point Security Management can be improved as it requires significant resources, particularly in larger deployments.
For how long have I used the solution?
We have been using Check Point Security Management for more than three years.
What do I think about the stability of the solution?
Check Point Security Management is stable.
What do I think about the scalability of the solution?
Check Point Security Management demonstrates good scalability.
How are customer service and support?
The customer support for Check Point Security Management is excellent, as the support engineers are supportive and have excellent knowledge in troubleshooting.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are using Check Point Security Management exclusively and have not previously used a different solution.
What was our ROI?
We have seen a return on investment through reduced cost and time.
Which other solutions did I evaluate?
Before choosing Check Point Security Management, we evaluated FortiManager.
What other advice do I have?
My advice for anyone looking into using Check Point Security Management is to look for the centralized single pane of glass to manage security devices.
I rate Check Point Security Management 8 out of 10 because of its unified console, usability, and proper reporting capabilities.
Which deployment model are you using for this solution?
Centralized configuration has saved time and improved security visibility across all gateways
What is our primary use case?
We are using Check Point Security Management to centrally push the configuration to our security gateway, and we are using this solution to upgrade patches and firmware updates to our security gateway devices.
We have upgraded our security gateway from central management using Check Point Security Management , eliminating the need to log in to each security gateway device individually. We simply push the upgrade firmware version from centralized management, and it upgrades from there.
With central management of Check Point Security Management, we track all employees connected to our network to prevent security breaches or issues. All these features can be implemented from centrally management with the help of visibility.
What is most valuable?
The best feature of Check Point Security Management is centralized management and login, making it an easy job for engineers to configure and manage it.
After implementing the management of devices using Check Point Security Management, it became very easy and we are getting full visibility.
Time savings have been significant because with Check Point Security Management, our engineers spend less time managing or configuring the security gateway. We simply log in from central management to push changes to multiple security gateways easily.
What needs improvement?
The initial configuration and setup knowledge base document for Check Point Security Management could be upgraded to make it more helpful for configuration reference.
Apart from the knowledge base improvements needed, everything is very useful and meaningful in Check Point Security Management.
For how long have I used the solution?
I have been using Check Point Security Management for almost three years.
What do I think about the stability of the solution?
Check Point Security Management is stable.
What do I think about the scalability of the solution?
Check Point Security Management is good in terms of scalability. We can add more gateways, and it handles them very easily.
How are customer service and support?
I have had a great experience with the support team of Check Point Security Management. They are supportive and very knowledgeable. When we face technical issues, they are ready to help us.
How would you rate customer service and support?
Positive
What's my experience with pricing, setup cost, and licensing?
Regarding pricing, setup costs, and licensing for Check Point Security Management, we have not faced any challenges. Everything was as per expectation and costing.
Which other solutions did I evaluate?
We evaluated Fortinet FortiManager before choosing Check Point Security Management.
What other advice do I have?
Anyone looking for a centralized management solution can consider Check Point Security Management as one of the most valued solutions that will really help them to centrally manage all security gateways. I rate Check Point Security Management nine out of ten.
Which deployment model are you using for this solution?
Centralized management has improved visibility and simplified configuration across multiple devices
What is our primary use case?
We are using Check Point Security Management to manage multiple Check Point next-generation firewalls, enabling all these firewalls to be managed from the security management. For any configuration in the firewall, we manage it in Check Point Security Management console, where we configure policies, new object creation, services, ports configuration, or any VPN configuration, and we push all the configuration from the security management.
What is most valuable?
The best features Check Point Security Management offers in my experience are the user interface and the logging service.
The user interface of Check Point Security Management is very understandable, and users can easily configure it. Additionally, every activity or traffic flow from our network gets logged in our security devices.
Once we deployed Check Point Security Management, the manageability and the reporting capabilities made our job easier. We are getting better visibility, and based on this visibility, we configure the policies. Since implementing Check Point Security Management, it has saved our time, and the configuration and troubleshooting processes are easy.
What needs improvement?
For smaller organizations, the pricing of Check Point Security Management can be more reasonable.
For how long have I used the solution?
I have been using Check Point Security Management for more than three years.
What do I think about the stability of the solution?
Check Point Security Management is stable and I have not experienced any downtime or reliability issues.
What do I think about the scalability of the solution?
Check Point Security Management can easily handle the organization's growth, but it will depend on the model.
How are customer service and support?
I have a great experience with the customer support team of Check Point Security Management.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I did not previously use a different solution before Check Point Security Management.
What other advice do I have?
For any organization looking for centralized management of security, I consider Check Point Security Management a good solution. Apart from the pricing, everything about Check Point Security Management is perfect. I rate Check Point Security Management as nine out of ten.
Which deployment model are you using for this solution?
Has reduced configuration errors and helps monitor threats in real time
What is our primary use case?
My main use case for Check Point Security Management is to manage my security gateway.
A specific example of how I use Check Point Security Management with my security gateway is that from the security management, we make changes in our security gateway. It is related to configuration, whether the security policy for the users on NATting, VPN, or security profiles. All this configuration, we push. Any modification needed in our current configuration security gateway, we normally push all this configuration from security management.
What is most valuable?
The best features that Check Point Security Management offers, which stand out to me the most, are logging and monitoring. The monitoring is exceptional as it provides consolidated logs, signals, and any alerts that come from the security gateway in real time.
The logging and monitoring help my team day to day by alerting us if any incident or event occurs, enabling us to detect and prevent threats within seconds.
Check Point Security Management has positively impacted my organization because with more than one security gateway in our organization, we are easily able to manage and configure our security gateway with the help of security management.
What needs improvement?
Check Point Security Management can be improved because for smaller organizations with only a single or a couple of devices, there is no need for the management. They are required to use the management system, which increases costs for smaller organizations. This aspect could be addressed.
For how long have I used the solution?
I have been using Check Point Security Management for more than two years.
What do I think about the stability of the solution?
In my experience, Check Point Security Management is stable as I have not encountered any issues.
What do I think about the scalability of the solution?
Check Point Security Management's scalability is good because it can handle growth easily, but it depends on the model. While I cannot say much on scalability, it is quite stable.
How are customer service and support?
The customer support for Check Point Security Management is supportive, based on my interactions with them.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We did not have any security management from another vendor before using Check Point Security Management.
What was our ROI?
Since using Check Point Security Management, I have seen a return on investment because with multiple gateways, we do not have to invest in multiple engineers. One engineer can handle multiple security gateways from the security management, saving both time and money.
What's my experience with pricing, setup cost, and licensing?
Which other solutions did I evaluate?
Before choosing Check Point Security Management, we evaluated Fortinet.
What other advice do I have?
The solution has saved our time, reduced errors, and made management simpler.
My advice for others looking into using Check Point Security Management is that if anyone wants to save time and resources, they can consider this solution to configure and manage multiple gateways.
I rate Check Point Security Management an eight out of ten.