Overview
Video 1
Video 1

Product video
Check Point Security Management provides an advanced security management platform for enterprises to deploy protections across their organizations, across public, private and hybrid clouds.
Efficient: Automation and granular delegation help alleviate operational overhead. The Security Management API allows security teams to automate any task or create web portals for security self-service. Management interface features anticipate the administrator's daily needs, providing security intelligence to make better policy decisions.
Fully Integrated: Security Management has logging, monitoring, event correlation and reporting in one place. A visual dashboard provides full visibility into security across the network, helping organizations monitor the status of enforcement points and stay alert to potential threats. The customizable dashboard provides a full view of the security posture and drilldown capabilities into incident or log details. Reports are configurable and accessible from any web browser.
Security Management is required to control CloudGuard Network Security Gateways.
Customers requiring security management for up to 5 Security Gateways may deploy this offering on instances with less than 8 compute cores. Managing more than 5 Gateways on an instance with less than 8 compute cores is not supported. Customers requiring security management for up to 25 Security Gateways must deploy this offering on instances with 8 or more compute cores.
Customers requiring security management for more than 25 Security Gateways should contact Check Point or purchase BYOL.
To maintain the highest quality and security of our management solutions, Check Point recommends installing the latest recommended Jumbo Hotfix, especially after the initial deployment.
Highlights
- One Platform, One Policy a single pane of glass console manages the entire IT infrastructure - from the data center to private/public/hybrid cloud deployments - for full visibility, security efficiency and consistency. The policy can be segmented into layers for seamless network segmentation.
- Extensible, Scalable Platform: The Security Management platform scales to the most complex and dynamic environments. The RESTful APIs make it easy to integrate securely with orchestration, change management and ticketing systems, enabling automated security change control and provisioning.
- Check Point is an APN Advanced Technology Partner with Networking and Security Competencies. CloudGuard Network Security is integrated with a broad range of AWS services, including Amazon GuardDuty, Amazon CloudWatch, AWS Security Hub, AWS Transit Gateway, AWS CloudTrail and VPC Flow Logs. CloudGuard Network Security also provides a library of CloudGuard CloudFormation templates (CFTs) to simplify deployment.
Details
Unlock automation with AI agent solutions

Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Free trial
- ...
Dimension | Cost/hour |
|---|---|
c6in.xlarge Recommended | $0.62 |
r5.xlarge | $0.62 |
r6i.24xlarge | $1.83 |
r6i.4xlarge | $1.83 |
m5.16xlarge | $1.83 |
r5.12xlarge | $1.83 |
m5.2xlarge | $0.62 |
r6i.2xlarge | $0.62 |
r6i.xlarge | $0.62 |
r5b.large | $0.62 |
Vendor refund policy
Terminate the instance at any given time to stop incurring charges.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Additional details
Usage instructions
Once the instance is running, connect to it using SSH, set an admin password using: 'set user admin password' followed by 'save config'. Then connect to https://[instance] using Internet Explorer (IE) to finalize the configuration. Notes:
- SSH password authentication is disabled in /etc/ssh/sshd_config
- For information regarding Firefox and Chrome refer to sk121373.
Resources
Support
Vendor support
This offer includes Premium Support. For the full list of included support services visit: https://www.checkpoint.com/support-services/support-plans/ To open a support ticket, you would need to have a Check Point user center account. If you do not have a user center account, you can sign up for one here: https://accounts.checkpoint.com . Need support? Contact us at https://www.checkpoint.com/support-services/contact-support/Â
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Manages multiple firewalls across locations through one dashboard and simplifies remote VPN configuration
What is our primary use case?
My main use case for Check Point Security Management is to use the management server and all the security features of Check Point Gateway, allowing me to easily integrate and manage all firewalls within one dashboard.
I manage my firewalls through the dashboard by overseeing cluster management of active and standby devices, easily publishing and writing firewall policies based on five-tuples such as source IP, destination IP, source port, destination port, as well as configuring and monitoring both side-to-side and remote VPN activities.
What is most valuable?
The best features of Check Point Security Management are its cluster environment, which speeds up performance through SecureXL and ClusterXL, and its robust threat management tools that provide vulnerability exposure and virus mitigation capabilities.
ClusterXL and threat management have helped me by enhancing performance through redundancy in active and standby firewalls, allowing for multiple security gateways to operate smoothly within the security management setup.
Additionally, IPS is enabled, and I can integrate Check Point Infinity solutions through the Infinity portal, which allows for easy policy pushing and customization.
Check Point Security Management has positively impacted my organization by enabling me to set up various location firewalls in one dashboard, which is a significant benefit I have noticed. It saves me time and reduces complexity, as the friendly dashboard allows me to see all logs, policies, monitoring, auditing tools, and issues related to VPN and traffic, making it easy to manage everything efficiently.
What needs improvement?
Check Point Security Management can be improved; the recent R82 version is AI-enabled with increased security but I have encountered issues during upgrades, requiring backups to prevent potential disasters.
I recommend ensuring that backups are taken before any maintenance to avoid complications during upgrades.
For how long have I used the solution?
I have been working in my current field for the last six years.
What do I think about the stability of the solution?
Check Point Security Management is stable; I have experienced no downtime as long as HA is maintained during upgrades.
What do I think about the scalability of the solution?
Check Point Security Management does not have notable scalability options.
How are customer service and support?
Customer support for Check Point Security Management is excellent; I would rate it a 10 out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not switched from Check Point Security Management; my organization continues to use it.
How was the initial setup?
The setup was facilitated by the Azure Marketplace .
What about the implementation team?
I purchased Check Point Security Management through the Azure Marketplace .
What was our ROI?
I have seen a return on investment, as it only takes one to two employees to understand and manage policies effectively, leading to savings in employee costs.
What's my experience with pricing, setup cost, and licensing?
In terms of pricing, I find the pay-as-you-go model convenient, and I have utilized an enterprise license, making it easier on cost management, handled mainly by the procurement and licensing teams.
Which other solutions did I evaluate?
Before choosing Check Point Security Management, I evaluated some other management tools based on traffic handling and RMA policy capabilities, which helped me make my choice.
What other advice do I have?
I advise others considering Check Point Security Management to choose this product confidently because it has all types of features, including NGFW, VPN policies, DDoS, UTM features, and seamless integration capabilities with Check Point Infinity software for managing gateways across different locations. I would rate this product a 10 out of 10.
Centralized management has simplified threat detection and reduced policy deployment time
What is our primary use case?
When I create different policies or VPNs or view activity or logs, I need to look at one site. In this case, Check Point Security Management provides everything for this scenario, offering me a comprehensive view.
When I need to prevent different threats over the network, I access Check Point Security Management and view the events or logs for different threats or suspicious activities, which enhances my overall security strategy.
What is most valuable?
Consistency across environments with Check Point Security Management helps me ensure that instead of maintaining separate rules for firewalls, cloud workloads, and data centers, we apply one unified policy that covers them all. This reduces misconfigurations and ensures compliance, proving to be a time-saver because rolling out a new rule or updating an existing one takes minutes, not hours, because it is propagated everywhere automatically.
Automation is one of the most valuable aspects of Check Point Security Management, and it often does not get enough attention compared to headline features like unified policies or visibility. With policy automation, routine tasks such as rule creation, compliance checks, or policy updates can be automated, reducing human error and saving hours of manual work.
Check Point Security Management has simplified administration in my organization because instead of juggling multiple consoles, everything is managed from a single pane of glass. This has reduced complexity and saved significant time for our IT team, improving our operational efficiency.
For a policy update, I used to spend two or three hours across multiple consoles. Now, with unified management in Check Point Security Management, it takes thirty to forty minutes, resulting in about a seventy percent reduction in effort, greatly boosting productivity.
What needs improvement?
The documentation for Check Point Security Management needs to be more intuitive for all users and for first-time implementations, making it easier to navigate and utilize effectively.
For how long have I used the solution?
I have been using Check Point Security Management for around four years, which has significantly enhanced my capabilities in managing security efficiently.
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
What was our ROI?
What's my experience with pricing, setup cost, and licensing?
Which other solutions did I evaluate?
What other advice do I have?
I recommend Check Point Security Management as an excellent tool for security and for centralizing your gateway, making it a solid choice for organizations looking to enhance their security posture.
I rate Check Point Security Management an eight overall, reflecting my experience with the platform.
Centralized management has improved policy control and saved time across hybrid environments
What is our primary use case?
My main use case for Check Point Security Management is for management of the gateways, creating, and centralized management in Check Point Infinity Portal.
For example, when I buy a gateway in Azure , I need to control or manage these gateways and use Check Point Security Management for controlling, creating different policies, and viewing the logs and events into Check Point Security Management. Check Point Security Management is used in Check Point Infinity Portal with Smart Console.
I use Check Point Security Management in my workflow as it provides centralized management because I put different gateways in different sites into the security management and control them.
What is most valuable?
One of the best features of Check Point Security Management that stands out for me is the powerful policy tools.
The flexible deployment model is valuable for me because I can choose deployment models, for example, on-premise, cloud, and different sites. I control or manage this with this tool.
An important feature I find helpful in Check Point Security Management is the policies view, where I create different policy labels for different gateways and control different traffic.
Check Point Security Management has positively impacted my organization, with one benefit being that I create one security management for controlling any gateways.
This level of security management has benefited my organization because it has saved me time.
I don't know the exact number, but it is easier for controlling the different gateways.
What needs improvement?
Check Point Security Management can be improved in terms of policies management and workflow efficiency. For example, the interface can be overwhelming for new users, and simplifying rule creation, offering guided workflows or templates will reduce onboarding time.
I think engaging role-based access control is essential; granular permissions for more flexible RBAC will allow the organization to delegate tasks. For example, read-only access, audit role, or contributor policy editing is a great opportunity to create more granular permissions.
For how long have I used the solution?
I have been using Check Point Security Management for around two years.
What do I think about the stability of the solution?
Check Point Security Management is stable in my experience, though there may be issues when using a cluster or in Infinity Portal.
What do I think about the scalability of the solution?
Check Point Security Management's scalability has met my needs as my organization grows; I have no problem with this.
How are customer service and support?
The customer support is great, but I think there is a need for more languages regarding the different responses over tickets.
How would you rate customer service and support?
Neutral
How was the initial setup?
My experience with pricing, setup cost, and licensing has been great; I faced no problem with the cost or license.
What was our ROI?
I have seen a return on investment in terms of time saved.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing has been great; I faced no problem with the cost or license.
What other advice do I have?
I recommend using Check Point Security Management if a company needs to control or manage their gateways. I would rate this product an 8 overall.
Has improved threat visibility and reduced response time with centralized policy management
What is our primary use case?
Check Point Security Management serves as our command center for centrally managing our firewalls and security policies across multi-sites, enabling us to configure rules, monitor traffic, and respond to threats in real-time.
Using SmartConsole, we monitor all network traffic across our gateways in Azure and VPNs to on-premise locations, providing us with a live view of sessions, blocked attempts, and threat indicators. The log monitor tab is especially useful, allowing us to filter by source, destination, and other types for examining different events.
What is most valuable?
Check Point Security Management offers centralized control, real-time threat visibility, and automation tools that streamline security operations across complex environments. The unified management console, SmartConsole in this case, acts as a single pane of glass for managing firewalls, gateways, and related infrastructure.
A significant strength of Check Point Security Management is the role-based access control, which allows us to delegate specific tasks such as log review, policy editing, and threat analysis to different teams without compromising security.
Check Point Security Management has positively impacted our organization by improving efficiency. Centralized policy management has drastically reduced the time we spend configuring and deploying rules across multiple gateways from hours to minutes, thanks to SmartConsole and automated policy deployment.
What needs improvement?
Check Point Security Management could be improved by enhancing its user interface, expanding third-party integrations, and refining reports and automation capabilities to make it more intuitive and scalable for diverse enterprise environments.
For how long have I used the solution?
I have been using Check Point Security Management for five years.
What do I think about the stability of the solution?
Check Point Security Management is very stable.
What do I think about the scalability of the solution?
Check Point Security Management's scalability is also very good.
How are customer service and support?
The customer support for Check Point Security Management is very good.
How would you rate customer service and support?
Positive
How was the initial setup?
The setup process of Check Point Security Management was mostly smooth, though we encountered a few surprises along the way.
What was our ROI?
The relevant metrics for return on investment is the time saved.
Since implementing Check Point Security Management, we have saved approximately 10 to 15 hours per week due to a significant reduction in manual workload and incident response times.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing is moderate because I need to be informed when deploying these different tools. The department expert handles this in our case.
What other advice do I have?
I would advise others looking into using Check Point Security Management to give it a try. When companies look for a centralized security solution, they should use Check Point Security Management. I would rate this product an 8 out of 10.
Has streamlined gateway management and freed up internal IT resources
What is our primary use case?
My main use case for Check Point Security Management is to configure and manage our security gateway.
A specific example of how I use Check Point Security Management to manage our security gateway is that we have a head office and a branch office with an HA firewall of Check Point integrated with this security management product. All configuration, reporting, and any tasks related to the security gateway are completed through the security gateway.
What is most valuable?
The best features Check Point Security Management offers are its manageability and the easy user interface from where I can configure or manage multiple security gateways.
When I mention manageability and the user interface, it stands out to me because it is easy to trace any tabs to configure anything, making it very reliable.
Check Point Security Management has positively impacted my organization because our IT person is not always busy with troubleshooting or manageability after deploying this solution, as they can manage multiple security gateways from a single console.
It is saving our time, and we can do multiple things related to IT right now, with one single person doing multiple things after this deployment.
What needs improvement?
Check Point Security Management is working as per my requirements, so I don't see anything lacking in this solution. It is perfectly working for my organization.
For how long have I used the solution?
I have been using Check Point Security Management for more than two and a half years.
What do I think about the stability of the solution?
Check Point Security Management is stable in my experience, as I don't see any issue or downtime. It is perfectly stable and working till now.
What do I think about the scalability of the solution?
Check Point Security Management is currently handling my five or six gateways. From the scalability perspective, I can't say much because we have a limited number of branches, and it is handling that.
How are customer service and support?
My experience with Check Point Security Management's customer support has been positive, as they are very helpful in each and every technical aspect and able to resolve complex issues within the timeline. I am very much happy with their support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are using Check Point Security Management only. I did not previously use a different solution.
How was the initial setup?
Before implementing Check Point Security Management, I was very worried about the initial integration part. However, that part was very easy because there are multiple KBs available from Check Point, and it is very straightforward to integrate. We didn't face any challenges with this solution.
What about the implementation team?
I was not part of the team who handles the pricing, setup cost, and licensing for Check Point Security Management.
What was our ROI?
The return on investment with Check Point Security Management is clear because it helps save time and money. One person is now working for multiple things related to IT, whereas previously we had multiple engineers involved for different tasks. After this deployment, one engineer can handle multiple things.
What's my experience with pricing, setup cost, and licensing?
I was not part of the team who handles the pricing, setup cost, and licensing for Check Point Security Management.
Which other solutions did I evaluate?
Before choosing Check Point Security Management, I evaluated other options like FortiGate and others.
What other advice do I have?
I would rate Check Point Security Management a nine out of ten. I chose nine out of ten because it is working very fine till now, and it might be in the future that I can see anything lacking inside, which is why I am not giving ten out of ten.
I would advise anyone looking into using Check Point Security Management, especially those having multiple security gateways and multiple branches using Check Point firewall, to consider it as the best centralized management solution. From this solution, reporting, all the security gateway management, and troubleshooting can be done easily, which will be very helpful for them. My review rating for Check Point Security Management is nine.