Overview
Video 1
Video 1

Product video
Check Point Security Management provides an advanced security management platform for enterprises to deploy protections across their organizations, across public, private and hybrid clouds.
Efficient: Automation and granular delegation help alleviate operational overhead. The Security Management API allows security teams to automate any task or create web portals for security self-service. Management interface features anticipate the administrator's daily needs, providing security intelligence to make better policy decisions.
Fully Integrated: Security Management has logging, monitoring, event correlation and reporting in one place. A visual dashboard provides full visibility into security across the network, helping organizations monitor the status of enforcement points and stay alert to potential threats. The customizable dashboard provides a full view of the security posture and drilldown capabilities into incident or log details. Reports are configurable and accessible from any web browser.
Security Management is required to control CloudGuard Network Security Gateways.
Customers requiring security management for up to 5 Security Gateways may deploy this offering on instances with less than 8 compute cores. Managing more than 5 Gateways on an instance with less than 8 compute cores is not supported. Customers requiring security management for up to 25 Security Gateways must deploy this offering on instances with 8 or more compute cores.
Customers requiring security management for more than 25 Security Gateways should contact Check Point or purchase BYOL.
To maintain the highest quality and security of our management solutions, Check Point recommends installing the latest recommended Jumbo Hotfix, especially after the initial deployment.
Highlights
- One Platform, One Policy a single pane of glass console manages the entire IT infrastructure - from the data center to private/public/hybrid cloud deployments - for full visibility, security efficiency and consistency. The policy can be segmented into layers for seamless network segmentation.
- Extensible, Scalable Platform: The Security Management platform scales to the most complex and dynamic environments. The RESTful APIs make it easy to integrate securely with orchestration, change management and ticketing systems, enabling automated security change control and provisioning.
- Check Point is an APN Advanced Technology Partner with Networking and Security Competencies. CloudGuard Network Security is integrated with a broad range of AWS services, including Amazon GuardDuty, Amazon CloudWatch, AWS Security Hub, AWS Transit Gateway, AWS CloudTrail and VPC Flow Logs. CloudGuard Network Security also provides a library of CloudGuard CloudFormation templates (CFTs) to simplify deployment.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Free trial
- ...
Dimension | Cost/hour |
|---|---|
c6in.xlarge Recommended | $0.62 |
m8i.4xlarge | $1.83 |
r5a.4xlarge | $1.83 |
r5n.12xlarge | $1.83 |
m8i.metal-96xl | $97.34 |
m6i.2xlarge | $0.62 |
r5b.2xlarge | $0.62 |
m7i.2xlarge | $0.62 |
c5.18xlarge | $1.83 |
r5n.xlarge | $0.62 |
Vendor refund policy
Terminate the instance at any given time to stop incurring charges.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Additional details
Usage instructions
Once the instance is running, connect to it using SSH, set an admin password using: 'set user admin password' followed by 'save config'. Then connect to https://[instance] using Internet Explorer (IE) to finalize the configuration. Notes:
- SSH password authentication is disabled in /etc/ssh/sshd_config
- For information regarding Firefox and Chrome refer to sk121373.
Resources
Support
Vendor support
This offer includes Premium Support. For the full list of included support services visit: https://www.checkpoint.com/support-services/support-plans/ To open a support ticket, you would need to have a Check Point user center account. If you do not have a user center account, you can sign up for one here: https://accounts.checkpoint.com . Need support? Contact us at https://www.checkpoint.com/support-services/contact-support/
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Centralized management has unified branch security teams and saves time with consistent policies
What is our primary use case?
In our day-to-day IT team requirements, they need to harden the security policy of the security gateways that are hosted across the branches in different locations. They access the security gateway through Check Point Security Management from a central location, and whatever they want to harden the policy, they can push the configuration from that single console.
What is most valuable?
It will be helpful to meet the compliance of security, so we have full visibility on the configuration part of each and every security gateway, and we can compare the policies that are configured across different security gateways from a single console.
It has impacted positively and has really saved the team time and compliance.
Basically there were multiple teams, the team who handled the security gateways at each location, but now we have a central team where one to two engineers handle all the security gateways.
What needs improvement?
For how long have I used the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
How was the initial setup?
What was our ROI?
Which other solutions did I evaluate?
What other advice do I have?
Centralized security management has improved visibility and reduced configuration errors
What is our primary use case?
I am using Check Point Security Management in our day-to-day operations to centrally manage all Check Point Security Gateways within my organization. All of these Check Point Security Gateways are integrated into security management, and from there, I push configuration, reporting, and logging. All firewall activity is managed from the central console of Check Point Security Management .
Our day-to-day activities involve updating firewall policies and security profiles, such as antivirus and anti-spyware. All of these configurations and firmware upgrades for the firewall are completed from Check Point Security Management.
What is most valuable?
Based on my experience with Check Point Security Management, it is an excellent solution for managing all security gateways from a central console where I can access all logs and security events triggering on different security gateways. I have a single console where I can monitor and configure everything, allowing me to manage everything from security management to all firewalls from a central console.
The best aspect about the centralized control of Check Point Security Management is that it streamlines all configurations across all location firewalls. I have all logs from all firewalls at a single pane of glass where I can filter and check all security events occurring over any number of days I select. I am gaining good visibility over the network, over the cyber threats triggering, and the compliance of the configuration.
Based on my experience, we now have configuration hardening across all branches, and there is no mismatched configuration between the branches. We do not need to communicate with other branches' engineers. We have a single centralized team for security managing all of the organization's Check Point Security Gateways.
It benefits everyone. My configuration errors have been reduced, compliance has improved, and it is saving my team time. We are achieving all three of these benefits.
What needs improvement?
Based on my experience with Check Point Security Management, I do not see anything lacking. It is currently managing all the gateways, and we are able to achieve what we want from our perspective. I am not seeing anything that needs to improve right now, but in the future, it might be upgraded with additional AI features and automation.
For how long have I used the solution?
We have been using Check Point Security Management for more than three years.
What do I think about the stability of the solution?
Check Point Security Management is stable in my experience.
What do I think about the scalability of the solution?
As of now, there is no issue with the scalability of Check Point Security Management regarding my organization's needs.
How are customer service and support?
The customer support team for Check Point Security Management is excellent. They provide technical support whenever I require it.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
The selection of Check Point Security Management was not done by my team; it was completed by a different team. I do not have any information about previous solutions.
What other advice do I have?
I advise anyone having multiple security gateways that are managed stand-alone to deploy Check Point Security Management and manage all security gateways from a central console and central team. This will minimize configuration errors and reduce the requirement of engineers. I rate Check Point Security Management a nine on a scale of one to ten.
Centralized controls have unified my gateways and now streamline daily threat monitoring
What is our primary use case?
One unique angle about my main use case for Check Point Security Management is how they tailor the platform to their own operation writing. When I need to control different roles based on the dashboard, other things include automated policies staging and specific rules.
What is most valuable?
The reporting feature of Check Point Security Management is one of the most practical tools for my daily and weekly routine. I perform daily checks, quick traffic, and threat summaries to spot anomalies or spikes in attacks, and weekly reports that a security team might schedule list the top ten blocked threats per branch office.
One last point worth adding about the features of Check Point Security Management is how scalability and flexibility play into its strengths. As environments grow, you do not need to reinvent your setup, and the same centralized console can handle new gateways, cloud connectors, or remote offices without losing consistency. Features like policies layering and dynamic objects make it easy to adapt rules to changing business needs.
Check Point Security Management has had a very positive impact on my organization by making security operations more efficient and reliable. Simplified management means policies are consistent across all sites, reducing errors and saving time.
What needs improvement?
For how long have I used the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
What was our ROI?
Which other solutions did I evaluate?
What other advice do I have?
Centralized security management has saved time and enables unified policy control across gateways
What is our primary use case?
My main use case for Check Point Security Management is controlling and viewing different events in gateways.
When I need to control or publish different policies in my different gateways in Azure or on-premise, I publish in one site when I am controlling it.
When I need to create different or new policies or rules, I find it is more controlling and faster when I use Check Point Security Management because I can publish in one site for all gateways.
What is most valuable?
The best features Check Point Security Management offers include the opportunity to add different gateways and add different blades in my gateways, and the monitoring is excellent and it is easier to work in different instances.
Managing different gateways and blades in Check Point Security Management saves our time.
Check Point Security Management has positively impacted my organization because the department can publish different policies or search different events or try to know different threats in one security management center for different gateways.
I reduce the time when I need to publish different policies in different gateways, but I need to publish at the same time.
What needs improvement?
For the first deployment, Check Point Security Management is not so easy and can be difficult for the first implementation.
The challenging part about the first deployment was to understand the documentation because it is very difficult or not intuitive, and there are no images in the documentation.
For how long have I used the solution?
I have been using Check Point Security Management for three years.
What do I think about the stability of the solution?
In my experience, Check Point Security Management is very stable.
What do I think about the scalability of the solution?
Check Point Security Management is very scalable.
How are customer service and support?
The customer support for Check Point Security Management is excellent.
How would you rate customer service and support?
Positive
How was the initial setup?
My experience with pricing, setup cost, and licensing is great, with no problem.
What was our ROI?
I have seen a return on investment in terms of time saved.
What's my experience with pricing, setup cost, and licensing?
I purchased Check Point Security Management through the Azure Marketplace .
What other advice do I have?
Check Point Security Management is a great complement to security gateways; I can publish different rules or policies, and it is excellent for monitoring. I would rate Check Point Security Management an eight on a scale of one to ten. I chose that rating of eight because the documentation needs images for the deployment.
Centralized policies have streamlined operations and improved incident response across multiple environments
What is our primary use case?
My main use case for Check Point Security Management is for centralizing my different gateways in different sites, such as Azure , on-premise, and other clouds, which allows me to control, see events, and make different policies over my security in different sites at the same time.
Managing those different sites with Check Point Security Management is much easier because the policies can be applied centrally and pushed out across Azure , on-premise, and other cloud environments, allowing me to update changes in one management console that automatically syncs everywhere, which saves time and avoids inconsistency. Monitoring events is also streamlined since all logs and alerts feed into the single dashboard.
One unique aspect of our setup with Check Point Security Management is how we manage policies across both traditional on-premise firewalls and multiple cloud environments simultaneously, relying on a centralized console to push consistent rules everywhere, which keeps our workflow simple and avoids misconfigurations.
How has it helped my organization?
yes
What is most valuable?
The best feature of Check Point Security Management for me is the Advanced Threat Prevention because it integrates protection against malware, phishing, and network attacks in different blades or gateways, alongside centralized policy management.
One more feature worth highlighting about Check Point Security Management is how advanced threat prevention and centralized policy management work together to simplify our daily operations, as threat prevention tools automatically block malware and phishing attempts across all environments while centralized policies ensure those protections apply consistently everywhere, significantly reducing the gaps between sites or platforms and lessening the team's troubleshooting time.
Check Point Security Management has positively impacted our organization by streamlining different policy management in a single console, and incident response has also become faster because all alerts and logs feed into one security tool or management tool, giving us immediate visibility without needing to switch between tools.
What needs improvement?
Check Point Security Management could be improved with better reporting and dashboard customization options, as having more tailored insights for different stakeholders would enhance visibility, but this is a minor concern.
For how long have I used the solution?
I have been using Check Point Security Management for five years.
What do I think about the stability of the solution?
In my experience, Check Point Security Management is very stable.
What do I think about the scalability of the solution?
Check Point Security Management is very scalable in our organization, and we have had no problems with it at all.
How are customer service and support?
The customer support is very fast, and I love the support.
How would you rate customer service and support?
Positive
What was our ROI?
I have seen a return on investment, mainly in terms of the time saved.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup costs, and licensing is great, and I find the pricing to be good for me.
What other advice do I have?
Check Point Security Management should be considered by others as the best centralized management for different gateways, as it is an excellent tool that I recommend to others.
Check Point Security Management is deployed in a hybrid cloud environment in our organization.
We use Azure as our cloud provider.
I did purchase Check Point Security Management through the Azure marketplace.
Incident response has improved significantly; for example, phishing attempts or firewall misconfigurations that used to take a full day to investigate can now be identified and addressed within a couple of hours, freeing up the team around two to five hours per week.
Check Point Security Management is very scalable in our organization, and we have had no problems with it at all.
I give this review a rating of ten out of ten.