Overview
Video 1
Video 1

Product video
Check Point Security Management provides an advanced security management platform for enterprises to deploy protections across their organizations, across public, private and hybrid clouds.
Efficient: Automation and granular delegation help alleviate operational overhead. The Security Management API allows security teams to automate any task or create web portals for security self-service. Management interface features anticipate the administrator's daily needs, providing security intelligence to make better policy decisions.
Fully Integrated: Security Management has logging, monitoring, event correlation and reporting in one place. A visual dashboard provides full visibility into security across the network, helping organizations monitor the status of enforcement points and stay alert to potential threats. The customizable dashboard provides a full view of the security posture and drilldown capabilities into incident or log details. Reports are configurable and accessible from any web browser.
Security Management is required to control CloudGuard Network Security Gateways.
Customers requiring security management for up to 5 Security Gateways may deploy this offering on instances with less than 8 compute cores. Managing more than 5 Gateways on an instance with less than 8 compute cores is not supported. Customers requiring security management for up to 25 Security Gateways must deploy this offering on instances with 8 or more compute cores.
Customers requiring security management for more than 25 Security Gateways should contact Check Point or purchase BYOL.
To maintain the highest quality and security of our management solutions, Check Point recommends installing the latest recommended Jumbo Hotfix, especially after the initial deployment.
Highlights
- One Platform, One Policy a single pane of glass console manages the entire IT infrastructure - from the data center to private/public/hybrid cloud deployments - for full visibility, security efficiency and consistency. The policy can be segmented into layers for seamless network segmentation.
- Extensible, Scalable Platform: The Security Management platform scales to the most complex and dynamic environments. The RESTful APIs make it easy to integrate securely with orchestration, change management and ticketing systems, enabling automated security change control and provisioning.
- Check Point is an APN Advanced Technology Partner with Networking and Security Competencies. CloudGuard Network Security is integrated with a broad range of AWS services, including Amazon GuardDuty, Amazon CloudWatch, AWS Security Hub, AWS Transit Gateway, AWS CloudTrail and VPC Flow Logs. CloudGuard Network Security also provides a library of CloudGuard CloudFormation templates (CFTs) to simplify deployment.
Details
Unlock automation with AI agent solutions

Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Free trial
- ...
Dimension | Cost/hour |
|---|---|
c6in.xlarge Recommended | $0.62 |
r5.xlarge | $0.62 |
r6i.24xlarge | $1.83 |
r6i.4xlarge | $1.83 |
m5.16xlarge | $1.83 |
r5.12xlarge | $1.83 |
m5.2xlarge | $0.62 |
r6i.2xlarge | $0.62 |
r6i.xlarge | $0.62 |
r5b.large | $0.62 |
Vendor refund policy
Terminate the instance at any given time to stop incurring charges.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Additional details
Usage instructions
Once the instance is running, connect to it using SSH, set an admin password using: 'set user admin password' followed by 'save config'. Then connect to https://[instance] using Internet Explorer (IE) to finalize the configuration. Notes:
- SSH password authentication is disabled in /etc/ssh/sshd_config
- For information regarding Firefox and Chrome refer to sk121373.
Resources
Support
Vendor support
This offer includes Premium Support. For the full list of included support services visit: https://www.checkpoint.com/support-services/support-plans/ To open a support ticket, you would need to have a Check Point user center account. If you do not have a user center account, you can sign up for one here: https://accounts.checkpoint.com . Need support? Contact us at https://www.checkpoint.com/support-services/contact-support/Â
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Has improved threat visibility and reduced response time with centralized policy management
What is our primary use case?
Check Point Security Management serves as our command center for centrally managing our firewalls and security policies across multi-sites, enabling us to configure rules, monitor traffic, and respond to threats in real-time.
Using SmartConsole, we monitor all network traffic across our gateways in Azure and VPNs to on-premise locations, providing us with a live view of sessions, blocked attempts, and threat indicators. The log monitor tab is especially useful, allowing us to filter by source, destination, and other types for examining different events.
What is most valuable?
Check Point Security Management offers centralized control, real-time threat visibility, and automation tools that streamline security operations across complex environments. The unified management console, SmartConsole in this case, acts as a single pane of glass for managing firewalls, gateways, and related infrastructure.
A significant strength of Check Point Security Management is the role-based access control, which allows us to delegate specific tasks such as log review, policy editing, and threat analysis to different teams without compromising security.
Check Point Security Management has positively impacted our organization by improving efficiency. Centralized policy management has drastically reduced the time we spend configuring and deploying rules across multiple gateways from hours to minutes, thanks to SmartConsole and automated policy deployment.
What needs improvement?
Check Point Security Management could be improved by enhancing its user interface, expanding third-party integrations, and refining reports and automation capabilities to make it more intuitive and scalable for diverse enterprise environments.
For how long have I used the solution?
I have been using Check Point Security Management for five years.
What do I think about the stability of the solution?
Check Point Security Management is very stable.
What do I think about the scalability of the solution?
Check Point Security Management's scalability is also very good.
How are customer service and support?
The customer support for Check Point Security Management is very good.
How would you rate customer service and support?
Positive
How was the initial setup?
The setup process of Check Point Security Management was mostly smooth, though we encountered a few surprises along the way.
What was our ROI?
The relevant metrics for return on investment is the time saved.
Since implementing Check Point Security Management, we have saved approximately 10 to 15 hours per week due to a significant reduction in manual workload and incident response times.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing is moderate because I need to be informed when deploying these different tools. The department expert handles this in our case.
What other advice do I have?
I would advise others looking into using Check Point Security Management to give it a try. When companies look for a centralized security solution, they should use Check Point Security Management. I would rate this product an 8 out of 10.
Has streamlined gateway management and freed up internal IT resources
What is our primary use case?
My main use case for Check Point Security Management is to configure and manage our security gateway.
A specific example of how I use Check Point Security Management to manage our security gateway is that we have a head office and a branch office with an HA firewall of Check Point integrated with this security management product. All configuration, reporting, and any tasks related to the security gateway are completed through the security gateway.
What is most valuable?
The best features Check Point Security Management offers are its manageability and the easy user interface from where I can configure or manage multiple security gateways.
When I mention manageability and the user interface, it stands out to me because it is easy to trace any tabs to configure anything, making it very reliable.
Check Point Security Management has positively impacted my organization because our IT person is not always busy with troubleshooting or manageability after deploying this solution, as they can manage multiple security gateways from a single console.
It is saving our time, and we can do multiple things related to IT right now, with one single person doing multiple things after this deployment.
What needs improvement?
Check Point Security Management is working as per my requirements, so I don't see anything lacking in this solution. It is perfectly working for my organization.
For how long have I used the solution?
I have been using Check Point Security Management for more than two and a half years.
What do I think about the stability of the solution?
Check Point Security Management is stable in my experience, as I don't see any issue or downtime. It is perfectly stable and working till now.
What do I think about the scalability of the solution?
Check Point Security Management is currently handling my five or six gateways. From the scalability perspective, I can't say much because we have a limited number of branches, and it is handling that.
How are customer service and support?
My experience with Check Point Security Management's customer support has been positive, as they are very helpful in each and every technical aspect and able to resolve complex issues within the timeline. I am very much happy with their support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are using Check Point Security Management only. I did not previously use a different solution.
How was the initial setup?
Before implementing Check Point Security Management, I was very worried about the initial integration part. However, that part was very easy because there are multiple KBs available from Check Point, and it is very straightforward to integrate. We didn't face any challenges with this solution.
What about the implementation team?
I was not part of the team who handles the pricing, setup cost, and licensing for Check Point Security Management.
What was our ROI?
The return on investment with Check Point Security Management is clear because it helps save time and money. One person is now working for multiple things related to IT, whereas previously we had multiple engineers involved for different tasks. After this deployment, one engineer can handle multiple things.
What's my experience with pricing, setup cost, and licensing?
I was not part of the team who handles the pricing, setup cost, and licensing for Check Point Security Management.
Which other solutions did I evaluate?
Before choosing Check Point Security Management, I evaluated other options like FortiGate and others.
What other advice do I have?
I would rate Check Point Security Management a nine out of ten. I chose nine out of ten because it is working very fine till now, and it might be in the future that I can see anything lacking inside, which is why I am not giving ten out of ten.
I would advise anyone looking into using Check Point Security Management, especially those having multiple security gateways and multiple branches using Check Point firewall, to consider it as the best centralized management solution. From this solution, reporting, all the security gateway management, and troubleshooting can be done easily, which will be very helpful for them. My review rating for Check Point Security Management is nine.
Centralized policy control has improved consistency and increased response speed across environments
What is our primary use case?
Check Point Security Management serves as our centralized control and visibility solution over all our security gateways and policies. We rely on it daily to manage firewall rules, monitor traffic, and respond to threats in real time.
What is most valuable?
The best feature of Check Point Security Management is the centralized policy control because I can manage all firewall rules, access control, and threat prevention policies from one console. This reduces configuration errors and ensures consistent enforcement across the network.
Check Point Security Management has had a strong positive impact on our organization. One of the biggest improvements is how much easier it has become to maintain consistent security policies across our environments.
What needs improvement?
Check Point Security Management can be improved by including a built-in tool to compare policies across gateways or environments to quickly spot inconsistencies.
While SmartConsole is powerful, it can feel cluttered at times. A cleaner layout or customizable dashboard would help users focus on what matters most.
For how long have I used the solution?
I have been using Check Point Security Management for two years.
What do I think about the stability of the solution?
Check Point Security Management is very stable.
What do I think about the scalability of the solution?
Check Point Security Management is very scalable.
How are customer service and support?
The customer support for Check Point Security Management is very great.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not previously used a different solution.
What was our ROI?
I have seen a return on investment with Check Point Security Management in terms of money saved and time saved.
What's my experience with pricing, setup cost, and licensing?
Regarding pricing, setup cost, and licensing with Check Point Security Management, the flexible price and competitive pricing are favorable. For me, it is good.
Which other solutions did I evaluate?
I have not evaluated other options before choosing Check Point Security Management.
What other advice do I have?
For all people looking into using Check Point Security Management, I advise adopting it because it is a great tool for centralizing control.
Check Point Security Management really shines when it comes to giving security teams control without complexity. It is built for scale, but still lets you move quickly when threats emerge or policies need to change. If the organization values consistency, visibility, and responsiveness, it is a strong platform to build on.
I would rate this solution an 8.
Has improved response time through real-time monitoring and centralized administration
What is our primary use case?
My main use case for Check Point Security Management is to control my gateways and the other Check Point security tools.
In this case, I use Check Point Security Management for controller, admin, change different topics in my gateways; my gateways are in Azure and this gateway has only a gateway, with no specific controlling because for this I use Check Point Security Management in other service, specifically in Infinity Portal.
I have no additional information to add about how I use Check Point Security Management in my environment, particularly with Infinity Portal or Azure gateways.
What is most valuable?
I love the real-time monitoring feature of Check Point Security Management because when I need to see different problems or block different traffic, I need to use a tool with real-time capabilities for troubleshooting or the other documentations with the real issue.
Real-time monitoring helps me solve issues, for example, when I have a problem with the VPN; I need to view different traffic and identify different calls about the problem, or when I need to view when I have different user a problem with into others networks or something else.
Check Point Security Management positively impacts my organization as it is a great tool for completing the security checkpoints tools, making it possible to create this solution in different sites, for example, in Azure and on-premise, with the same impact or application.
What needs improvement?
The documentation of Check Point Security Management is not intuitive because it is for advanced technical support, and when I need to deploy different features, it is complicated for junior support or technical personnel.
I would like to see more intuitive documentation or easier documentation for Check Point Security Management.
For how long have I used the solution?
I have been using this solution for two years in my current field.
What do I think about the stability of the solution?
Check Point Security Management is stable in my experience.
What do I think about the scalability of the solution?
Check Point Security Management is very scalable and handles growth or changes in my organization well.
How are customer service and support?
My experience with customer support for Check Point Security Management has been very good.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I did not previously use a different solution before Check Point Security Management.
What about the implementation team?
This is a great tool for admin or controlling your gateway.
What was our ROI?
I have not seen a return on investment from using Check Point Security Management; however, it provides better time response.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing is great because I need to put the licensing in the different tools over or around Check Point. I don't know the price because it's in a different area, not the support area.
Which other solutions did I evaluate?
I did not evaluate other options before choosing Check Point Security Management.
What other advice do I have?
I rate Check Point Security Management a nine out of ten.
Centralized interface has improved daily administration and reduced human error
What is our primary use case?
Our main use case for Check Point Security Management is for unified management of our security devices, so our administration can control everything from one centralized interface.
A specific example of how we use Check Point Security Management for shipment security management and administration control is that we have multiple security gateways integrated with security management. For any required configuration, we use the console on security management to implement all changes.
What is most valuable?
The best features Check Point Security Management offers are Smart Logging and Smart Console, which are helpful for log searching and analysis. While we have raw data, these two tools provide better visibility on incident trends and ensure GDPR compliance.
Smart Log and Smart Console help with visibility and compliance by capturing all events and traffic flow from central management. All users and events are captured in security management, providing full visibility.
Check Point Security Management has positively impacted our organization by providing better administration control and a unified central pane of glass for daily configuration.
A specific outcome demonstrating how Check Point Security Management has helped our organization is the reduction in human error through centralized policy management.
What needs improvement?
Check Point Security Management can be improved as it requires significant resources, particularly in larger deployments.
For how long have I used the solution?
We have been using Check Point Security Management for more than three years.
What do I think about the stability of the solution?
Check Point Security Management is stable.
What do I think about the scalability of the solution?
Check Point Security Management demonstrates good scalability.
How are customer service and support?
The customer support for Check Point Security Management is excellent, as the support engineers are supportive and have excellent knowledge in troubleshooting.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are using Check Point Security Management exclusively and have not previously used a different solution.
What was our ROI?
We have seen a return on investment through reduced cost and time.
Which other solutions did I evaluate?
Before choosing Check Point Security Management, we evaluated FortiManager.
What other advice do I have?
My advice for anyone looking into using Check Point Security Management is to look for the centralized single pane of glass to manage security devices.
I rate Check Point Security Management 8 out of 10 because of its unified console, usability, and proper reporting capabilities.