Overview
Video 1
Video 1

Product video
Check Point Security Management provides an advanced security management platform for enterprises to deploy protections across their organizations, across public, private and hybrid clouds.
Efficient: Automation and granular delegation help alleviate operational overhead. The Security Management API allows security teams to automate any task or create web portals for security self-service. Management interface features anticipate the administrator's daily needs, providing security intelligence to make better policy decisions.
Fully Integrated: Security Management has logging, monitoring, event correlation and reporting in one place. A visual dashboard provides full visibility into security across the network, helping organizations monitor the status of enforcement points and stay alert to potential threats. The customizable dashboard provides a full view of the security posture and drilldown capabilities into incident or log details. Reports are configurable and accessible from any web browser.
Security Management is required to control CloudGuard Network Security Gateways.
Customers requiring security management for up to 5 Security Gateways may deploy this offering on instances with less than 8 compute cores. Managing more than 5 Gateways on an instance with less than 8 compute cores is not supported. Customers requiring security management for up to 25 Security Gateways must deploy this offering on instances with 8 or more compute cores.
Customers requiring security management for more than 25 Security Gateways should contact Check Point or purchase BYOL.
To maintain the highest quality and security of our management solutions, Check Point recommends installing the latest recommended Jumbo Hotfix, especially after the initial deployment.
Highlights
- One Platform, One Policy a single pane of glass console manages the entire IT infrastructure - from the data center to private/public/hybrid cloud deployments - for full visibility, security efficiency and consistency. The policy can be segmented into layers for seamless network segmentation.
- Extensible, Scalable Platform: The Security Management platform scales to the most complex and dynamic environments. The RESTful APIs make it easy to integrate securely with orchestration, change management and ticketing systems, enabling automated security change control and provisioning.
- Check Point is an APN Advanced Technology Partner with Networking and Security Competencies. CloudGuard Network Security is integrated with a broad range of AWS services, including Amazon GuardDuty, Amazon CloudWatch, AWS Security Hub, AWS Transit Gateway, AWS CloudTrail and VPC Flow Logs. CloudGuard Network Security also provides a library of CloudGuard CloudFormation templates (CFTs) to simplify deployment.
Details
Unlock automation with AI agent solutions

Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Free trial
- ...
Dimension | Cost/hour |
|---|---|
c6in.xlarge Recommended | $0.62 |
r5.xlarge | $0.62 |
r6i.24xlarge | $1.83 |
r6i.4xlarge | $1.83 |
m5.16xlarge | $1.83 |
r5.12xlarge | $1.83 |
m5.2xlarge | $0.62 |
r6i.2xlarge | $0.62 |
r6i.xlarge | $0.62 |
r5b.large | $0.62 |
Vendor refund policy
Terminate the instance at any given time to stop incurring charges.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Additional details
Usage instructions
Once the instance is running, connect to it using SSH, set an admin password using: 'set user admin password' followed by 'save config'. Then connect to https://[instance] using Internet Explorer (IE) to finalize the configuration. Notes:
- SSH password authentication is disabled in /etc/ssh/sshd_config
- For information regarding Firefox and Chrome refer to sk121373.
Resources
Support
Vendor support
This offer includes Premium Support. For the full list of included support services visit: https://www.checkpoint.com/support-services/support-plans/ To open a support ticket, you would need to have a Check Point user center account. If you do not have a user center account, you can sign up for one here: https://accounts.checkpoint.com . Need support? Contact us at https://www.checkpoint.com/support-services/contact-support/Â
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Centralized management has improved visibility and simplified configuration across multiple devices
What is our primary use case?
We are using Check Point Security Management to manage multiple Check Point next-generation firewalls, enabling all these firewalls to be managed from the security management. For any configuration in the firewall, we manage it in Check Point Security Management console, where we configure policies, new object creation, services, ports configuration, or any VPN configuration, and we push all the configuration from the security management.
What is most valuable?
The best features Check Point Security Management offers in my experience are the user interface and the logging service.
The user interface of Check Point Security Management is very understandable, and users can easily configure it. Additionally, every activity or traffic flow from our network gets logged in our security devices.
Once we deployed Check Point Security Management, the manageability and the reporting capabilities made our job easier. We are getting better visibility, and based on this visibility, we configure the policies. Since implementing Check Point Security Management, it has saved our time, and the configuration and troubleshooting processes are easy.
What needs improvement?
For smaller organizations, the pricing of Check Point Security Management can be more reasonable.
For how long have I used the solution?
I have been using Check Point Security Management for more than three years.
What do I think about the stability of the solution?
Check Point Security Management is stable and I have not experienced any downtime or reliability issues.
What do I think about the scalability of the solution?
Check Point Security Management can easily handle the organization's growth, but it will depend on the model.
How are customer service and support?
I have a great experience with the customer support team of Check Point Security Management.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I did not previously use a different solution before Check Point Security Management.
What other advice do I have?
For any organization looking for centralized management of security, I consider Check Point Security Management a good solution. Apart from the pricing, everything about Check Point Security Management is perfect. I rate Check Point Security Management as nine out of ten.
Which deployment model are you using for this solution?
Has reduced configuration errors and helps monitor threats in real time
What is our primary use case?
My main use case for Check Point Security Management is to manage my security gateway.
A specific example of how I use Check Point Security Management with my security gateway is that from the security management, we make changes in our security gateway. It is related to configuration, whether the security policy for the users on NATting, VPN, or security profiles. All this configuration, we push. Any modification needed in our current configuration security gateway, we normally push all this configuration from security management.
What is most valuable?
The best features that Check Point Security Management offers, which stand out to me the most, are logging and monitoring. The monitoring is exceptional as it provides consolidated logs, signals, and any alerts that come from the security gateway in real time.
The logging and monitoring help my team day to day by alerting us if any incident or event occurs, enabling us to detect and prevent threats within seconds.
Check Point Security Management has positively impacted my organization because with more than one security gateway in our organization, we are easily able to manage and configure our security gateway with the help of security management.
What needs improvement?
Check Point Security Management can be improved because for smaller organizations with only a single or a couple of devices, there is no need for the management. They are required to use the management system, which increases costs for smaller organizations. This aspect could be addressed.
For how long have I used the solution?
I have been using Check Point Security Management for more than two years.
What do I think about the stability of the solution?
In my experience, Check Point Security Management is stable as I have not encountered any issues.
What do I think about the scalability of the solution?
Check Point Security Management's scalability is good because it can handle growth easily, but it depends on the model. While I cannot say much on scalability, it is quite stable.
How are customer service and support?
The customer support for Check Point Security Management is supportive, based on my interactions with them.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We did not have any security management from another vendor before using Check Point Security Management.
What was our ROI?
Since using Check Point Security Management, I have seen a return on investment because with multiple gateways, we do not have to invest in multiple engineers. One engineer can handle multiple security gateways from the security management, saving both time and money.
What's my experience with pricing, setup cost, and licensing?
Which other solutions did I evaluate?
Before choosing Check Point Security Management, we evaluated Fortinet.
What other advice do I have?
The solution has saved our time, reduced errors, and made management simpler.
My advice for others looking into using Check Point Security Management is that if anyone wants to save time and resources, they can consider this solution to configure and manage multiple gateways.
I rate Check Point Security Management an eight out of ten.
Which deployment model are you using for this solution?
Centralized management has improved productivity and streamlined network configuration
What is our primary use case?
Our main use case for Check Point Security Management is to centrally manage our multiple gateways to push any configuration centralized.
What is most valuable?
A standout feature of Check Point Security Management is its user-friendly interface, which is easy to understand, and we can easily generate custom reports to present to our management team.
In terms of custom reporting, we generally generate reports such as top 10 or top 20 users consuming more bandwidth or top 10 risky users, helping us have visibility into users accessing malicious websites or security events that happened recently.
After deploying Check Point Security Management, we improved our productivity by integrating all devices into a single console instead of managing separate log-ins for each branch's gateways, making our admin team's tasks easier.
I have noticed that it has reduced errors because when configuring through the security management, a single configuration is pushed to all gateways, saving time and reducing mistakes.
What needs improvement?
It can be improved because sometimes it lags when accessing the management gateway.
For how long have I used the solution?
I have been with my current organization for more than four years, and I have more than 10 years of experience in this field.
What do I think about the stability of the solution?
Check Point Security Management is stable, but there are some lags.
What do I think about the scalability of the solution?
The scalability is outstanding and handles growth and increased demand very well.
How are customer service and support?
The support team is outstanding, helping us with troubleshooting when we require technical support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Before choosing Check Point Security Management, we evaluated Fortinet.
How was the initial setup?
We have been using Check Point Security Management since the start.
What was our ROI?
After deploying the security management, our time has been saved, and we require fewer engineers, allowing a single team to handle all security gateways, saving costs at the management level.
What's my experience with pricing, setup cost, and licensing?
The setup cost and pricing are a little concerning, but considering the features and stability of the devices, they are outstanding.
What other advice do I have?
If anyone has more than one branch and multiple security gateways, they should definitely consider Check Point Security Management or a cloud-based solution to manage all security gateways easily.
Everything looks perfect right now.
On a scale of 1-10, I rate Check Point Security Management an 8.
Which deployment model are you using for this solution?
Central management has simplified policy enforcement and improved reporting
What is our primary use case?
We are using Check Point Security Management to centrally manage and configure the firewalls in our day-to-day operations.
In my scenario, while using Check Point Security Management , there are more than one gateways, so we create policies or any modification regarding IPS or VPNs or application control policies. We centrally enforce all these configurations or modifications from centralized security management.
What is most valuable?
Based on my experience with Check Point Security Management, the best part is that we can enforce all configurations such as firewall policy or application control across all managed gateways. We can also generate compliance reports based on our requirements. We are using this central management for simplified configuration.
The reports generated through Check Point Security Management are very useful for our audit team. Whenever they ask for our logs or reports on network incidents, we generate the reports based on audit requirements and hand them over to our audit team.
With Check Point Security Management, the management of multiple gateways has become very easy and we can easily modify or enforce any changes in our existing configuration. We can also monitor from central, which is very useful.
What needs improvement?
The initial setup of Check Point Security Management is a little bit complex. This process could be made easier so that the configuration or initial setup would be simpler to configure.
For how long have I used the solution?
We have been using Check Point Security Management for more than three years.
What do I think about the stability of the solution?
Check Point Security Management is stable.
What do I think about the scalability of the solution?
The scalability of Check Point Security Management is excellent. We can integrate and manage multiple gateways.
How are customer service and support?
The customer support for Check Point Security Management is good.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We have been using Check Point firewall and Check Point Security Management from the beginning.
We evaluated FortiManager before choosing Check Point Security Management.
How was the initial setup?
The initial setup of Check Point Security Management is a little bit complex. This process could be made easier so that the configuration or initial setup would be simpler to configure.
What about the implementation team?
As the administrator of the central management, I can say that the benefit of using Check Point Security Management includes time saving and fewer resources needed to manage it. This is beneficial for any organization.
What was our ROI?
Using Check Point Security Management has reduced the configuration timeline and helped us easily become compliant with security requirements.
What's my experience with pricing, setup cost, and licensing?
I was not part of the pricing or setup cost decisions.
Which other solutions did I evaluate?
We evaluated FortiManager before choosing Check Point Security Management.
What other advice do I have?
I suggest anyone looking to manage Check Point gateways centrally should consider Check Point Security Management. It is really helpful and time-saving. You can enforce any configuration from central, which will be very helpful and beneficial for any organization. I rate Check Point Security Management 8 out of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Has improved gateway control and speeds up detection of suspicious activity
What is our primary use case?
I need to use Check Point Security Management because it's necessary for controlling and administering our gateways.
When I need to change different policies in my gateway, I need to go into Check Point Security Management because I need to change and review new different items or objects in my security company.
Another main use case is when I need to review or check different logs, I need to use Check Point Security Management to check.
What is most valuable?
The best features Check Point Security Management offers are its intuitive tools. Around the technology, Check Point Security Management is the best way for controlling my gateways. When I need to use logs, events, and policies, and different things around controlling my gateways, it's very easy to use logs, events, and monitoring in Check Point Security Management. When I need to check different possibilities of hackers or others, it is very intuitive to use these features.
Check Point Security Management has impacted my organization positively because the organization's security and perimeter area is better after using this technology. Two years ago, when I needed to report different activities about suspicious activities, I needed to check faster, and I controlled the situation much faster.
Check Point Security Management offers great features for controlling your gateways.
What needs improvement?
Different features in Check Point Security Management indicate that Check Point needs to create different dashboards and different options to give their clients more creative solutions.
For how long have I used the solution?
I have been using Check Point Security Management for around five years.
What do I think about the stability of the solution?
My experience with Check Point Security Management is very stable. There are no problems with different issues.
What do I think about the scalability of the solution?
Check Point Security Management is very scalable.
How are customer service and support?
My experience with Check Point Security Management's customer support in the past was not the best. However, at this time, the customer support is better.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I only use Check Point.
How was the initial setup?
My experience with Check Point Security Management's pricing is so-so because the license is very high in different products around Check Point. Regarding the setup, it is very easy. Other aspects provide a great experience around this feature.
What about the implementation team?
I need to purchase Check Point Security Management in the Marketplace in Azure .
What's my experience with pricing, setup cost, and licensing?
The price is very high. The license for the different features of Check Point infrastructure is also high.
What other advice do I have?
I need to use Check Point Security Management in my security department and it is a very important tool for us. The support during the years is better than in the past.
In my case, I deploy Check Point Security Management in cloud and on-premises.
On a scale of 1-10, I rate Check Point Security Management a 9 out of 10.