Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Check Point Security Management

Check Point Software Technologies

Reviews from AWS customer

4 AWS reviews

External reviews

46 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Luis Zamora

Centralized management has improved monitoring and streamlined policy control

  • November 19, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Security Management is centralizing my different gateways into the company, because I have a gateway in Azure and on-premise, and I typically use it for day-to-day management.

My main use case for Check Point Security Management also includes monitoring and logs, as I create sites or portals in one centralized portal because I need to see different events in different sites with my gateways.

How has it helped my organization?

Check Point Security Management has positively impacted my organization by defining how we oversee and enforce security policies across the entire infrastructure. Instead of juggling multiple consoles, we now have a single, unified view that makes monitoring and response much faster.

The specific outcome is about the saved time because the IT support team reduced their workload by 20% hours a day.

What is most valuable?

The best features Check Point Security Management offers for me include real granular policy control, as the availability to define very specific rules for different users, applications, and environments ensures that security is tailored rather than one-size-fits-all.

Granular control has helped me in practice. For example, we had a project team working with an external partner who needed access to certain cloud collaboration tools that weren't normally allowed on the corporate network. Using granular policy control, we created a rule that applied only to the team's device and only during working hours, while keeping the rest of the organization restricted. This meant the project could move forward smoothly without compromising overall security.

Another feature worth highlighting is the role-based access control, as it allows us to assign different levels of permission to administrators, auditors, and operations, so each person only sees and manages what's relevant to their role. This reduces the risk of accidental misconfigurations and keeps responsibility clearly separate.

Centralized administration is also a great feature.

What needs improvement?

Check Point Security Management could be improved by enhancing the documentation, as Check Point needs to create more and easier documentation.

For how long have I used the solution?

I have been using Check Point Security Management for around six years.

What do I think about the stability of the solution?

Check Point Security Management is stable.

What do I think about the scalability of the solution?

The scalability of Check Point Security Management is wonderful.

How are customer service and support?

The customer support is very fast, and I have no problems with this.

How would you rate customer service and support?

Neutral

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing is moderate because I think the pricing is great but somewhat high.

What other advice do I have?

Check Point Security Management is a great opportunity for centralizing your gateways, as it presents an excellent opportunity. I would rate this product an 8 out of 10.


    VikasTiwari

Manages multiple firewalls across locations through one dashboard and simplifies remote VPN configuration

  • November 18, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Security Management is to use the management server and all the security features of Check Point Gateway, allowing me to easily integrate and manage all firewalls within one dashboard.

I manage my firewalls through the dashboard by overseeing cluster management of active and standby devices, easily publishing and writing firewall policies based on five-tuples such as source IP, destination IP, source port, destination port, as well as configuring and monitoring both side-to-side and remote VPN activities.

What is most valuable?

The best features of Check Point Security Management are its cluster environment, which speeds up performance through SecureXL and ClusterXL, and its robust threat management tools that provide vulnerability exposure and virus mitigation capabilities.

ClusterXL and threat management have helped me by enhancing performance through redundancy in active and standby firewalls, allowing for multiple security gateways to operate smoothly within the security management setup.

Additionally, IPS is enabled, and I can integrate Check Point Infinity solutions through the Infinity portal, which allows for easy policy pushing and customization.

Check Point Security Management has positively impacted my organization by enabling me to set up various location firewalls in one dashboard, which is a significant benefit I have noticed. It saves me time and reduces complexity, as the friendly dashboard allows me to see all logs, policies, monitoring, auditing tools, and issues related to VPN and traffic, making it easy to manage everything efficiently.

What needs improvement?

Check Point Security Management can be improved; the recent R82 version is AI-enabled with increased security but I have encountered issues during upgrades, requiring backups to prevent potential disasters.

I recommend ensuring that backups are taken before any maintenance to avoid complications during upgrades.

For how long have I used the solution?

I have been working in my current field for the last six years.

What do I think about the stability of the solution?

Check Point Security Management is stable; I have experienced no downtime as long as HA is maintained during upgrades.

What do I think about the scalability of the solution?

Check Point Security Management does not have notable scalability options.

How are customer service and support?

Customer support for Check Point Security Management is excellent; I would rate it a 10 out of 10.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not switched from Check Point Security Management; my organization continues to use it.

How was the initial setup?

The setup was facilitated by the Azure Marketplace.

What about the implementation team?

I purchased Check Point Security Management through the Azure Marketplace.

What was our ROI?

I have seen a return on investment, as it only takes one to two employees to understand and manage policies effectively, leading to savings in employee costs.

What's my experience with pricing, setup cost, and licensing?

In terms of pricing, I find the pay-as-you-go model convenient, and I have utilized an enterprise license, making it easier on cost management, handled mainly by the procurement and licensing teams.

Which other solutions did I evaluate?

Before choosing Check Point Security Management, I evaluated some other management tools based on traffic handling and RMA policy capabilities, which helped me make my choice.

What other advice do I have?

I advise others considering Check Point Security Management to choose this product confidently because it has all types of features, including NGFW, VPN policies, DDoS, UTM features, and seamless integration capabilities with Check Point Infinity software for managing gateways across different locations. I would rate this product a 10 out of 10.


    Mzumbado

Centralized management has simplified threat detection and reduced policy deployment time

  • November 15, 2025
  • Review provided by PeerSpot

What is our primary use case?

Check Point Security Management centralizes the management and control over different site gateways, for example, in Azure or on-premise, allowing me to streamline security processes.

When I create different policies or VPNs or view activity or logs, I need to look at one site. In this case, Check Point Security Management provides everything for this scenario, offering me a comprehensive view.

When I need to prevent different threats over the network, I access Check Point Security Management and view the events or logs for different threats or suspicious activities, which enhances my overall security strategy.

What is most valuable?

The standout features of Check Point Security Management are unified policy management, real-time visibility, and automation capabilities, making it a powerful tool for security management.

Consistency across environments with Check Point Security Management helps me ensure that instead of maintaining separate rules for firewalls, cloud workloads, and data centers, we apply one unified policy that covers them all. This reduces misconfigurations and ensures compliance, proving to be a time-saver because rolling out a new rule or updating an existing one takes minutes, not hours, because it is propagated everywhere automatically.

Automation is one of the most valuable aspects of Check Point Security Management, and it often does not get enough attention compared to headline features like unified policies or visibility. With policy automation, routine tasks such as rule creation, compliance checks, or policy updates can be automated, reducing human error and saving hours of manual work.

Check Point Security Management has simplified administration in my organization because instead of juggling multiple consoles, everything is managed from a single pane of glass. This has reduced complexity and saved significant time for our IT team, improving our operational efficiency.

For a policy update, I used to spend two or three hours across multiple consoles. Now, with unified management in Check Point Security Management, it takes thirty to forty minutes, resulting in about a seventy percent reduction in effort, greatly boosting productivity.

What needs improvement?

While Check Point Security Management handles large environments well, performance and scalability could be improved because log queries and reporting generation can sometimes be slower under heavy loads. Optimizing performance for very large data sets would help the enterprise.

The documentation for Check Point Security Management needs to be more intuitive for all users and for first-time implementations, making it easier to navigate and utilize effectively.

For how long have I used the solution?

I have been working in my current field for around five years, gaining extensive experience in technical support roles.

I have been using Check Point Security Management for around four years, which has significantly enhanced my capabilities in managing security efficiently.

What do I think about the stability of the solution?

Check Point Security Management is very stable in my experience, ensuring that our operations run smoothly without interruptions.

What do I think about the scalability of the solution?

Check Point Security Management has very good scalability, effectively meeting our needs as our organization has grown over time.

How are customer service and support?

The customer support for Check Point Security Management is very fast, and for me, it is very good, providing prompt assistance when needed.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I did not previously use a different solution before Check Point Security Management, as it was my first choice for security management.

What was our ROI?

I consider the time saved in the department as a significant return on investment from using Check Point Security Management, which enhances overall productivity.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for Check Point Security Management is great because the pricing is normal compared with other solutions in the market.

Which other solutions did I evaluate?

I did not evaluate other options before choosing Check Point Security Management; it was a clear decision based on its features and capabilities.

What other advice do I have?

Check Point Security Management delivers strong centralized control, unified policies and management, and real-time visibility. It is not a perfect ten because there are areas that could be improved, for example, the documentation.

I recommend Check Point Security Management as an excellent tool for security and for centralizing your gateway, making it a solid choice for organizations looking to enhance their security posture.

I rate Check Point Security Management an eight overall, reflecting my experience with the platform.


    C. Sanchez

Centralized management has improved policy control and saved time across hybrid environments

  • November 13, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Security Management is for management of the gateways, creating, and centralized management in Check Point Infinity Portal.

For example, when I buy a gateway in Azure, I need to control or manage these gateways and use Check Point Security Management for controlling, creating different policies, and viewing the logs and events into Check Point Security Management. Check Point Security Management is used in Check Point Infinity Portal with Smart Console.

I use Check Point Security Management in my workflow as it provides centralized management because I put different gateways in different sites into the security management and control them.

What is most valuable?

One of the best features of Check Point Security Management that stands out for me is the powerful policy tools.

The flexible deployment model is valuable for me because I can choose deployment models, for example, on-premise, cloud, and different sites. I control or manage this with this tool.

An important feature I find helpful in Check Point Security Management is the policies view, where I create different policy labels for different gateways and control different traffic.

Check Point Security Management has positively impacted my organization, with one benefit being that I create one security management for controlling any gateways.

This level of security management has benefited my organization because it has saved me time.

I don't know the exact number, but it is easier for controlling the different gateways.

What needs improvement?

Check Point Security Management can be improved in terms of policies management and workflow efficiency. For example, the interface can be overwhelming for new users, and simplifying rule creation, offering guided workflows or templates will reduce onboarding time.

I think engaging role-based access control is essential; granular permissions for more flexible RBAC will allow the organization to delegate tasks. For example, read-only access, audit role, or contributor policy editing is a great opportunity to create more granular permissions.

For how long have I used the solution?

I have been using Check Point Security Management for around two years.

What do I think about the stability of the solution?

Check Point Security Management is stable in my experience, though there may be issues when using a cluster or in Infinity Portal.

What do I think about the scalability of the solution?

Check Point Security Management's scalability has met my needs as my organization grows; I have no problem with this.

How are customer service and support?

The customer support is great, but I think there is a need for more languages regarding the different responses over tickets.

How would you rate customer service and support?

Neutral

How was the initial setup?

My experience with pricing, setup cost, and licensing has been great; I faced no problem with the cost or license.

What was our ROI?

I have seen a return on investment in terms of time saved.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing has been great; I faced no problem with the cost or license.

What other advice do I have?

I recommend using Check Point Security Management if a company needs to control or manage their gateways. I would rate this product an 8 overall.


    K.Q

Has improved threat visibility and reduced response time with centralized policy management

  • November 08, 2025
  • Review provided by PeerSpot

What is our primary use case?

Check Point Security Management serves as our command center for centrally managing our firewalls and security policies across multi-sites, enabling us to configure rules, monitor traffic, and respond to threats in real-time.

Using SmartConsole, we monitor all network traffic across our gateways in Azure and VPNs to on-premise locations, providing us with a live view of sessions, blocked attempts, and threat indicators. The log monitor tab is especially useful, allowing us to filter by source, destination, and other types for examining different events.

What is most valuable?

Check Point Security Management offers centralized control, real-time threat visibility, and automation tools that streamline security operations across complex environments. The unified management console, SmartConsole in this case, acts as a single pane of glass for managing firewalls, gateways, and related infrastructure.

A significant strength of Check Point Security Management is the role-based access control, which allows us to delegate specific tasks such as log review, policy editing, and threat analysis to different teams without compromising security.

Check Point Security Management has positively impacted our organization by improving efficiency. Centralized policy management has drastically reduced the time we spend configuring and deploying rules across multiple gateways from hours to minutes, thanks to SmartConsole and automated policy deployment.

What needs improvement?

Check Point Security Management could be improved by enhancing its user interface, expanding third-party integrations, and refining reports and automation capabilities to make it more intuitive and scalable for diverse enterprise environments.

For how long have I used the solution?

I have been using Check Point Security Management for five years.

What do I think about the stability of the solution?

Check Point Security Management is very stable.

What do I think about the scalability of the solution?

Check Point Security Management's scalability is also very good.

How are customer service and support?

The customer support for Check Point Security Management is very good.

How would you rate customer service and support?

Positive

How was the initial setup?

The setup process of Check Point Security Management was mostly smooth, though we encountered a few surprises along the way.

What was our ROI?

The relevant metrics for return on investment is the time saved.

Since implementing Check Point Security Management, we have saved approximately 10 to 15 hours per week due to a significant reduction in manual workload and incident response times.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing is moderate because I need to be informed when deploying these different tools. The department expert handles this in our case.

What other advice do I have?

I would advise others looking into using Check Point Security Management to give it a try. When companies look for a centralized security solution, they should use Check Point Security Management. I would rate this product an 8 out of 10.


    Vishal Koovaparam

Has streamlined gateway management and freed up internal IT resources

  • November 07, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Security Management is to configure and manage our security gateway.

A specific example of how I use Check Point Security Management to manage our security gateway is that we have a head office and a branch office with an HA firewall of Check Point integrated with this security management product. All configuration, reporting, and any tasks related to the security gateway are completed through the security gateway.

What is most valuable?

The best features Check Point Security Management offers are its manageability and the easy user interface from where I can configure or manage multiple security gateways.

When I mention manageability and the user interface, it stands out to me because it is easy to trace any tabs to configure anything, making it very reliable.

Check Point Security Management has positively impacted my organization because our IT person is not always busy with troubleshooting or manageability after deploying this solution, as they can manage multiple security gateways from a single console.

It is saving our time, and we can do multiple things related to IT right now, with one single person doing multiple things after this deployment.

What needs improvement?

Check Point Security Management is working as per my requirements, so I don't see anything lacking in this solution. It is perfectly working for my organization.

For how long have I used the solution?

I have been using Check Point Security Management for more than two and a half years.

What do I think about the stability of the solution?

Check Point Security Management is stable in my experience, as I don't see any issue or downtime. It is perfectly stable and working till now.

What do I think about the scalability of the solution?

Check Point Security Management is currently handling my five or six gateways. From the scalability perspective, I can't say much because we have a limited number of branches, and it is handling that.

How are customer service and support?

My experience with Check Point Security Management's customer support has been positive, as they are very helpful in each and every technical aspect and able to resolve complex issues within the timeline. I am very much happy with their support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We are using Check Point Security Management only. I did not previously use a different solution.

How was the initial setup?

Before implementing Check Point Security Management, I was very worried about the initial integration part. However, that part was very easy because there are multiple KBs available from Check Point, and it is very straightforward to integrate. We didn't face any challenges with this solution.

What about the implementation team?

I was not part of the team who handles the pricing, setup cost, and licensing for Check Point Security Management.

What was our ROI?

The return on investment with Check Point Security Management is clear because it helps save time and money. One person is now working for multiple things related to IT, whereas previously we had multiple engineers involved for different tasks. After this deployment, one engineer can handle multiple things.

What's my experience with pricing, setup cost, and licensing?

I was not part of the team who handles the pricing, setup cost, and licensing for Check Point Security Management.

Which other solutions did I evaluate?

Before choosing Check Point Security Management, I evaluated other options like FortiGate and others.

What other advice do I have?

I would rate Check Point Security Management a nine out of ten. I chose nine out of ten because it is working very fine till now, and it might be in the future that I can see anything lacking inside, which is why I am not giving ten out of ten.

I would advise anyone looking into using Check Point Security Management, especially those having multiple security gateways and multiple branches using Check Point firewall, to consider it as the best centralized management solution. From this solution, reporting, all the security gateway management, and troubleshooting can be done easily, which will be very helpful for them. My review rating for Check Point Security Management is nine.


    Ktijerin

Centralized policy control has improved consistency and increased response speed across environments

  • November 05, 2025
  • Review provided by PeerSpot

What is our primary use case?

Check Point Security Management serves as our centralized control and visibility solution over all our security gateways and policies. We rely on it daily to manage firewall rules, monitor traffic, and respond to threats in real time.

What is most valuable?

The best feature of Check Point Security Management is the centralized policy control because I can manage all firewall rules, access control, and threat prevention policies from one console. This reduces configuration errors and ensures consistent enforcement across the network.

Check Point Security Management has had a strong positive impact on our organization. One of the biggest improvements is how much easier it has become to maintain consistent security policies across our environments.

What needs improvement?

Check Point Security Management can be improved by including a built-in tool to compare policies across gateways or environments to quickly spot inconsistencies.

While SmartConsole is powerful, it can feel cluttered at times. A cleaner layout or customizable dashboard would help users focus on what matters most.

For how long have I used the solution?

I have been using Check Point Security Management for two years.

What do I think about the stability of the solution?

Check Point Security Management is very stable.

What do I think about the scalability of the solution?

Check Point Security Management is very scalable.

How are customer service and support?

The customer support for Check Point Security Management is very great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not previously used a different solution.

What was our ROI?

I have seen a return on investment with Check Point Security Management in terms of money saved and time saved.

What's my experience with pricing, setup cost, and licensing?

Regarding pricing, setup cost, and licensing with Check Point Security Management, the flexible price and competitive pricing are favorable. For me, it is good.

Which other solutions did I evaluate?

I have not evaluated other options before choosing Check Point Security Management.

What other advice do I have?

For all people looking into using Check Point Security Management, I advise adopting it because it is a great tool for centralizing control.

Check Point Security Management really shines when it comes to giving security teams control without complexity. It is built for scale, but still lets you move quickly when threats emerge or policies need to change. If the organization values consistency, visibility, and responsiveness, it is a strong platform to build on.

I would rate this solution an 8.


    TVargas

Has improved response time through real-time monitoring and centralized administration

  • October 27, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Security Management is to control my gateways and the other Check Point security tools.

In this case, I use Check Point Security Management for controller, admin, change different topics in my gateways; my gateways are in Azure and this gateway has only a gateway, with no specific controlling because for this I use Check Point Security Management in other service, specifically in Infinity Portal.

I have no additional information to add about how I use Check Point Security Management in my environment, particularly with Infinity Portal or Azure gateways.

What is most valuable?

I love the real-time monitoring feature of Check Point Security Management because when I need to see different problems or block different traffic, I need to use a tool with real-time capabilities for troubleshooting or the other documentations with the real issue.

Real-time monitoring helps me solve issues, for example, when I have a problem with the VPN; I need to view different traffic and identify different calls about the problem, or when I need to view when I have different user a problem with into others networks or something else.

Check Point Security Management positively impacts my organization as it is a great tool for completing the security checkpoints tools, making it possible to create this solution in different sites, for example, in Azure and on-premise, with the same impact or application.

What needs improvement?

The documentation of Check Point Security Management is not intuitive because it is for advanced technical support, and when I need to deploy different features, it is complicated for junior support or technical personnel.

I would like to see more intuitive documentation or easier documentation for Check Point Security Management.

For how long have I used the solution?

I have been using this solution for two years in my current field.

What do I think about the stability of the solution?

Check Point Security Management is stable in my experience.

What do I think about the scalability of the solution?

Check Point Security Management is very scalable and handles growth or changes in my organization well.

How are customer service and support?

My experience with customer support for Check Point Security Management has been very good.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I did not previously use a different solution before Check Point Security Management.

What about the implementation team?

This is a great tool for admin or controlling your gateway.

What was our ROI?

I have not seen a return on investment from using Check Point Security Management; however, it provides better time response.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing is great because I need to put the licensing in the different tools over or around Check Point. I don't know the price because it's in a different area, not the support area.

Which other solutions did I evaluate?

I did not evaluate other options before choosing Check Point Security Management.

What other advice do I have?

I rate Check Point Security Management a nine out of ten.


    Ankush Kondewar

Centralized interface has improved daily administration and reduced human error

  • October 27, 2025
  • Review provided by PeerSpot

What is our primary use case?

Our main use case for Check Point Security Management is for unified management of our security devices, so our administration can control everything from one centralized interface.

A specific example of how we use Check Point Security Management for shipment security management and administration control is that we have multiple security gateways integrated with security management. For any required configuration, we use the console on security management to implement all changes.

What is most valuable?

The best features Check Point Security Management offers are Smart Logging and Smart Console, which are helpful for log searching and analysis. While we have raw data, these two tools provide better visibility on incident trends and ensure GDPR compliance.

Smart Log and Smart Console help with visibility and compliance by capturing all events and traffic flow from central management. All users and events are captured in security management, providing full visibility.

Check Point Security Management has positively impacted our organization by providing better administration control and a unified central pane of glass for daily configuration.

A specific outcome demonstrating how Check Point Security Management has helped our organization is the reduction in human error through centralized policy management.

What needs improvement?

Check Point Security Management can be improved as it requires significant resources, particularly in larger deployments.

For how long have I used the solution?

We have been using Check Point Security Management for more than three years.

What do I think about the stability of the solution?

Check Point Security Management is stable.

What do I think about the scalability of the solution?

Check Point Security Management demonstrates good scalability.

How are customer service and support?

The customer support for Check Point Security Management is excellent, as the support engineers are supportive and have excellent knowledge in troubleshooting.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We are using Check Point Security Management exclusively and have not previously used a different solution.

What was our ROI?

We have seen a return on investment through reduced cost and time.

Which other solutions did I evaluate?

Before choosing Check Point Security Management, we evaluated FortiManager.

What other advice do I have?

My advice for anyone looking into using Check Point Security Management is to look for the centralized single pane of glass to manage security devices.

I rate Check Point Security Management 8 out of 10 because of its unified console, usability, and proper reporting capabilities.


    Riyaz Khan.

Centralized configuration has saved time and improved security visibility across all gateways

  • October 27, 2025
  • Review provided by PeerSpot

What is our primary use case?

We are using Check Point Security Management to centrally push the configuration to our security gateway, and we are using this solution to upgrade patches and firmware updates to our security gateway devices.

We have upgraded our security gateway from central management using Check Point Security Management, eliminating the need to log in to each security gateway device individually. We simply push the upgrade firmware version from centralized management, and it upgrades from there.

With central management of Check Point Security Management, we track all employees connected to our network to prevent security breaches or issues. All these features can be implemented from centrally management with the help of visibility.

What is most valuable?

The best feature of Check Point Security Management is centralized management and login, making it an easy job for engineers to configure and manage it.

After implementing the management of devices using Check Point Security Management, it became very easy and we are getting full visibility.

Time savings have been significant because with Check Point Security Management, our engineers spend less time managing or configuring the security gateway. We simply log in from central management to push changes to multiple security gateways easily.

What needs improvement?

The initial configuration and setup knowledge base document for Check Point Security Management could be upgraded to make it more helpful for configuration reference.

Apart from the knowledge base improvements needed, everything is very useful and meaningful in Check Point Security Management.

For how long have I used the solution?

I have been using Check Point Security Management for almost three years.

What do I think about the stability of the solution?

Check Point Security Management is stable.

What do I think about the scalability of the solution?

Check Point Security Management is good in terms of scalability. We can add more gateways, and it handles them very easily.

How are customer service and support?

I have had a great experience with the support team of Check Point Security Management. They are supportive and very knowledgeable. When we face technical issues, they are ready to help us.

How would you rate customer service and support?

Positive

What's my experience with pricing, setup cost, and licensing?

Regarding pricing, setup costs, and licensing for Check Point Security Management, we have not faced any challenges. Everything was as per expectation and costing.

Which other solutions did I evaluate?

We evaluated Fortinet FortiManager before choosing Check Point Security Management.

What other advice do I have?

Anyone looking for a centralized management solution can consider Check Point Security Management as one of the most valued solutions that will really help them to centrally manage all security gateways. I rate Check Point Security Management nine out of ten.