We just raised a $30M Series A: Read our story

Compare Check Point Security Management vs. ELK Logstash

Cancel
You must select at least 2 products to compare!
Devo Logo
Read 10 Devo reviews.
10,518 views|4,129 comparisons
ELK Logstash Logo
22,038 views|19,254 comparisons
Top Review
Find out what your peers are saying about Check Point Security Management vs. ELK Logstash and other solutions. Updated: September 2021.
542,721 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"Being able to build and modify dashboards on the fly with Activeboards streamlines my analyst time because my analysts aren't doing it across spreadsheets or five different tools to try to build a timeline out themselves. They can just ingest it all, build a timeline out across all the logging, and all the different information sources in one dashboard. So, it's a huge time saver. It also has the accuracy of being able to look at all those data sources in one view. The log analysis, which would take 40 hours, we can probably get through it in about five to eight hours using Devo.""Even if it's a relatively technical tool or platform, it's very intuitive and graphical. It's very appealing in terms of the user interface. The UI has a graphically interface with the raw data in a table. The table can be as big as you want it, depending on your use case. You can easily get a report combining your data, along with calculations and graphical dashboards. You don't need a lot of training, because the UI is relatively very intuitive.""The real-time analytics of security-related data are super. There are a lot of data feeds going into it and it's very quick at pulling up and correlating the data and showing you what's going on in your infrastructure. It's fast. The way that their architecture and technology works, they've really focused on the speed of query results and making sure that we can do what we need to do quickly. Devo is pulling back information in a fast fashion, based on real-time events.""The user interface is really modern. As an end-user, there are a lot of possibilities to tailor the platform to your needs, and that can be done without needing much support from Devo. It's really flexible and modular. The UI is very clean.""One of the biggest features of the UI is that you see the actual code of what you're doing in the graphical user interface, in a little window on the side. Whatever you're doing, you see the code, what's happening. And you can really quickly switch between using the GUI and using the code. That's really useful.""The thing that Devo does better than other solutions is to give me the ability to write queries that look at multiple data sources and run fast. Most SIEMs don't do that. And I can do that by creating entity-based queries. Let's say I have a table which has Okta, a table which has G Suite, a table which has endpoint telemetry, and I have a table which has DNS telemetry. I can write a query that says, 'Join all these things together on IP, and where the IP matches in all these tables, return to me that subset of data, within these time windows.' I can break it down that way.""The user experience [is] well thought out and the workflows are logical. The dashboards are intuitive and highly customizable.""It's very, very versatile."

More Devo Pros »

"I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation. These allow me to select to whom to do what, and when.""The additional features offered by the solution are excellent. We didn't have a lot fo these on a previous solution, and they've proven to be an advantage for us.""As the security administrator, who is responsible for the day-to-day tasks (e.g. creating new firewall rules, monitoring the security alerts and incidents etc.) and the maintenance (e.g. installing the new Jumbo Hotfixes), I find the Check Point Security Management R80.10 to be the great solution.""The most valuable feature for me is Identity Awareness.""The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other.""The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration.""It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution. Check Point is effective when it comes to security control and threat prevention.""The unique management using Smart Console for all firewalls is very useful."

More Check Point Security Management Pros »

"The most valuable feature is the ability to collect authentication information from service providers.""ELK Logstash is easy and fast, at least for the initial setup with the out of box uses.""It's simple and easy to use.""I use the stack every morning to check the errors and it's just so clear. I don't see any disadvantage to using Logstash.""The most valuable feature for me is Discover.""The solution has a good community surrounding it for lots of helpful documentation for troubleshooting purposes.""The feature that we have found the most valuable is scalability.""The indexes allow you to get your results quickly. The filtering and log passing is the advantage of Logstash."

More ELK Logstash Pros »

Cons
"Their documentation could be better. They are growing quickly and need to have someone focused on tech writing to ensure that all the different updates, how to use them, and all the new features and functionality are properly documented.""There's always room to reduce the learning curve over how to deal with events and machine data. They could make the machine data simpler.""Devo has a lot of cloud connectors, but they need to do a little bit of work there. They've got good integrations with the public cloud, but there are a lot of cloud SaaS systems that they still need to work with on integrations, such as Salesforce and other SaaS providers where we need to get access logs.""The Activeboards feature is not as mature regarding the look and feel. Its functionality is mature, but the look and feel is not there. For example, if you have some data sets and are trying to get some graphics, you cannot change anything. There's just one format for the graphics. You cannot change the size of the font, the font itself, etc.""There's room for improvement within the GUI. There is also some room for improvement within the native parsers they support. But I can say that about pretty much any solution in this space.""Some third-parties don't have specific API connectors built, so we had to work with Devo to get the logs and parse the data using custom parsers, rather than an out-of-the-box solution.""Technical support could be better.""From our experience, the Devo agent needs some work. They built it on top of OS Query's open-source framework. It seems like it wasn't tuned properly to handle a large volume of Windows event logs. In our experience, there would definitely be some room for improvement. A lot of SIEMs on the market have their own agent infrastructure. I think Devo's working towards that, but I think that it needs some improvement as far as keeping up with high-volume environments."

More Devo Cons »

"In future releases I'd like to see better integration with other applications and solutions. Also, the cost of the license is too high, it's too expensive.""The reporting should be improved in future releases. It needs to be very explicit. This is very important.""I like that the Compliance software blade is available for free with the Security Management server purchase, but it is free for only one year - after that you have to buy an additional license to continue using it. I think such an important feature is vital for the management server, and should not be licensed separately.""I would like to bind users to their network, as well as their local office machine.""The migration from R77 Manager to R80 is a major upgrade. It's not very easy to do. There should be some kind of Wizard for a direct upgrade from the R77 to the R80. There should be an easy way for the customers to do the upgrade.""For those not familiar with the Command Line interface, there should be an option in the GUI for operating backups.""Support is the main area that they need to improve. Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region. I would like a feature where there is a workflow to provide authorization to some users before they're able to create and apply rules. Such a feature should be integrated with the management. It should not be in the box that comes with it.""I've found the solution was a bit unstable."

More Check Point Security Management Cons »

"Anything that supports high availability or ease of deployment in a highly available environment would help to improve this solution.""In terms of what could be improved with Elastic, in some use cases, especially on the advanced level, they are not ready made, so you'll have to write some scripts.""This solution cannot do predictive maintenance, so we have to build our own modules for doing it.""One thing they could add is a quick step to enable users who don't have a solid background to build a dashboard and quickly search, without difficulty.""I would like the process of retrieving archived data and viewing it in Kibana to be simplified.""The solution needs to be more reactive to investigations. We need to be able to detect and prevent any attacks before it can damage our infrastructure. Currently, this solution doesn't offer that.""The process of designing dashboards is a little cumbersome in Kibana. Unless you are an expert, you will not be able to use it. The process should be pretty straightforward. The authentication feature is what we are looking for. We would love to have a central authentication system in the open-source edition without the need for a license or an enterprise license. If they can give at least a simple authentication system within a company. In a large organization, authentication is very essential for security because logs can contain a lot of confidential data. Therefore, an authentication feature for who accesses it should be there.""We're using the open-source edition, for now, I think maybe they can allow their OLED plugin to be open source, as at the moment it is commercialised."

More ELK Logstash Cons »

Pricing and Cost Advice
"It's a per gigabyte cost for ingestion of data. For every gigabyte that you ingest, it's whatever you negotiated your price for. Compared to other contracts that we've had for cloud providers, it's significantly less.""We have an OEM agreement with Devo. It is very similar to the standard licensing agreement because we are charged in the same way as any other customer, e.g., we use the backroom.""I'm not involved in the financial aspect, but I think the licensing costs are similar to other solutions. If all the solutions have a similar cost, Devo provides more for the money.""Devo is definitely cheaper than Splunk. There's no doubt about that. The value from Devo is good. It's definitely more valuable to me than QRadar or LogRhythm or any of the old, traditional SIEMs.""[Devo was] in the ballpark with at least a couple of the other front-runners that we were looking at. Devo is a good value and, given the quality of the product, I would expect to pay more.""Be cautious of metadata inclusion for log types in pricing, as there are some "gotchas" with that.""Devo was very cost-competitive... Devo did come with that 400 days of hot data, and that was not the case with other products."

More Devo Pricing and Cost Advice »

"This product can be used for 25 security gateways on a basic license."

More Check Point Security Management Pricing and Cost Advice »

"Elastic Stack is an open-source tool. You don't have to pay anything for the components.""This is an open-source product, so there are no costs.""It is easy to deploy, easy to use, and you get everything you need to become operational with it, and have nothing further to pay unless you want the OLED plugin.""Compared to other products such as Dynatrace, this is one of the cheaper options.""The solution is free.""I find it better than Splunk in terms of cost-effectiveness. For cost-effectiveness, I would rate it a nine out of 10."

More ELK Logstash Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
542,721 professionals have used our research since 2012.
Questions from the Community
Top Answer: It's very, very versatile.
Top Answer: Devo, like other vendors, doesn't charge extra for playbooks and automation. That way, you are only paying for the side… more »
Top Answer: I need more empowerment in reporting. For example, when I'm using Qlik or Power BI in terms of reporting for the… more »
Top Answer: It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution… more »
Top Answer: Support is the main area that they need to improve. Our support experience is not very smooth. We are based in Africa… more »
Top Answer: We use it for both perimeter and internal defense.
Top Answer: Datadog: Unify logs, metrics, and traces from across your distributed infrastructure. Datadog is the leading service for… more »
Top Answer: Its flexibility is most valuable. We can have a number of scenarios, and we can get logs from anything. If we know how… more »
Top Answer: I find it better than Splunk in terms of cost-effectiveness. For cost-effectiveness, I would rate it a nine out of 10.
Comparisons
Also Known As
R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
Elastic Stack, ELK Stack
Learn More
Overview

Devo is the only cloud-native logging and security analytics platform that releases the full potential of all your data to empower bold, confident action when it matters most. Only the Devo platform delivers the powerful combination of real-time visibility, high-performance analytics, scalability, multitenancy, and low TCO crucial for monitoring and securing business operations as enterprises accelerate their shift to the cloud.

R80.30 Cyber Security Management features centralized management control across all networks and cloud environments, increasing operational efficiency and lowering the complexity of managing your security. Learn more about Security Management.

Logstash is an open source, server-side data processing pipeline that ingests data from a multitude of sources simultaneously, transforms it, and then sends it to your favorite “stash.”

Offer
See Devo in Action

See how Devo allows you to free yourself from data management, and make machine data and insights accessible.

Learn more about Check Point Security Management
Learn more about ELK Logstash
Sample Customers
United States Air Force, Rubrik, Critical Start, NHL, Panda Security, Telefonica, CaixaBank, OpenText
Hedgetec, Geiger
Sprint, Grab, Autopilot, Just Eat, Verizon Wireless, Green Man Gaming, Compare Group, Tango, Perceivant, Quizlet
Top Industries
VISITORS READING REVIEWS
Computer Software Company27%
Comms Service Provider20%
Government8%
Financial Services Firm7%
REVIEWERS
Manufacturing Company42%
Financial Services Firm21%
Security Firm8%
Non Tech Company4%
VISITORS READING REVIEWS
Computer Software Company32%
Comms Service Provider29%
Financial Services Firm6%
Manufacturing Company4%
REVIEWERS
Financial Services Firm50%
Comms Service Provider25%
Computer Software Company13%
Transportation Company13%
VISITORS READING REVIEWS
Comms Service Provider25%
Computer Software Company24%
Financial Services Firm7%
Government7%
Company Size
REVIEWERS
Small Business9%
Midsize Enterprise18%
Large Enterprise73%
VISITORS READING REVIEWS
Small Business48%
Midsize Enterprise15%
Large Enterprise37%
REVIEWERS
Small Business10%
Midsize Enterprise45%
Large Enterprise45%
REVIEWERS
Small Business41%
Midsize Enterprise18%
Large Enterprise41%
Find out what your peers are saying about Check Point Security Management vs. ELK Logstash and other solutions. Updated: September 2021.
542,721 professionals have used our research since 2012.

Check Point Security Management is ranked 5th in Log Management with 16 reviews while ELK Logstash is ranked 6th in Log Management with 15 reviews. Check Point Security Management is rated 9.0, while ELK Logstash is rated 7.8. The top reviewer of Check Point Security Management writes "Helps our security team create policies in a centralized way". On the other hand, the top reviewer of ELK Logstash writes "It is quite comprehensive and you're able to do a lot of tasks". Check Point Security Management is most compared with Fortinet FortiAnalyzer, IBM QRadar, LogRhythm NextGen SIEM, Wazuh and AT&T AlienVault USM, whereas ELK Logstash is most compared with Datadog, Splunk, Graylog, vRealize Log Insight and Elastic Beats. See our Check Point Security Management vs. ELK Logstash report.

See our list of best Log Management vendors.

We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.