Check Point CloudGuard Posture Management vs. IBM Security QRadar SIEM

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Check Point CloudGuard Posture Management
Score 6.4 out of 10
N/A
CloudGuard Posture Management provides cloud security and compliance posture management for cloud-native environments, including AWS, Azure, Google Cloud, and Kubernetes. CloudGuard automates security, governance and compliance, with customized policies, delivering high-fidelity visibility and control. It is based on technology acquired with Dome9 by Check Point Software Technologies in late 2018. Their product CloudGuard Dome9 was a cloud security and cloud security operations visualization…N/A
IBM Security QRadar SIEM
Score 8.7 out of 10
N/A
IBM Security QRadar is security information and event management (SIEM) Software.N/A
Pricing
Check Point CloudGuard Posture ManagementIBM Security QRadar SIEM
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Check Point CloudGuard Posture ManagementIBM Security QRadar SIEM
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Check Point CloudGuard Posture ManagementIBM Security QRadar SIEM
Top Pros
Top Cons
Features
Check Point CloudGuard Posture ManagementIBM Security QRadar SIEM
Security Information and Event Management (SIEM)
Comparison of Security Information and Event Management (SIEM) features of Product A and Product B
Check Point CloudGuard Posture Management
-
Ratings
IBM Security QRadar SIEM
8.6
54 Ratings
10% above category average
Centralized event and log data collection00 Ratings9.927 Ratings
Correlation00 Ratings8.854 Ratings
Event and log normalization/management00 Ratings9.527 Ratings
Deployment flexibility00 Ratings7.927 Ratings
Integration with Identity and Access Management Tools00 Ratings8.250 Ratings
Custom dashboards and workspaces00 Ratings7.454 Ratings
Host and network-based intrusion detection00 Ratings9.625 Ratings
Data integration/API management00 Ratings9.07 Ratings
Behavioral analytics and baselining00 Ratings8.133 Ratings
Rules-based and algorithmic detection thresholds00 Ratings9.134 Ratings
Response orchestration and automation00 Ratings7.75 Ratings
Reporting and compliance management00 Ratings7.632 Ratings
Incident indexing/searching00 Ratings8.97 Ratings
Best Alternatives
Check Point CloudGuard Posture ManagementIBM Security QRadar SIEM
Small Businesses
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Score 8.2 out of 10
AlienVault USM
AlienVault USM
Score 8.0 out of 10
Medium-sized Companies
Druva Data Resiliency Cloud
Druva Data Resiliency Cloud
Score 9.6 out of 10
Splunk Enterprise
Splunk Enterprise
Score 8.3 out of 10
Enterprises
Druva Data Resiliency Cloud
Druva Data Resiliency Cloud
Score 9.6 out of 10
Splunk Enterprise
Splunk Enterprise
Score 8.3 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Check Point CloudGuard Posture ManagementIBM Security QRadar SIEM
Likelihood to Recommend
8.0
(5 ratings)
8.6
(75 ratings)
Likelihood to Renew
-
(0 ratings)
9.1
(3 ratings)
Usability
8.0
(1 ratings)
9.1
(1 ratings)
Support Rating
8.2
(4 ratings)
8.4
(49 ratings)
Ease of integration
-
(0 ratings)
8.1
(45 ratings)
User Testimonials
Check Point CloudGuard Posture ManagementIBM Security QRadar SIEM
Likelihood to Recommend
Check Point Software Technologies
Scenarios most suited - 1) All the Cyber Security focused development environments 2) Definitely a must for Financial Clients since it deals with live money transactions - Hence it is imperative to keep the Network and tech asset environment secure, and compliant to standards 3) IAM is another area where it plays an IMP part - For eg one of our healthcare clients where they wanted to restrict access 4) Dashboards are also great, we can share the results to GISO/CISO level folks - Custom dashboard feature
Read full review
IBM
monitoring network traffic is much easier while having siem in your organization and the scenario where siem is less apricated is installing adding logs source making rules according to your desire or the last thing ibm support team not proving the good feedback on instant basis in case of any critical scenarios
Read full review
Pros
Check Point Software Technologies
  • Integration with public cloud providers.
  • Rich UI with great dashboards.
  • Great assets inventory.
  • Clarity module.
Read full review
IBM
  • Enables identification and prioritization of vulnerabilities in IT infrastructure for corrective action.
  • Facilitates security incident investigation and forensic analysis.
  • Provides a real-time view of security events, enabling immediate incident response.
  • Can integrate with external threat intelligence sources to enrich data and improve threat detection.
  • Enables the generation of detailed and customized reports.
Read full review
Cons
Check Point Software Technologies
  • There is not a comprehensive amount of documentation on how to set up best practices.
  • Our initial set up assistance from Proofpoint approved vendor did not go smoothly.
  • The ability to add more customized widgets in the main overview screen would be helpful.
Read full review
IBM
  • Need to spend more time configuring the system to properly interpret and normalize different type of data collected from multiple resources.
  • While Rule creation QRadar uses that rules to detect security threats and generate alerts, but to creating and managing rules is bit complex & tedious work to complete.
  • IBM Security QRadar SIEM is excellent in handling large & complex systems that requires in-depth knowledge and extensive training to configure and maintain the system which includes upgrading, optimization of performance & issue troubleshooting.
Read full review
Likelihood to Renew
Check Point Software Technologies
No answers on this topic
IBM
With the arrival of IBM Security QRadar SIEM at our company, we have a better vision of all the security needs that may arise, it is a very safe software to use that prevents threats from damaging our IT environment, it is impossible to change it for another software.
Read full review
Usability
Check Point Software Technologies
Is easy to use, and the standad configuration is well prepared.
Read full review
IBM
A very special system to use without problems, the process is very genuine and does not require complicated procedures.
Read full review
Support Rating
Check Point Software Technologies
I haven't dealt so much with support but we are enjoying the tool!
Read full review
IBM
Customer support is Good of IBM, While Using IBM QRadar its deployment is to slow and suddenly stop working and crashed we have contacted IBM Support and Rised a Ticket within a few minute we get call back from customer support and Query Resolved by them Fast And Rapid Support of Ibm
Read full review
Alternatives Considered
Check Point Software Technologies
First and foremost reason of our client selecting CheckPoint CloudGuard Posture Management / Dome9 was because they already had CheckPoint Firewalls which are in active use e.g. R75.40 and R82.x products. Customization Vs these other Vendors is another great asset Reporting is one more standout feature, + Multi-cloud capabilities Centralized dashboarding is smooth to navigate as compared to other Vendors Syslog handling is much better as compared to some other vendors , Memory and space issues if planned well are less
Read full review
IBM
IBM Qradar takes the best from its competitors. Reliable and stable but sometimes very expensive, the SIEM from IBM offers a wide range of scenarios in which the customers can suite and size their own infrastructures. IBM Qradar doesn't really needs to stack up againt its competitors because it already sets an example in the SIEM world.
Read full review
Return on Investment
Check Point Software Technologies
  • For production environments it is worth the investment.
  • Getting to know how many assets you have helps with cost savings.
Read full review
IBM
  • Offense investigation was really helped in tackling the incidents. It was accurate and brief
  • The automation with IBM resilient (SOAR) was a milestone in elimination of user mistakes
  • The X-Force threat intelligence supported us in getting the work done without any 3rd party enterprise OSINT database
Read full review
ScreenShots