Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Quantum Firewalls and Security Gateways
Score 9.2 out of 10
N/A
The Check Point Quantum Security Gateway Next Generation Firewall is a tiered firewall product. The base model includes the core firewall services, and can be upgraded to include anti-bot/virus/spam and sandboxing capabilities.
$26,400
starting list price for Quantum Force 9100 Base Configuration
Datadog
Score 8.6 out of 10
N/A
Datadog is a monitoring service for IT, Dev and Ops teams who write and run applications at scale, and want to turn the massive amounts of data produced by their apps, tools and services into actionable insight.
$18
per month per host
Palo Alto Networks WildFire
Score 9.2 out of 10
N/A
Palo Alto Network’s WildFire is a malware prevention service. It specializes in addressing zero-day threats through dynamic and static analysis, machine learning, and advanced sandbox testing environments.N/A
Pricing
Check Point Quantum Firewalls and Security GatewaysDatadogPalo Alto Networks WildFire
Editions & Modules
No answers on this topic
Log Management
$1.27
per month (billed annually) per host
Infrastructure
$15.00
per month (billed annually) per host
Standard
$18
per month per host
Enterprise
$27
per month per host
DevSecOps Pro
$27
per month per host
APM
$31.00
per month (billed annually) per host
DevSecOps Enterprise
$41
per month per host
No answers on this topic
Offerings
Pricing Offerings
Quantum Firewalls and Security GatewaysDatadogPalo Alto Networks WildFire
Free Trial
NoYesNo
Free/Freemium Version
NoYesNo
Premium Consulting/Integration Services
NoNoNo
Entry-level Setup FeeNo setup feeOptionalNo setup fee
Additional DetailsDiscount available for annual pricing. Multi-Year/Volume discounts available (500+ hosts/mo).
More Pricing Information
Community Pulse
Check Point Quantum Firewalls and Security GatewaysDatadogPalo Alto Networks WildFire
Features
Check Point Quantum Firewalls and Security GatewaysDatadogPalo Alto Networks WildFire
Firewall
Comparison of Firewall features of Product A and Product B
Check Point Quantum Firewalls and Security Gateways
8.9
5 Ratings
4% above category average
Datadog
-
Ratings
Palo Alto Networks WildFire
-
Ratings
Identification Technologies9.04 Ratings00 Ratings00 Ratings
Visualization Tools9.03 Ratings00 Ratings00 Ratings
Content Inspection9.55 Ratings00 Ratings00 Ratings
Policy-based Controls9.05 Ratings00 Ratings00 Ratings
Active Directory and LDAP8.54 Ratings00 Ratings00 Ratings
Firewall Management Console8.55 Ratings00 Ratings00 Ratings
Reporting and Logging8.05 Ratings00 Ratings00 Ratings
VPN9.05 Ratings00 Ratings00 Ratings
High Availability9.05 Ratings00 Ratings00 Ratings
Stateful Inspection10.05 Ratings00 Ratings00 Ratings
Proxy Server8.04 Ratings00 Ratings00 Ratings
Best Alternatives
Check Point Quantum Firewalls and Security GatewaysDatadogPalo Alto Networks WildFire
Small Businesses
pfSense
pfSense
Score 8.7 out of 10
InfluxDB
InfluxDB
Score 8.8 out of 10

No answers on this topic

Medium-sized Companies
pfSense
pfSense
Score 8.7 out of 10
Sumo Logic
Sumo Logic
Score 8.8 out of 10
Sumo Logic
Sumo Logic
Score 8.8 out of 10
Enterprises
Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series
Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series
Score 9.1 out of 10
NetBrain Technologies
NetBrain Technologies
Score 9.2 out of 10
Sumo Logic
Sumo Logic
Score 8.8 out of 10
All AlternativesView all alternativesView all alternativesView all alternatives
User Ratings
Check Point Quantum Firewalls and Security GatewaysDatadogPalo Alto Networks WildFire
Likelihood to Recommend
10.0
(6 ratings)
9.4
(55 ratings)
8.0
(9 ratings)
Likelihood to Renew
-
(0 ratings)
-
(0 ratings)
10.0
(1 ratings)
Usability
9.0
(1 ratings)
9.2
(34 ratings)
7.0
(2 ratings)
Support Rating
10.0
(1 ratings)
8.9
(6 ratings)
9.0
(2 ratings)
User Testimonials
Check Point Quantum Firewalls and Security GatewaysDatadogPalo Alto Networks WildFire
Likelihood to Recommend
Check Point Software Technologies
1) For huge DC environments and complex networks 2) Where clients were consistent up-time like FSI and healthcare 3) Application-aware client req. and preventing day 0 cyber attacks. 4) Securing East-West traffic, hyper-scaling capabilities 5)Some advantages - Best Security meets Ultimate Hardware and SandBlast Zero Day Protection out of the box, Modular hardware 6) High Performance CPUs
Read full review
Datadog
Datadog may be better suited for teams that have a more out-of-the-box infrastructure, on the primary platforms Datadog supports. You may also have better results if you have a bigger team dedicated to devops and/or a bigger budget. We found that trying to adapt it to our use case (small team, .NET on AWS Fargate) wasn't feasible. We continually ran into roadblocks that required us to dig through documentation (and at times, having to figure out some documentation was wrong), go back and forth with support, and in my opinion, waste money on excessive and unintended usages due to opaque pricing models and inaccurate usage reports, as well as broken/non-functional rate sampling controls.
Read full review
Palo Alto Networks
Palo Alto Networks WildFire is highly effective in enterprise environments where detecting zero-day threats and unknown malware is critical. Small businesses may find the cost of advanced subscriptions prohibitive, especially if they only need basic protection. Much of our infrastructure is OT and Palo Alto Networks WildFire is cloud dependent so cannot be used where we have air-gapped systems.
Read full review
Pros
Check Point Software Technologies
  • SSL inspection provides more effective mitigation of threat and data leakage with the ability to inspect and analyze encrypted traffic.
  • Threat emulation and extraction provides protection against zero-day threats without compromising the data of infected files.
  • 'Office mode' VPN provides a seamless connected experience for remotely connected individuals.
  • Application control features provide granular restrictions to the type of application traffic than can pass through the network.
Read full review
Datadog
  • The thing which Datadog does really well, one of them are its broad range of services integrations and features which makes it one step observability solution for all. We can monitor all types of our application, infrastructure, hosts, databases etc with Datadog.
  • Its custom dashboard feature which helps us to visualize the data in a better way . It supports different types of charts through those charts we can create our dashboard more attractive.
  • Its AI powered alerting capability though that we can easily identify the root cause and also it has a low noise alerting capability which means it correlated the similar type of issues.
Read full review
Palo Alto Networks
  • This is could base and easily manageable for our collocation. While working within the could can review in live time potential treats that it has reported from other devices.
  • Worked very well with existing Palo Alto devices.
  • Another huge plus is the simplicity of managing and ease of scalability.
  • Its cost is competitive with similar/like products available.
Read full review
Cons
Check Point Software Technologies
  • HTTPS Inspection -- The firewall has troubles re-packaging the packet in a way that some websites are able to interpret correctly
  • Support -- Even getting support directly from Check Point isn't the easiest of experiences. They are more concerned about how fast they can close a ticket out, rather than fixing the problem.
  • Custom reports -- Custom reporting is extremely limited
Read full review
Datadog
  • Alert windows cause lag in notifications (e.g. if the alert window is X errors in 1 hour, we won't get alerted until the end of the 1 hour range)
  • I would appreciate more supportive examples for how to filter and view metrics in the explorer
  • I would like a more clear interface for metrics that are missing in a time frame, rather than only showing tags/etc. for metrics that were collected within the currently viewed time frame
Read full review
Palo Alto Networks
  • Cost
  • I would personally like to see more JSON support in the API rather than XML, but that's being very nitpicky
Read full review
Likelihood to Renew
Check Point Software Technologies
No answers on this topic
Datadog
Definitely will not revisit after our issues and, in my opinion, poor support.
Read full review
Palo Alto Networks
It works very well and takes care of protecting us from threats new and well-known. It's been a game changer in terms of threat detection & prevention.
Read full review
Usability
Check Point Software Technologies
Operational efficiency is very high compare to all other vendors.TAC Support is good
Read full review
Datadog
There are so many features that it can be hard to figure out where you need to go for your own use case. For example, RUM monitoring us buried in a "Digital Experience" sidebar setting when this is one of our key use cases that I sometimes struggle to find in the application. It appears that ECS + Fargate monitoring was recently released which is great because we had to build a lambda reporting solution for ephemeral task monitoring. But this new feature was never on my radar until I starting clicking around the application.
Read full review
Palo Alto Networks
It is a great product that has definitely improved our security posture, however it does require quite a bit of training and time spent customizing for the environment. We had several difficulties in deployment but Palo Alto support was able to help us work through the problems that we were not able to figure out on our own.
Read full review
Support Rating
Check Point Software Technologies
Check Point has a variety of support options that can be used to optimize your investment in the product. Companies with a larger information security and certified checkpoint engineer employee base can benefit from a standard SLA, while companies with a smaller security engineering footprint or more critical implementations can opt for premium, elite or diamond packages that even include the ability to provide on-site engineers for major security incidents. Check Point PRO support also provides the ability to outsource maintenance concerns by automating case creation and follow up when application components fail.
Read full review
Datadog
The support team usually gets it right. We did have a rather complicate issue setting up monitoring on a domain controller. However, they are usually responsive and helpful over chat. The downside would be I don’t think they have any phone support. If that is important to you this might not be a good fit.
Read full review
Palo Alto Networks
PAN support is very good. You can get the reasonable and timely support on any conditions. When the product is already integrated with the PAN firewalls, you can choose the severity levels based on the effect. The customer service/TAC is very helpful, they even have additional recommendations of advises for product usability. Local partners are also assisting the cases and give their expertise.
Read full review
Implementation Rating
Check Point Software Technologies
No answers on this topic
Datadog
Documentation was difficult to work through, rollout was catastrophic (completely outage)
Read full review
Palo Alto Networks
No answers on this topic
Alternatives Considered
Check Point Software Technologies
In a heterogeneous environment, we wanted to keep multiple vendors for multiple purposes. CP was found very good in handling basic Next generation firewalls features along with handling of VPNs.
Read full review
Datadog
Our logs are very important, and Datadog manages them exceptionally well. We frequently use Datadog services for our investigations. Use case: Monitor your apps, infrastructure, APIs, and user experience.


Key features:


Logs, metrics, and APM (Application Performance Monitoring)


Real-time alerting and dashboards


Supports Kubernetes, AWS, GCP, and other integrations


RUM (Real User Monitoring) and Synthetics





✅ Best for backend, server, and distributed systems monitoring.
Read full review
Palo Alto Networks
WildFire from Palo Alto Networks provides security with very little overhead. With AutoFocus, they’ve got threat intelligence built right in. That way, it can prepare us to react swiftly when a significant danger is identified and dealt with as soon as possible. They introduced firewalls that are aware of applications and can make use of Wildfire. It sped our ability to respond to emerging threats up because of this game-changing development.
Read full review
Return on Investment
Check Point Software Technologies
  • Although there are better alternatives out there, Check Point delivers results for the price we paid for the system.
  • Since implementation, we have not have any major issues with the product, minor issues were resolved in a timely fashion.
  • Check Point currently fulfills our need for an outside facing firewall, when our organization grows larger, we will be looking at higher level enterprise solutions.
Read full review
Datadog
  • Saved us (time & money) from developing our own monitoring utilities that would pale in comparison
  • Alerts allow us to remedy issues before our customers even know about them
  • Tracking resource usage over time allows us to better plan for future needs, before it becomes a pain-point.
Read full review
Palo Alto Networks
  • We've had one or two malware files that were blocked by Wildfire. We use it occasionally to check unusual or unexpected files. Hard to monetize ROI, because we don't know what the impact would have been if the file made it through.
  • We pay significantly for the Wildfire licenses, but given the potential impact to our business, we feel it is worthwhile. Figure costs are somewhere around $1,500 per year per firewall for a mid-range model. Can be higher or lower for different sized firewalls. Onsite appliance was somewhere between $50-100K, which was too much for us, so we use the cloud model.
Read full review
ScreenShots

Datadog Screenshots

Screenshot of the out-of-the-box and customizable monitoring dashboards.Screenshot of Datadog's collaboration features, where users can discuss issues in-context with production data, annotate changes and notify their teams, see who responded to that alert before, and discover what was done to fix it.Screenshot of where Datadog unifies traces, metrics, and logs—the three pillars of observability.Screenshot of some of Datadog's 400+ built-in integrations.Screenshot of Datadog's Service Map, which decomposes an application into all its component services and draws the observed dependencies between these services in real timeScreenshot of centralized log data, pulled from any source.