TrustRadius: an HG Insights company

Check Point Quantum Smart-1

Score7 out of 10

5 Reviews and Ratings

What is Check Point Quantum Smart-1?

Check Point offers security management architecture delivered from the Cloud designed to manage security across on-premise Firewalls, Networks, Cloud, Mobile and IoT. The Smart-1 security management solution is available in cloud and appliance-based editions.

Top Performing Features

  • Automated Policy Orchestration

    Automatically brings together all security controls in one place, automates changes and collapses risks

    Category average: 7.8

  • Attack Path Simulation Testing

    Simulation of potential attack paths to expose network exposure

    Category average: 7.9

  • Vulnerability Scans

    Network scans to pinpoint vulnerable locations for remediation

    Category average: 8.4

Areas for Improvement

  • Device Discovery

    Ability to automatically find all devices connected to the network

    Category average: 8.2

  • Policy Compliance Auditing

    Automatic identification of gaps in compliance, remediation, and generation of compliance reports for auditors

    Category average: 8.2

  • Anomalous Event or Behavior Deviation

    Ability to pinpoint unusual events or trends

    Category average: 8.6

Security management that scales on demand

Use Cases and Deployment Scope

In our network management monitoring center, use smart-1. It solves the cross-network management requirements of all network connection security for our gaming industry client.As customers grow their networks year by year, new requirements are placed on security management, including scalability, higher traffic rates, and faster responsiveness. With the Quantum Smart-1 security management platform, the network management center can manage more security gateways on demand, process logs faster, and quickly analyze all logs and events.

Pros

  • Expanded memory (RAM) and new SSD storage for faster system response when searching logs, creating reports or viewing events
  • The ability to quickly analyze logs and events can shorten our response time for handling information security incidents
  • The expansion management method of the device itself is very flexible. It can be adjusted according to actual needs.

Cons

  • The user interface is very convenient to use. To say what is missing. It is only not supported in the language system that displays Chinese.

Most Important Features

  • With the best event and log management capabilities
  • Respond quickly to threats
  • Scale the number of managed gateways on demand
  • Efficient security management operations

Return on Investment

  • Reduce personnel management costs
  • The elastic expansion capability solves the rapidly changing environment that needs to be changed.

Other Software Used

Splunk Enterprise Security (ES)

Unmatched User Interface for Multiple Environments

Pros

  • Centralized Database
  • Detailed and indexed logging
  • Securely connects to each device

Cons

  • Not many
  • Expensive though comparatively lately these devices have stayed fairly consistent while other vendors have increased greatly and are catching up.
  • Support is limited, though this can be an advantage because of the security.

Return on Investment

  • Hardware is very solid so time for maintenance is extremely limited.
  • Patching is limited due to the strength of the code releases also time for maintenance is extremely limited
  • Annually reoccurring costs for licenses can be expensive

Alternatives Considered

Palo Alto Networks GlobalProtect Mobile Security Manager and Forcepoint

Other Software Used

Cisco ASA, Forcepoint TRITON, FireMon Security Manager