Firewall Analyzer for CheckPoint

Firewall Analyzer can analyze, report, and archive logs from your Check Point Firewalls. Firewall Analyzer has been OPSEC™ certified by Check Point and has joined the OPSEC Alliance.

Rule and change management

Rule Management

Firewall policies and rules control the traffic between your company's LAN and the internet. So, how they work determines whether your sensitive information remains inside the company's domain or gets out into the world. Firewall Analyzer allows you to monitor the effectiveness of the rules in Check Point. Use the policy overview report to get a snapshot of these different rules. You can also get a specialized report on the top rules that are used to govern enterprise traffic, or use the log report to identify anomalies that could make your system susceptible to security threats.

Check Point Rule Management
Check Point Configuration Change Management

Configuration Change Management

This report helps you find 'who' made 'what' changes, 'when' and 'why'. Not only that, it alerts you in real-time on your mobile phone when changes happen. This report ensures that all the configurations and subsequent changes made in the Firewall device are captured periodically and stored in the database.

Network Security and Capacity Management

Network Security and Capacity Management

With Firewall Analyzer, you can access predefined reports that help with analyzing bandwidth usage and understanding security and network activities. Study your firewall's vulnerability level using reports on top denied hosts, blocked URL hits, attacks, viruses, affected hosts, spam, and receiving hosts.

Check Point Network Security and Capacity Management
Check Point Historical Trend Analysis for Bandwidth Capacity Planning

Historical Trend Analysis for Bandwidth Capacity Planning

Trend reports in Firewall Analyzer trace patterns in network behavior and bandwidth usage over time. Analyzing trend reports offers insight into the nature of website traffic or network traffic, which helps you make better decisions on capacity planning, business risk assessment, bandwidth management, traffic shaping, and the security posture of your network.


VPN Usage and Connection Trend Analysis

VPN trend reports show trends in the number of VPN connections accessed through the Check Point firewall on a historical and current basis. VPN trends are especially useful in troubleshooting VPN connections, and identifying security risks.

Check Point VPN Usage and Connection Trend Analysis

Traffic & Bandwidth Management

Real-time bandwidth monitoring.

Firewall Analyzer provides a unique way to monitor the internet traffic of your network in real time. Firewall traffic data is collected and analyzed to get granular details about the traffic through each firewall. You don't need any probes or collection agents to get these traffic details.

Check Point real time bandwidth monitoring
Check Point network traffic analysis

Network Traffic Analyzer

Firewall Analyzer evaluates logs from different network firewalls to measure network traffic. Firewall logs are collected, archived, and analyzed to get granular details about traffic across Check Point firewall devices.


Employee Internet Usage Monitoring

You can minimize the use of bandwidth by monitoring the internet activity of your employees. Fine-tune firewall policies to block or restrict bandwidth-guzzling websites, which helps control employee internet use. This will help ensure there's plenty of bandwidth to keep your business running smoothly.

Employee Internet Usage Monitoring

Security Audit

Firewall Analyzer for Check Point provides elaborate compliance report for the Firewall devices. The report helps to configure the Firewall rules, which will prevent potentially dangerous access to network and allow only those network hosts that are required. The issues are assessed and the results are presents as statistics.

Security Audit


Apart from exhaustive firewall reports on network security, Firewall Analyzer offers comprehensive alarms and notifications. Generate email or SMS alarms for any security criteria of interest as well as when bandwidth breaches a set value. These alarms can trigger a script to achieve various threat mitigation activities. Alarms are also displayed in Firewall Analyzer's UI.


Checkpoint supported versions

Company Firewall/Version WELF Certified Other Log Format
Checkpoint Log import from all versions and
LEA support for R54 and above

VSX Firewalls - Virtual Edition supported

Why choose Firewall Analyzer?

Unlock the real value of your security devices.

  • Supports an extensive array of perimeter security device logs, including firewalls, VPNs, IDS/IPSs, and proxy servers.
  • Provides a wide range of reports for external threat monitoring, change management, and regulatory compliance.

Attractive TCO and rapid ROI.

  • Requires no additional hardware, which ensures a low TCO with its competitive price, minimal setup cost, and maintenance inclusive subscription model.
  • Ensures rapid ROI with quick deployment, instant results, and reduced IT overhead.

Meet dynamic business needs quickly.

  • Rapidly transforms perimeter security device logs into actionable information.
  • Generates reports in user-friendly formats like PDF and CSV.

Productivity improvement for IT and MSSPs.

  • Takes you from product deployment to report generation in minutes. Responds instantly to security threats with real-time alerts on security events.

Steps to Configure

For detailed steps about how to configure Firewall Anlayzer with Checkpoint's firewall appliance you can refer this link here

A single platter for comprehensive Network Security Device Management