We use CloudGuard for compliance and auditing. About 20 people in our company use it, including our cloud administrators use it and security personnel. And now even our managers, our scrum masters are using it.
Chief Technical Officer at a government with 1,001-5,000 employees
Intuitive dashboard but it needs to be more customizable
Pros and Cons
- "The dashboard is intuitive. You know if you're compliant or not, and then it gives you a remediation plan."
- "CloudGuard could be more customizable. It has built-in standards for things like GDPR compliance. But depending on your business lane, you might want to build your own controls based on your own standards."
What is our primary use case?
How has it helped my organization?
CloudGuard makes the management of our security controls in AWS more transparent.
What is most valuable?
The dashboard is intuitive. You know if you're compliant or not, and then it gives you a remediation plan.
What needs improvement?
CloudGuard could be more customizable. It has built-in standards for things like GDPR compliance. But depending on your business lane, you might want to build your own controls based on your own standards.
Buyer's Guide
Check Point CloudGuard CNAPP
January 2025
Learn what your peers think about Check Point CloudGuard CNAPP. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.
For how long have I used the solution?
I've been using CloudGuard Posture Management for at least six months.
What do I think about the stability of the solution?
CloudGuard is pretty stable. It's rock-solid.
What do I think about the scalability of the solution?
In terms of scalability, CloudGuard requires a little bit of work. Sometimes it does take longer for the checks to come through, but it depends on how busy you are in the cloud.
How are customer service and support?
Check Point tech support in North America is pretty good.
Which solution did I use previously and why did I switch?
We really liked this other solution offered by a smaller company, and then a larger company bought it. I forgot the company's name, but the roadmap just went to pieces when it was bought out. All the tech people left the company then the chief technical officer resigned. It was terrible.
How was the initial setup?
Setting up CloudGuard is pretty straightforward. The initial setup only took a few minutes. It's essentially turnkey. However, the total deployment took about half a day. For maintenance, we have two cloud administrators. That's two in case one goes on vacation, resigns, or gets sick. So you need backup.
What's my experience with pricing, setup cost, and licensing?
The license for CloudGuard Posture Management is about $80 a year, and it's based on your cloud footprint, not the number of users. So you could have a million users, and it doesn't matter.
What other advice do I have?
I rate CloudGuard Posture Management seven out of 10. I would rate it higher, but I think the price point is pretty high for what it does. However, I know it's a burgeoning market. So I think the price point and some of the other features that I already mentioned, like customization, are pretty lacking. Still, if you want some cover for an internal or external audit, this is a tool for you.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Administrative Assistant at Tecapro
Good compliance and risk assessment capabilities but needs to cover more legacy applications
Pros and Cons
- "The product allows us to enhance the security of the implementations we have."
- "We're looking for a solution that can incorporate legacy infrastructure for some of our business needs."
What is our primary use case?
We needed to establish a security posture under certain requirements. We needed to protect infrastructure as a service and our software as a service platform in each of our environments for the development and implementation of the cloud.
We needed to provision instantaneous computing infrastructure and administration through the Internet. Management and security was the initial requirement, with more requirements being established. We were seeking a baseline that was provided to us by a security expert that would allow us to identify and remediate security risks and evaluate monitoring automation. We needed a solution that could prevent the company from being violated when implementing and managing a new configuration.
How has it helped my organization?
The solution give us compliance and offered continuous evaluation of the policies that were established. We managed to automatically generate tools for the detection and resolution of compliance and managed to establish supervision of the operations, including the management of each incident which involves identifying risks and qualifying in order to be able to share any news or updates. This allowed us to be more proactive, complete, and precise.
What is most valuable?
The product allows us to enhance the security of the implementations we have. It has helped resolve several security incidents that we previously had, and we could not see since previously we did not have a solution that allowed us to quickly and safely manage each one of the activities. With Check Point, we can now map incidents and see how the security teams work to verify the integrity of the systems.
What needs improvement?
When it comes to validating the power, security, implementation, and management, I would like to also have the capacity more easily on-premise as well as the cloud. Some problems have been found in analysis at the time of execution, and local install revision agents have generated management incompatibility. It is important to evaluate the applications that are on-site since they are needed in the organization. We're looking for a solution that can incorporate legacy infrastructure for some of our business needs.
For how long have I used the solution?
I've used the solution for approximately nine months.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point CloudGuard CNAPP
January 2025
Learn what your peers think about Check Point CloudGuard CNAPP. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.
Cloud Infrastructure Architect at Maxis Berhad
Enables us to have a centralized view of all our visible assets ECs and inventories
Pros and Cons
- "Dome9 has improved our organization; we have a centralized view of all of our assets, our visible assets our ECs, our inventories. And then all the policies are centralized, and it is easier to manage because everything is one component console."
- "I would like to see Test B functions at the application access level."
What is our primary use case?
The primary use case for this solution is associated with a challenge whereby we have multiple cloud computing platforms. We have our past cloud platforms in AWS and ECP. Therefore, we can configure management and policy governance tools to deployment across all sites.
How has it helped my organization?
Dome9 has improved our organization in the way that we have a centralized view of all of our assets, our visible assets our ECs, our inventories. Then all the policies are centralized and it is easier to manage because everything is one component console.
What needs improvement?
I would like to see Test B functions at the application access level.
For how long have I used the solution?
More than a year.
What do I think about the stability of the solution?
The stability is good.
What do I think about the scalability of the solution?
The scalability is good.
How are customer service and technical support?
Technical support is excellent; they are quite supportive.
How was the initial setup?
The inial setup was straightforward.
The deployment took us about six months because we had issues while integrating. The issues weren't with Dome9.
What about the implementation team?
We implemented Dome9 ourselves, in-house. We used our own set of experts.
I think there is less than six staff required for deployment and maintenance.
What's my experience with pricing, setup cost, and licensing?
The licensing costs for this solution are on a yearly basis.
What other advice do I have?
My advice is to try to get the trial period first because this will allow them to see if this is a suitable solution or not for their environment. They have to remember that this solution can only be compared to Test B, but it's not Test B. The trial allows for appropriate compatibility and suitability evaluations.
On a scale from one to ten, ten being the best, I would gladly rate this product an eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Administrative Assistant at Tecapro
Great machine learning, good analysis, and efficient responses to threats
Pros and Cons
- "It learns from behavior, attacks, management, detections, captures packets, real-time analysis, et cetera. It's generating knowledge from a variety of sources for an excellent analysis."
- "I'd like to see more advanced encryption for local features, which is not present right now."
What is our primary use case?
We wanted to protect, analyze, and detect issues within the infrastructure that we have taken to the cloud. We were looking for ways that we can analyze and introduce a more complete internal forensic analysis so that if an intrusion did not happen, we could have a visualization in which we could be constantly learning how to detect and ee anomalies and provide analysis for detection in real-time.
How has it helped my organization?
We needed a solution that could handle analysis and offer automated detection with process intelligence. We were interested in threat prevention in real-time to help us detect anomalies, attempts, and atypical actions in any of the activities of the teams or users. The goal was to take advantage of that learning and detection. Machine learning supervises and analyzes in an advanced way everything that is happening in the cloud. It works within any type of cloud and can be integrated more so if we want to migrate or scale tomorrow, we can carry out this detection automatically.
What is most valuable?
The solution learns day by day. It learns from behavior, attacks, management, detections, captures packets, real-time analysis, et cetera. It's generating knowledge from a variety of sources for an excellent analysis.
This allows us to move faster and have more efficient responses to incidents. It provides alerts for all these types of activities, achieving more objective management for packet capture and a combination of activities within the cloud environment.
What needs improvement?
I'd like to see more advanced encryption for local features, which is not present right now. We'd like to have more defined control when implementing intelligent analysis on the cloud. We'd like to extend analysis not just to crowds but to local teams for more granular analysis and advanced searchability.
For how long have I used the solution?
I've used the solution for about a year and a bit.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Head of Technology and Systems at Simed
A product that performs well and enables users to control the information that goes out of their company
Pros and Cons
- "The product enables us to check the information that goes out of the company."
- "The product must provide different features like antivirus."
What is our primary use case?
We use the solution to control all the emails that go out from the company. We also use it to protect our network by stopping unauthorized people from accessing it.
What is most valuable?
The product enables us to check the information that goes out of the company. We get to know if someone sends our sales emails to our competitors. We control the information that goes out of the company. It’s a good product.
What needs improvement?
The product must provide different features like antivirus.
For how long have I used the solution?
I am currently using the solution.
What do I think about the scalability of the solution?
The tool always performs very well. All the upgrades happen automatically. We haven't had a problem with it.
How are customer service and support?
We haven’t needed much support.
How would you rate customer service and support?
Positive
What's my experience with pricing, setup cost, and licensing?
The solution’s pricing is a little bit high. I rate the product’s pricing a seven out of ten on a scale of one to ten, where one is the lowest price, and ten is the highest price.
What other advice do I have?
I would like to implement all the security solutions from Check Point in our company. Overall, I rate the product an eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
President at a tech services company with 1-10 employees
We have been able to empower our development team to work with the infrastructure in a managed, foolproof way.
Pros and Cons
- "Compliance is becoming an important tool for us as well."
- "Addressing the large amount of compliance information and benchmarks we need to observe, the tools are becoming our goto dashboards."
What is most valuable?
We started long ago with the dynamic access and protected assets, and it has always been a cornerstone for our highly mobile, distributed development team. We require tight control on access, and when our team travels it helps us gain access as needed in a protected manner.
Compliance is becoming an important tool for us as well.
How has it helped my organization?
We have been able to empower our development team to work with the infrastructure in a managed, foolproof way to insure testing and other efforts don't leave unintended holes.
What needs improvement?
The governance and compliance areas are becoming very useful, and continue to expand in very user-friendly ways. Addressing the large amount of compliance information and benchmarks we need to observe, the tools are becoming our goto dashboards.
For how long have I used the solution?
Many years, so many I forget. Not too long after I discovered them at AWS the first or second year of RE: Invent.
What was my experience with deployment of the solution?
None. Just follow the easy instructions for IAM Policies.
What do I think about the stability of the solution?
Rock solid.
What do I think about the scalability of the solution?
Never a problem.
How are customer service and technical support?
Customer Service:
Highly engaged at all levels of the organization, and truly helpful, which cannot be said for many others in their space.
Technical Support:Helpful and usually spot on early in the request.
Which solution did I use previously and why did I switch?
We have assessed several, and Dome9 is the only one that we have used continuously, and it has begun to replace other solutions as Dome9 rolls out new features.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Engineer at a tech company with 1,001-5,000 employees
Good reporting and alerts but needs more comprehensive investigations into security events
Pros and Cons
- "Alerts of cloud activity happening across all accounts is helpful."
- "Reporting should have more options."
What is our primary use case?
We primarily use this solution for:
- Posture management and compliance for the complete cloud environment (AWS).
- Centralized visibility of our cloud assets across multiple accounts in our cloud environment.
- Monitoring and alerting of cloud activity (API calls) happening across all the accounts.
- Reviewing security configuration (network configuration of security groups).
- Scanning serverless functions for existing vulnerabilities.
- The baseline for security policy as per workload based on services such as S3, EC2, et cetera.
How has it helped my organization?
This solution helped us improve by:
- Improving the overall security posture of our cloud environment.
- Maintaining Asset inventory for Cloud.
- Continuously reporting and alerting for reactive approach.
- Providing a best practice policy helping in strengthening security of workloads.
- The biggest lesson that I have learned from using this product is that organizations are very uninformed about their cloud presence, what assets they have, and what shape it's in which this solution is capable of and provides better visibility.
What is most valuable?
- The queries for detecting any type of incident are great.
- The solution provides a granular level of reports - along with issues based on compliance.
- Alerts of cloud activity happening across all accounts is helpful.
- Customization of rulesets as per our cloud security policy is useful and strengthens the security.
- Reporting against compliance is an important feature that helps you comply with policies and standards within our organization.
- Assets Management is excellent as it provides complete visibility of our workload in our EC2 instance.
What needs improvement?
The following things can be improved:
- Reporting should have more options.
- Investigation of security events should be more comprehensive be it for cloud activity or traffic activity.
- The false positives can be annoying at times.
- We do not use remediation at the moment. We do the remediation manually, since we are still using Dome9 in read-only mode. I don't know if we will use the remediation in the future as we prefer to do it ourselves.
- The price of this solution should be reduced so that it is more affordable to scale.
For how long have I used the solution?
We have been using this solution for last year.
Which solution did I use previously and why did I switch?
This was the first time we used any CSPM solution.
What's my experience with pricing, setup cost, and licensing?
The price of this solution should be reduced so that it is more affordable to scale - specifically for features like Intelligence Pro.
Which other solutions did I evaluate?
We evaluated Prisma Cloud, however, we found many of the features that we won't be using we would still be paying for unnecessarily.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Product Manager at a tech services company with 51-200 employees
Helpful account discovery feature and good reporting against compliance
Pros and Cons
- "The reporting against compliance is an important feature that helps you comply with policies and standards within your organization."
- "The price of this solution should be reduced so that it is more affordable to scale."
What is our primary use case?
We are a reseller of security solutions, and we also offer professional and managed services around them. We cover network security, web application firewalls, email, web security, security information and event management, privilege access management, and other such products.
Dome9 is one of the solutions that we implement for our customers, and they use it to help secure their cloud. It works on several cloud platforms, including Azure and AWS. It will handle security issues such as ensuring a proper configuration, that the credentials are set up correctly, and that the storage of sensitive data is appropriately configured.
Some of our customers use Dome9 for discovery, to help them understand the different accounts that they have in the cloud. Very often, there can be a proliferation of cloud-based accounts and applications that the organization on a wider basis is not aware of. Dome9 is very good if you need to get an inventory and reporting on the current state of your environment.
What is most valuable?
The most valuable feature is the discovery. People are often quite shocked when they run the analysis and figure out all of the accounts and servers that are running in their environment. These are accounts that they are unaware of.
The reporting against compliance is an important feature that helps you comply with policies and standards within your organization.
What needs improvement?
For how long have I used the solution?
I have been working with Dome9 for about one year.
What do I think about the stability of the solution?
I have never had any negative feedback about stability, so I assume that it's perfectly stable.
What do I think about the scalability of the solution?
Dome9 is very scalable, although as it scales it can become quite costly. As such, for some of our customers, scaling is not possible because it is cost-prohibitive.
How are customer service and technical support?
I have not personally deployed Dome9 so I have not had any contact with technical support.
How was the initial setup?
The initial setup is pretty straightforward. You can get it up and running in a matter of hours. Because it is cloud-based, it pulls the information in via APIs. As long as you can put in the relevant account details, it can work almost immediately.
There is a language that you can use to create policies and rules, which gives you the ability to do more complicated things, but it will take longer to set up.
It only takes a few people to deploy this solution. One from our side and perhaps two from the customer's side.
What's my experience with pricing, setup cost, and licensing?
It is a very straightforward licensing model that is based on the number of assets you are discovering and managing with the solution.
What other advice do I have?
My advice to anybody who is considering this product is to look at the free proof of concept that is available. This makes it very easy to try out at no cost. I suggest trying it out on a subset of the environment first, just to get everything working well. After establishing what reporting you want, and what policies you want to check your environment against, you can expand to cover a wider set of your environment.
The biggest lesson that I have learned from using this product is that organizations are very uninformed about their cloud presence, what assets they have, and what shape it's in. It's huge exposure for the organization to have all of these assets in the cloud but not have the visibility and traceability around them. Organizations that don't have a solution like this are often insecure because of what they have in the cloud.
Overall, Dome9 is a good product and I haven't received any negative feedback from our customers about it.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Buyer's Guide
Download our free Check Point CloudGuard CNAPP Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2025
Product Categories
Vulnerability Management Cloud and Data Center Security Container Security Cloud Workload Protection Platforms (CWPP) Cloud Security Posture Management (CSPM) Cloud-Native Application Protection Platforms (CNAPP) Data Security Posture Management (DSPM) Compliance ManagementPopular Comparisons
Microsoft Defender for Cloud
Qualys VMDR
Tenable Security Center
SentinelOne Singularity Cloud Security
Orca Security
Lacework FortiCNAPP
Skybox Security Suite
Trend Vision One - Cloud Security
Rapid7 Metasploit
Arctic Wolf Managed Risk
Buyer's Guide
Download our free Check Point CloudGuard CNAPP Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the pricing for Check Point software?
- How inadvisable is it to use a single vulnerability analysis tool?
- What are the benefits of continuous scanning for vulnerability management?
- When evaluating Vulnerability Management, what aspect do you think is the most important to look for?
- What is a more effective approach to cyber defense: risk-based vulnerability management or vulnerability assessment?
- What are the main KPIs that need to be implemented to have better posture in vulnerability projects?
- Which is the best vulnerability scanner tool?
- What are your recommended automated penetration testing tools?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- Can you recommend API for Tenable Connector into ServiceNow