We were in the review analysis, seeking a fast, efficient infrastructure with solid bases of data analysis and investigation. We wanted something that managed to establish and analyze systems in production so that it would not impact their use. We also wanted a visualization of our current state, with a solution that could give an example of the route that must be taken to achieve excellence in security. This tool has allowed us to achieve stronger security, allows for better analysis, and provides structure and guidance for better guides and international policies under a legal framework.
Soporte técnico superior at a financial services firm with 51-200 employees
Identifies issues, offers good analysis, and has automation capabilities
Pros and Cons
- "It has an analytics service that does research for us."
- "The solution could be improved with a greater analysis of its Microsoft Security score."
What is our primary use case?
How has it helped my organization?
It has given us a way to clearly and objectively identify items or issues before making any changes to the network. It offers assurance, after investigation, of a clear understanding of what each analysis is trying to define. We can now clearly and specifically achieve what we need to do from a security standpoint to help us make an action plan and achieve goals. Once we have the information, it is important to define and analyze the data collected, organize information in a format that makes sense to us administrators, and look for patterns or trends that may be useful for our investigation.
What is most valuable?
It has an analytics service that does research for us. This can provide valuable information to ultimately improve our infrastructure. Via research and analysis, we are able to identify problem areas. We can find trends and take action to fix problems while improving performance.
Its fairly advanced automation allows us to simplify and speed up security management in the cloud. This includes being able to identify, correct, and validate all kinds of vulnerabilities that reduce the manual workload for each of our company's administrators, thus being more efficient. With this new efficiency, we are able to reach effective resolutions at all times.
What needs improvement?
The tool has several specific characteristics at the Microsoft 365 or Exchange level.
The solution could be improved with a greater analysis of its Microsoft Security score. They should be improving the visualization of data and greater coverage in Sharepoint or Teams. Its posture analysis is currently low. There could be improvement or capacity to be more efficient if we managed to achieve greater integration with Microsoft Security score, improvements in data visualization,, and greater coverage of Microsoft 365 resources.
Buyer's Guide
Check Point CloudGuard CNAPP
January 2026
Learn what your peers think about Check Point CloudGuard CNAPP. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
879,477 professionals have used our research since 2012.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cloud computing at a security firm with 5,001-10,000 employees
Strengthens and centralizes all the security infrastructure and reduces attacks
Pros and Cons
- "It presents a real-time database that is always updated."
- "The support it provides is not very good. They should improve it since we have had several setbacks due to support issues."
What is our primary use case?
Check Point CloudGuard Intelligence Security is one of the most robust tools on the market. That's why we decided to implement it in our company when all our operations were migrated to the Azure cloud area.
We needed a tool that would provide security in the network and help analyze any vulnerabilities that we might face in these new environments. We wanted to be able to attack all the weak points that we have in the cloud in order to guarantee effective and stable security. We also have some applications in our systems that deserve excellent security.
How has it helped my organization?
Check Point CloudGuard Intelligence came to strengthen our security and has helped the IT department achieve excellent network security.
In addition to that, it has helped us centralize all the security infrastructure in this tool and helped us a lot to counteract vulnerabilities that were present. With this product, we were able to reduce the rate of attacks that we had. The database that they have is in real-time and updated instantaneously. All these factors helped a lot to reduce vulnerabilities.
What is most valuable?
Check Point's CloudGuard Intelligence tool presents some features that should be highlighted. For example:
It presents a real-time database that is always updated.
The environment can be centralized within Check Point Infinity, and thus we can have several security tools.
It also presents a forensic analysis that helped us to determine the root of several issues.
Integration with Sentinel can be made, which allows us to obtain more security data and analyze it.
It presents a portal that is relatively easy to use and configure.
What needs improvement?
The tool works perfectly and improvements should be made, if any, in various technical and administrative aspects.
For how long have I used the solution?
It was implemented approximately one year ago.
What do I think about the stability of the solution?
Check Point CloudGuard Intelligence has good stability. We have not presented performance problems or any other that would lead to a forced restart of the tool.
What do I think about the scalability of the solution?
The tool presents very good and functional scalability. To this day, we have not presented any problems.
How are customer service and support?
The support it provides is not very good. They should improve it since we have had several setbacks due to support issues.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, there was no tool in the company's infrastructure. We needed the solution when we moved to the cloud and decided to improve security.
How was the initial setup?
The implementation of the tool is very easy. There are several steps in the wizard where it gets complicated around the configuration, however. If you do not have extensive knowledge of the tool, it becomes complicated.
What about the implementation team?
The implementation was done through the vendor, who gave us a support engineer to help us with the implementation and configuration of the tool. We also received some training.
What was our ROI?
By making an investment in security tools, we are doing ourselves a great favor. With this tool, we are protecting our information while maintaining operations. It is always a great investment to acquire these tools. Also, afterward, there is a noticeable economic return.
What's my experience with pricing, setup cost, and licensing?
Whenever an investment is made in a security tool, it is high due to many factors. that said, investing in security will provide economic returns in the short or long term since it will greatly lighten workloads and provide security.
Which other solutions did I evaluate?
We evaluated many options on the market, such as Fortinet, Sophos, and Cisco NGFW. However, Check Point had better features.
What other advice do I have?
With the time that I have used this tool, we have noticed that it is a very good solution and that it has excellent features. It provides very secure connections.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point CloudGuard CNAPP
January 2026
Learn what your peers think about Check Point CloudGuard CNAPP. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
879,477 professionals have used our research since 2012.
Senior Manager ICT & Innovations at a logistics company with 501-1,000 employees
Helps to improve security score with real-time information
Pros and Cons
- "Check Point CloudGuard CNAPP's initial configuration is very easy. It is plug-and-play. It also gives regular updates."
- "The tool should incorporate more use cases like improving security scores. It should also improve documentation."
What is our primary use case?
We want network security through machine learning. The product offers threat detection and intelligence for the endpoints. It also provides real-time information on application security.
What is most valuable?
Check Point CloudGuard CNAPP's initial configuration is very easy. It is plug-and-play. It also gives regular updates.
What needs improvement?
The tool should incorporate more use cases like improving security scores. It should also improve documentation.
For how long have I used the solution?
I have been using the product for a year.
What do I think about the stability of the solution?
The product is stable.
What do I think about the scalability of the solution?
Check Point CloudGuard CNAPP is scalable. My company has more than 1000 users.
How are customer service and support?
Check Point CloudGuard CNAPP's support is very good.
How would you rate customer service and support?
Positive
How was the initial setup?
The tool's deployment is very easy and takes two weeks to complete. We need engineers to install the product. You need to ensure the overall device landscape before the product's installation. Its maintenance is easy.
What was our ROI?
I can get 50-60 percent ROI with the tool's use.
What's my experience with pricing, setup cost, and licensing?
The tool's pricing is moderate. Its licensing costs are yearly.
What other advice do I have?
The solution helps to improve security scores, which is important for auditing and compliance. I rate it a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Accountant at a financial services firm with 51-200 employees
Comprehensive security, excellent intrusion alerting, and reliable threat hunting
Pros and Cons
- "It provides the most useful tools for protecting our financial account records from hackers."
- "Timely updates and upgrades to meet modern technological changes could help improve performance and limit the chances of downtime."
What is our primary use case?
The threat-hunting system provides forensics through machine learning visualization with real-time insights into processes from a multi-cloud environment.
It has powerful tools that detect any threats in the network infrastructure in advance before it penetrates into our systems.
It has repulsed many attacks that have been launched by malware attackers that could destroy data.
The CloudGuard Intelligence provides alerts that prepare the IT team to set up effective measures after detecting threats.
The product performance has enabled each team to work without fear of any threats.
How has it helped my organization?
It provides the most useful tools for protecting our financial account records from hackers.
The application has boosted security from all the company sources. We have not lost confidential data to external cyber attackers since we deployed this platform.
Faster responses to malware threats have saved the organization from engaging in insecure transaction losses.
The product has safeguarded the entire financial system from external interference.
We used to experience the challenges of data protection before we deployed this application. There are improvements in data management and security with a positive impact on work processes.
What is most valuable?
The advanced data analytics on the security of the applications has provided effective insights that helped in safeguarding confidential information.
The intrusion alerts and notifications have saved us a lot of time and resources in enhancing reliable security.
The comprehensive security from cloud and on-premises has saved data centers from attacks and provides a reliable environment for boosting production.
Cloud threat intelligence provides useful insights that help in planning effectively during the process of implementing projects and tasks.
What needs improvement?
The security investigation features that are present have been performing excellently since we deployed this application. There are few licensing and network coverage cases, however, the customer service team is always ready to solve any problem.
Timely updates and upgrades to meet modern technological changes could help improve performance and limit the chances of downtime.
The performance has been stable for a long time since we deployed it. The few hitches which we have experienced can be solved without affecting the workflow performance.
The Check Point team has done a great job, and I recommend their products to other companies.
For how long have I used the solution?
I've used the solution for ten months.
What do I think about the stability of the solution?
This solution has been stable with reliable operations.
What do I think about the scalability of the solution?
I am impressed by its reliable performance, and I recommend it to other business enterprises.
How are customer service and support?
Customer service and support always provide effective guidelines when contacted.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
The other security products that I have worked with had responded poorly which is why we moved to Check Point.
How was the initial setup?
The setup procedure was straightforward.
What about the implementation team?
The implementation was done by the vendor.
What was our ROI?
There is increased ROI from the product's stable performance.
What's my experience with pricing, setup cost, and licensing?
This platform offers modern security for threats that will arise in any organization.
Which other solutions did I evaluate?
I evaluated several products. I settled on Check Point CloudGuard Intelligence based on their reliable services.
What other advice do I have?
This is a great and powerful platform for securing organizations from cyber attacks.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Perimeter Security Administrator at a security firm with 51-200 employees
Centralizes data, detects anomalies and can send alerts
Pros and Cons
- "This platform has allowed us to collect data from multiple sources, centralizing everything under a single source."
- "We want to be able to customize the solution more in order to meet the needs of our company."
What is our primary use case?
This is one of the solutions that we have sought in order to establish an intelligent analysis. It has helped us collect data on our accounts in the cloud and applications. It offers integrations and provides real-time analysis of security issues. The platform learns automatically and manages to identify abnormal behaviors to help us detect anomalies. Additionally, we can configure automatic notifications that help us act during detected incidents.
How has it helped my organization?
It helps to have a centralization of data, alerts, and reports. There is a main data center that has generated reports and alerts that can include information about security trends and unusual user activity. It offers recommendations to improve security. The data collection and action activity logs provide information about usage, performance, and resources including traffic logs, usage logs, storage, and available space. We can also see CPU and memory, among other characteristics.
What is most valuable?
Currently, as an organization, we rely on technologies to save and store advanced data analysis information. We can take advantage of automated learning to detect and respond to security threats in real time in the cloud.
This platform has allowed us to collect data from multiple sources, centralizing everything under a single source. The repository includes audit logs, activity logs, and network logs to help us identify unusual patterns and negative trends that may affect the security of users.
Using the information the product provides, we have effectively and accurately detected real-time troubleshooting of suspicious user attempts to log into an account and we can detect suspicious login attempts. We'll get alerts, which have helped us automate security in order to act fast.
What needs improvement?
We want to optimize the tool in the future. They should allow us to have greater integration with other security solutions and third-party tools so that the organization can take advantage of and improve the protection of all the company infrastructure.
We would like to optimize and improve its high demand for customization, which allows us to adapt to specific necessary security solutions. We want to be able to customize the solution more in order to meet the needs of our company. Currently, the solution is quite rigid and complies only with standards.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Consultant at a security firm with 51-200 employees
Robust, complete, and offers good visibility
Pros and Cons
- "It presents great visibility of the traffic flow of our cloud, providing information on what data and users are circulating and in the event of a threat, it immediately identifies them by providing detailed and granular information from our entire environment."
- "It should have some options to activate API calls to the platform in the cloud, another improvement would be that when the rules are colonized and they want to be published."
What is our primary use case?
We pull all of our cloud platforms into Microsoft Azure. We needed a tool that would provide us with provides policy compliance to be able to monitor our environment. In the case something is in violation of one of those rules, it will let us know and we can correct it.
It is also very flexible to configure users, and authentication methods and thus be able to control the activities of each of the system administrators and users, another one of the functionalities it presents is that it allows us to monitor the records of our environment in the Azure Cloud and be able to take the necessary measures if there is a problem..
How has it helped my organization?
One of the reasons we were able to implement this solution is that it gives us complete visibility into the workload that we have hosted on our Microsoft Azure platform. This tool came to help improve our security environment in the cloud and provide more detail through reports such as compliance and security, as it shows us complete visibility of the traffic that is flowing to our Azure platform.
Another reason we implemented it and it caught our attention was the access control to our Azure cloud. Every time a policy is created for each purpose, it immediately blocks the access for which it was designed. Dome9 provides excellent visibility.
What is most valuable?
Check Point CloudGuard Posture Management presents great values, such as the IAM role control, since if it does not meet the established parameters, these controls will not allow the creation of users, and policies that are not allowed.
It presents great visibility of the traffic flow of our cloud, providing information on what data and users are circulating and in the event of a threat, it immediately identifies them by providing detailed and granular information from our entire environment.
It also has and provides the ability to provide recommendations of the errors that exist and thus be able to correct them as soon as possible
What needs improvement?
The service is very complete for the functionality that it was created for, however, they can make a couple of improvements such as the validation of policies that must be available before they are implemented in the production environment. It should have some options to activate API calls to the platform in the cloud, another improvement would be that when the rules are colonized and they want to be published. They do not update as they should and the new rules are not applied. They can also try to reduce the false positives generated by the tool.
For how long have I used the solution?
This solution has been used for approximately five years in the company.
What do I think about the stability of the solution?
One of the reasons why we chose to do the implementation with Check Point was its stability. Its performance is very good.
What do I think about the scalability of the solution?
My impression was that the scalability was very good. It is a super scalable product.
How are customer service and support?
On some occasions, we have had problems as they do not send the meetings on time or it takes a long time to resolve a case. However, on other occasions, they resolve very quickly.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Check Point was always our first option as many security teams are from Check Point.
How was the initial setup?
The configuration was very simple. The application is a very user-friendly tool - apart from training and courses for implementation.
What about the implementation team?
A Check Point engineer who had a lot of experience helped us with the implementation.
What was our ROI?
When making an investment with these tools you are taking care of an important patrimony that will double your profits.
What's my experience with pricing, setup cost, and licensing?
Check Point always manages good prices and costs in the tools they sell.
Which other solutions did I evaluate?
We do not evaluate other options. We wanted to continue implementing the same brand since the other products have helped us a lot in the security of our company.
What other advice do I have?
Users can fully rely on Check Point products as they are robustly designed for security.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Jun 23, 2025
Flag as inappropriateTechnical Analyst (Cyber Security) at a consultancy with 51-200 employees
Patches cloud vulnerabilities and automates all the patching and reporting
Pros and Cons
- "The solution's main benefit is that it automates all the patching and reporting parts and generates an automated report."
- "Sometimes, the solution provides us with false alerts of vulnerabilities that are not present in our cloud environment."
What is our primary use case?
I work with the solution for patching over all the cloud vulnerabilities. We have a different monitoring team that monitors all the alerts on the solution. They send us a report, and we work on that report to patch all the vulnerabilities of our cloud environment, such as Azure and AWS.
What is most valuable?
The solution's main benefit is that it automates all the patching and reporting parts and generates an automated report. The solution automatically notifies you whenever any alert comes into your cloud environment via mail or message.
What needs improvement?
Sometimes, the solution provides us with false alerts of vulnerabilities that are not present in our cloud environment. The solution should include an auto-remediation feature, which most tools currently provide.
For how long have I used the solution?
I have been using the solution for three years.
What do I think about the stability of the solution?
Apart from the occasional false positives in the reports, we haven't had any issues with the solution's performance or stability.
What do I think about the scalability of the solution?
Check Point CloudGuard CNAPP is a scalable solution.
The solution is implemented in multiple locations, and each location has around 300 users.
How are customer service and support?
We contacted the technical support team during the deployment phase, and their support was very good and responsive.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used CrowdStrike. We switched to Check Point CloudGuard CNAPP because CrowdStrike lacked many features. Check Point CloudGuard CNAPP is a more advanced version of CrowdStrike, integrated with AI capabilities. It also provides different automatic reports, such as compliance reports.
How was the initial setup?
Around three to four people were involved in the solution's deployment. Since there are multiple environments in the cloud, it takes an entire day to deploy the tool.
What other advice do I have?
The solution's cloud security posture management scans your cloud environment and cloud-configured policies and gives you a report of all the loopholes in your cloud environment. You can also get compliance reports from the solution, and I am completely satisfied with its effectiveness.
The solution's cloud security posture management identifies risks most critical to the business and segregates them into low, medium, and high categories. The solution's workload protection capabilities provide protection for VMs. The scanning provided by the solution's workload protection capabilities helps us identify problems before they go live.
We can schedule the solution to scan our cloud environment daily for vulnerabilities. The solution takes 20 to 25 minutes to scan the entire cloud environment. Earlier, it used to take an entire day because we had to perform all the manual tasks to find out all the loopholes in our cloud environment.
Before using the solution, we used to spend an entire day finding all the loopholes in our cloud environment. Check Point CloudGuard CNAPP automated most of our tasks by providing automatic reports to our security team. We also use the solution's CDR capabilities.
The visibility we get from the solution's CDR capabilities helps simplify incident investigation time or process. After providing all the loopholes in our cloud environment, the solution provides a step-by-step remediation plan to fix particular vulnerabilities. We extract the report from the tool and work on the patching part.
We perform intrusion detection and threat hunting from the same console. Check Point CloudGuard CNAPP is a SaaS-based solution. All the configurations have gone through the secret key we fetch from the cloud environment and integrate with the solution. From there, it fetches all the configurations for the entire cloud environment.
I would recommend the solution to other users.
Overall, I rate the solution ten out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Subgerente De Operaciones at a financial services firm with 5,001-10,000 employees
Provides a lot of visibility and helps to maintain a good posture
Pros and Cons
- "Visibility is a key feature. It helps me to validate my overall network posture."
What is our primary use case?
We use CloudGuard CNAPP to verify the posture management of our cloud gateway.
How has it helped my organization?
CloudGuard CNAPP helps us improve security, verify vulnerabilities, and understand overall network behaviors. It helps us to have greater visibility of the posture and the gateways that are in the cloud. It also helps us to see where the gaps are and how the attack levels are.
CloudGuard CNAPP helps us a lot in being able to identify erroneous configurations or configurations that may not be as per the standard that we use internally or as per an international standard.
CloudGuard CNAPP's Cloud Security Posture Management identifies the risks that are most critical to our business. In some cases, we could identify that our posture level dropped, and we were able to identify what we needed. We were able to make adjustments to be able to have an adequate level of protection.
We use CloudGuard CNAPP's CloudGuard Workload Protection capabilities. We have several gateways, and within them, or between our clouds, we are protecting everything, such as servers and containers. In this way, we maintain complete protection, and logically, we have visibility into everything that enters and leaves our premises and our cloud.
The scanning provided by CloudGuard Workload Protection helps us identify problems before they go live.
What is most valuable?
Visibility is a key feature. It helps me to validate my overall network posture.
What needs improvement?
In a general sense, it is a tremendous solution. We have got good use out of it. From what I see, it is also well-positioned in the market. I understand that it is among the best solutions.
For how long have I used the solution?
I have been using CloudGuard CNAPP for about five years.
What do I think about the scalability of the solution?
Its scalability potential is good.
How are customer service and support?
Their support is excellent.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use a similar solution previously.
How was the initial setup?
We use Azure Cloud and AWS Cloud. The deployment was very easy. We worked with Check Point for implementation.
What about the implementation team?
We took Check Point's help with implementation.
Which other solutions did I evaluate?
We did not evaluate any other solution.
What other advice do I have?
I would rate CloudGuard CNAPP a ten out of ten. It is an excellent solution. When we used it for the first time, we verified that this solution was on top of other solutions. This platform has helped us to maintain a posture with a lot of visibility. It helps us a lot.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point CloudGuard CNAPP Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Vulnerability Management Cloud and Data Center Security Container Security Cloud Workload Protection Platforms (CWPP) Cloud Security Posture Management (CSPM) Cloud-Native Application Protection Platforms (CNAPP) Data Security Posture Management (DSPM) Compliance ManagementPopular Comparisons
SentinelOne Singularity Cloud Security
Microsoft Defender for Cloud
Prisma Cloud by Palo Alto Networks
Qualys VMDR
Varonis Platform
AWS GuardDuty
CrowdStrike Falcon Cloud Security
AWS Security Hub
Akamai Guardicore Segmentation
Tenable Security Center
Buyer's Guide
Download our free Check Point CloudGuard CNAPP Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the pricing for Check Point software?
- How inadvisable is it to use a single vulnerability analysis tool?
- What are the benefits of continuous scanning for vulnerability management?
- When evaluating Vulnerability Management, what aspect do you think is the most important to look for?
- What is a more effective approach to cyber defense: risk-based vulnerability management or vulnerability assessment?
- What are the main KPIs that need to be implemented to have better posture in vulnerability projects?
- Which is the best vulnerability scanner tool?
- What are your recommended automated penetration testing tools?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- Can you recommend API for Tenable Connector into ServiceNow




















