We were in the review analysis, seeking a fast, efficient infrastructure with solid bases of data analysis and investigation. We wanted something that managed to establish and analyze systems in production so that it would not impact their use. We also wanted a visualization of our current state, with a solution that could give an example of the route that must be taken to achieve excellence in security. This tool has allowed us to achieve stronger security, allows for better analysis, and provides structure and guidance for better guides and international policies under a legal framework.
Soporte técnico superior at a financial services firm with 51-200 employees
Identifies issues, offers good analysis, and has automation capabilities
Pros and Cons
- "It has an analytics service that does research for us."
- "The solution could be improved with a greater analysis of its Microsoft Security score."
What is our primary use case?
How has it helped my organization?
It has given us a way to clearly and objectively identify items or issues before making any changes to the network. It offers assurance, after investigation, of a clear understanding of what each analysis is trying to define. We can now clearly and specifically achieve what we need to do from a security standpoint to help us make an action plan and achieve goals. Once we have the information, it is important to define and analyze the data collected, organize information in a format that makes sense to us administrators, and look for patterns or trends that may be useful for our investigation.
What is most valuable?
It has an analytics service that does research for us. This can provide valuable information to ultimately improve our infrastructure. Via research and analysis, we are able to identify problem areas. We can find trends and take action to fix problems while improving performance.
Its fairly advanced automation allows us to simplify and speed up security management in the cloud. This includes being able to identify, correct, and validate all kinds of vulnerabilities that reduce the manual workload for each of our company's administrators, thus being more efficient. With this new efficiency, we are able to reach effective resolutions at all times.
What needs improvement?
The tool has several specific characteristics at the Microsoft 365 or Exchange level.
The solution could be improved with a greater analysis of its Microsoft Security score. They should be improving the visualization of data and greater coverage in Sharepoint or Teams. Its posture analysis is currently low. There could be improvement or capacity to be more efficient if we managed to achieve greater integration with Microsoft Security score, improvements in data visualization,, and greater coverage of Microsoft 365 resources.
Buyer's Guide
Check Point CloudGuard CNAPP
March 2026
Learn what your peers think about Check Point CloudGuard CNAPP. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
883,760 professionals have used our research since 2012.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Perimeter Security Administrator at a security firm with 51-200 employees
Centralizes data, detects anomalies and can send alerts
Pros and Cons
- "This platform has allowed us to collect data from multiple sources, centralizing everything under a single source."
- "We want to be able to customize the solution more in order to meet the needs of our company."
What is our primary use case?
This is one of the solutions that we have sought in order to establish an intelligent analysis. It has helped us collect data on our accounts in the cloud and applications. It offers integrations and provides real-time analysis of security issues. The platform learns automatically and manages to identify abnormal behaviors to help us detect anomalies. Additionally, we can configure automatic notifications that help us act during detected incidents.
How has it helped my organization?
It helps to have a centralization of data, alerts, and reports. There is a main data center that has generated reports and alerts that can include information about security trends and unusual user activity. It offers recommendations to improve security. The data collection and action activity logs provide information about usage, performance, and resources including traffic logs, usage logs, storage, and available space. We can also see CPU and memory, among other characteristics.
What is most valuable?
Currently, as an organization, we rely on technologies to save and store advanced data analysis information. We can take advantage of automated learning to detect and respond to security threats in real time in the cloud.
This platform has allowed us to collect data from multiple sources, centralizing everything under a single source. The repository includes audit logs, activity logs, and network logs to help us identify unusual patterns and negative trends that may affect the security of users.
Using the information the product provides, we have effectively and accurately detected real-time troubleshooting of suspicious user attempts to log into an account and we can detect suspicious login attempts. We'll get alerts, which have helped us automate security in order to act fast.
What needs improvement?
We want to optimize the tool in the future. They should allow us to have greater integration with other security solutions and third-party tools so that the organization can take advantage of and improve the protection of all the company infrastructure.
We would like to optimize and improve its high demand for customization, which allows us to adapt to specific necessary security solutions. We want to be able to customize the solution more in order to meet the needs of our company. Currently, the solution is quite rigid and complies only with standards.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point CloudGuard CNAPP
March 2026
Learn what your peers think about Check Point CloudGuard CNAPP. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
883,760 professionals have used our research since 2012.
Multicloud posture and review, modern, and backed by all checkpoint security.
Pros and Cons
- "The administration portal panel is very intuitive."
- "The guidelines to implement or to link with the clouds are not complete."
What is our primary use case?
It helped us a lot in improving the regulations and security of our cloud environments.
We still manage an on-premise environment, however, many companies at the beginning believe that the cloud is invulnerable or that the manufacturer must ensure everything, which is not correct. With this implementation, it is possible to improve all current cloud security.
In the company I work for, it was implemented to be able to have governance in addition to good practices in our Microsoft Azure environment. It's a somewhat expensive tool, however, it is worth it to be able to solve all those improvements and avoid so many modern vulnerabilities, which have their point in cloud attacks.
How has it helped my organization?
As in our company we have environments that are hybrid in some cases and others totally cloud. We find in Check Point a reliable tool to improve security, implement regulations, and generate governance in cloud environments. In our case, we have a Microsoft Azure public cloud with enough resources which we need to protect. We achieved it together with Check Point.
It was possible to provide greater security to identities with admin access to the cloud - a critical part of IT management.
What is most valuable?
The most striking features are:
1- Identity protection generated through Check Point posture management, which is helping to prevent user theft or unauthorized access.
2- The governance that can be provided with this tool is very good since we have been able to implement good practices to avoid vulnerabilities.
3- The administration portal panel is very intuitive. It also generates scores based on regulations and good practices to go little by little with the recommendations, significantly improving security.
What needs improvement?
Some general improvement characteristics can be made, including the following:
1- Cost improvement. Some tools are quite expensive, and some non-equal manufacturers offer more comfortable capabilities at the cost level.
2- The guidelines to implement or to link with the clouds are not complete. Following them sometimes the task of implementing under the best practices of the manufacturer is not achieved.
3- Many Check Point guides are only available to partners and not to the general public. They can make a better impression by having them public and thereby helping the client.
For how long have I used the solution?
It's an excellent tool and is available in the Infinity Check Point Portal. Its main function is to centralize governance in the same administration portal and has been tested for more than a year to validate our cloud security.
Which solution did I use previously and why did I switch?
Previously we used only Microsoft with Defender for Cloud. However, we wanted to have our security centralized. Check Point through the infinity portal achieves that feature.
What's my experience with pricing, setup cost, and licensing?
It's very important to have a reliable and good partner. The proactivity helps us to see the existing needs and check with Check Point what characteristics are required.
Which other solutions did I evaluate?
We chose Check Point as it provides integrated and centralized security, improving the effectiveness of security reviews.
What other advice do I have?
Even though the cost is somewhat expensive. I recommend this solution for users who use the public cloud.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information sharing capabilities, and excellent web portal
Pros and Cons
- "Its monitoring and alerts are triggered by a failure or non-compliance with policies. It helps us to be able to act effectively and quickly."
- "The costs are high."
What is our primary use case?
We wanted to have a centralized and modern security environment, and it was possible to obtain it through Check Point Infinity.
It was possible to implement Check Point CloudGuard to take advantage of cloud intelligence to analyze modern threats. The global learning that Check Point obtains from all its devices for the improvement and confidence of security.
We currently use Microsoft Azure, which has several security features, all with costs, to perform governance, control, vulnerability improvements and regulatory compliance. However, we manage Check Point.
Forensics as your monitoring portal is exceptional.
How has it helped my organization?
The features included in Check Point CloudGuard help us a lot with the security of our Microsoft Azure cloud, which we successfully integrate with Check Point CloudGuard.
We have validated the score generated to improve security performance, thereby making improvements to avoid vulnerabilities.
The threat attack is reviewed and covered in an automated manner through cloud intelligence. Its alerts have kept us notified so that we can make the necessary adjustments. It offers incredible performance.
What is most valuable?
The most important characteristics are the following:
1- The detection of vulnerabilities in real-time. Its monitoring and alerts are triggered by a failure or non-compliance with policies. It helps us to be able to act effectively and quickly.
2- The use of Check Point ThreatCloud allows sharing of information between other Check Point devices to improve trust and form of protection against new threats.
3- Finally, its security application portals are very intuitive. It has helped us with the simple handling of Check Point CloudGuard.
What needs improvement?
Some possibilities of improvements for Check Point include:
1- Improving or creating best practices that can be generated publicly so that customers can have a package of policies, for example, that the manufacturer provides in addition to easy access to this material.
2- Improvement at the support level for management, handling and solution of cases in a better, faster, and more effective way. Sometimes the cases take a long time to be able to schedule a session and solve together with the client and support.
3- The costs are high. They could provide better costs for the client to make a simpler decision and not be affected by this issue.
For how long have I used the solution?
One of its characteristics is cloud intelligence. It was adapted to our centralization and public cloud requirements.
Our company already uses several centralized products in the Check Point Infinity platform. For more than six months, we have used CloudGuard.
Which solution did I use previously and why did I switch?
We used Azure Defender for the cloud. It is good, however, I liked more the form and the trust of Check Point.
What's my experience with pricing, setup cost, and licensing?
It is always important to have access to a partner to help you with costs, and requirements and to help you choose the best option within Check Point.
Which other solutions did I evaluate?
We previously validated some solutions. However, the features of Check Point CloudGuard were better suited to our requirements.
What other advice do I have?
It is an expensive solution. However, I recommend it.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
AI capability, provides Cloud support.
Pros and Cons
- "The automatic learning and an AI engine help to find more modern vulnerability problems."
- "Currently, this solution is somewhat expensive."
What is our primary use case?
We need more infrastructure in the cloud to avoid vulnerabilities.
With this shield infrastructure, we seek to protect, improve, and close security problems that generally arise in the implementation of code, apps, and APIs that maintain privileged keys or identities, for which we have achieved increased security with best practices.
How has it helped my organization?
This tool really gave us development implementation security. Many times the applications were built with a user or identity with privileges to be able to manage within their infrastructure. However, it is not the best way to deal with this challenge. APIs were also exposed that were connected to the infrastructure that could be violated. Thanks to Check Point, we have been able to improve with best practices and protect the information and code of our infrastructure.
What is most valuable?
This Check Point security tool has many benefits. Some of the ones that we liked the most include:
1 - How Check Point CloudGuard centralizes the protection of the workload. In the Infinity Portal all the administration can be managed easily. We can monitor and scan the codes and make decisions to improve security.
2 - This tool is very cloud-based. In addition, it can handle hybrid environments, which is a great feature for clients with mixed environments.
3 - The automatic learning and an AI engine help to find more modern vulnerability problems. With this, it provides greater security to the client.
What needs improvement?
Some improvements that can be made to Check Point CloudGuard are the following:
1. Cost improvement. Currently, this solution is somewhat expensive. We have not really seen a solution with these characteristics and so complete. However, the cost is high.
2. There is very little Check Point documentation as it is a very new tool. Sometimes we followed the documentation, yet it was not possible to implement it in the tool, for which we had to verify with the executive of our partner to request help.
3. Support is very slow.
For how long have I used the solution?
This tool has been used this year by development partners and managed by support. It is a great tool that is coupled with new technologies that cloud development has produced, and thus we've been able to adjust and provide the required security.
Which solution did I use previously and why did I switch?
This tool and Spectral are some of the best tools we've tried. Using both is excellent.
What's my experience with pricing, setup cost, and licensing?
Prepare to pay, since the tool is expensive. However, I recommend talking to a Check Point partner so that they can provide you with everything related to the tool along with costs.
Which other solutions did I evaluate?
This tool is centralized with the Infinity Check Point Portal. This, with the other Check Point tools that we handle, is excellent for administration.
We validated this along with some other tools. We did not have the same confidence that Check Point provided due to its prestige, its characteristics, and its comments.
What other advice do I have?
Evaluate this tool and also check the new Spectral Check Point tool, which can help complement this.
Both are recommended.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cloud computing at a security firm with 5,001-10,000 employees
Strengthens and centralizes all the security infrastructure and reduces attacks
Pros and Cons
- "It presents a real-time database that is always updated."
- "The support it provides is not very good. They should improve it since we have had several setbacks due to support issues."
What is our primary use case?
Check Point CloudGuard Intelligence Security is one of the most robust tools on the market. That's why we decided to implement it in our company when all our operations were migrated to the Azure cloud area.
We needed a tool that would provide security in the network and help analyze any vulnerabilities that we might face in these new environments. We wanted to be able to attack all the weak points that we have in the cloud in order to guarantee effective and stable security. We also have some applications in our systems that deserve excellent security.
How has it helped my organization?
Check Point CloudGuard Intelligence came to strengthen our security and has helped the IT department achieve excellent network security.
In addition to that, it has helped us centralize all the security infrastructure in this tool and helped us a lot to counteract vulnerabilities that were present. With this product, we were able to reduce the rate of attacks that we had. The database that they have is in real-time and updated instantaneously. All these factors helped a lot to reduce vulnerabilities.
What is most valuable?
Check Point's CloudGuard Intelligence tool presents some features that should be highlighted. For example:
It presents a real-time database that is always updated.
The environment can be centralized within Check Point Infinity, and thus we can have several security tools.
It also presents a forensic analysis that helped us to determine the root of several issues.
Integration with Sentinel can be made, which allows us to obtain more security data and analyze it.
It presents a portal that is relatively easy to use and configure.
What needs improvement?
The tool works perfectly and improvements should be made, if any, in various technical and administrative aspects.
For how long have I used the solution?
It was implemented approximately one year ago.
What do I think about the stability of the solution?
Check Point CloudGuard Intelligence has good stability. We have not presented performance problems or any other that would lead to a forced restart of the tool.
What do I think about the scalability of the solution?
The tool presents very good and functional scalability. To this day, we have not presented any problems.
How are customer service and support?
The support it provides is not very good. They should improve it since we have had several setbacks due to support issues.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, there was no tool in the company's infrastructure. We needed the solution when we moved to the cloud and decided to improve security.
How was the initial setup?
The implementation of the tool is very easy. There are several steps in the wizard where it gets complicated around the configuration, however. If you do not have extensive knowledge of the tool, it becomes complicated.
What about the implementation team?
The implementation was done through the vendor, who gave us a support engineer to help us with the implementation and configuration of the tool. We also received some training.
What was our ROI?
By making an investment in security tools, we are doing ourselves a great favor. With this tool, we are protecting our information while maintaining operations. It is always a great investment to acquire these tools. Also, afterward, there is a noticeable economic return.
What's my experience with pricing, setup cost, and licensing?
Whenever an investment is made in a security tool, it is high due to many factors. that said, investing in security will provide economic returns in the short or long term since it will greatly lighten workloads and provide security.
Which other solutions did I evaluate?
We evaluated many options on the market, such as Fortinet, Sophos, and Cisco NGFW. However, Check Point had better features.
What other advice do I have?
With the time that I have used this tool, we have noticed that it is a very good solution and that it has excellent features. It provides very secure connections.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Database Administrator at a tech services company with 1,001-5,000 employees
Saves time, offers great advanced detection, and offers enhanced security insights
Pros and Cons
- "It offers advanced detection of threats that can harm data from the cloud database."
- "The entire system is complicated, and the setup process may not cater to the company's demands."
What is our primary use case?
This software protects cloud data from security malpractices and enhances policy compliance.
It provides full data visualization of saved workloads and workflows that runs across the organization.
Posture Management provides data analytics from network security, enabling departments to monitor work processes effectively.
It has deployed automatic security models across the cloud computing infrastructure to enhance best data protection practices.
The database management team has fully benefited since we secured this product due to increased efficiency.
How has it helped my organization?
Check Point CloudGuard Posture Management has created the best data management environment that can easily monitor workloads from the entire company networking system.
It offers advanced detection of threats that can harm data from the cloud database.
It has saved the cost and time used before to monitor the security status of our infrastructure manually.
The modern platform has upgraded technological models that enhance faster data transfer from one server to the other.
It has allowed the IT team to scale and develop suitable security policies that track our daily activities.
What is most valuable?
The data governance features have comprehensive security features that block malware attacks.
The security automation functionalities accelerate performance and close all insecurity loopholes that can expose company data to unauthorized users.
The integrated customized security setups have complied with the set security rule sets.
The intelligence security insights enable teams to set reliable awareness that can caution them when there are negative data threats.
The dashboards provide summarized data representations that can be analyzed for improved performance.
What needs improvement?
The entire system is complicated, and the setup process may not cater to the company's demands.
Tiny misconfigurations may not be detected in advance and can easily affect performance from some cloud servers.
When the platform is overloaded with a lot of tasks at the same time, it can delay results and lead to poor security responses.
The cost is high for small businesses that have no stable revenue-generation assets.
Security and compliance posture reports created from the audited results have confirmed that we are doing well and the organization has stable security tools.
For how long have I used the solution?
I've used the solution for one year.
What do I think about the stability of the solution?
The product has maintained a stable performance from the time of deployment.
What do I think about the scalability of the solution?
I am happy with scaling since there is comprehensive security compliance in the organization.
How are customer service and support?
We usually have a close and productive relationship with the support team.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not yet switched to another software.
How was the initial setup?
The setup was complicated, however, the vendor support team provided effective guidelines.
What about the implementation team?
We implemented the solution through a vendor.
What was our ROI?
We have recorded a high ROI growth rate.
What's my experience with pricing, setup cost, and licensing?
The setup cost is good, and the pricing depends on the size of the company.
Which other solutions did I evaluate?
We negotiated with other service providers. The best bid came from Check Point.
What other advice do I have?
We have achieved the set objectives with Check Point CloudGuard Posture Management.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Human Resources Executive at a recruiting/HR firm with 1,001-5,000 employees
Easy to set up with helpful support and protects against data loss
Pros and Cons
- "This solution has saved the company from unnecessary data loss that occurs due to cyber attacks."
- "The reporting dashboard responds slowly, which leads to late report compilation."
What is our primary use case?
This tool provides organizations with full security visualization data. It enables each department to discover the best security practices to protect data from ransomware attacks.
It detects any security misconfigurations with an automated alert response to the IT team to take quick action.
It has fully deployed reliable data protection tools to our cloud servers that detect any form of data theft in advance.
The provision of advanced data analytics helps teams in the organization to deploy awareness to all sectors to ensure each team is fully equipped with data protection knowledge.
How has it helped my organization?
This solution has saved the company from unnecessary data loss that occurs due to cyber attacks.
It has enforced the best security guidelines to protect against external threats. The cloud computing system has deployed digital security systems that monitor the entire networking system.
The user interface gives timely security performance with suitable data indicators. The cloud monitoring tool provides timely feedback to on-premise teams on the state of cloud security to enable them to focus on more important tasks.
What is most valuable?
The solution offers full visibility of cloud workloads giving team members peace of mind since they can easily identify inefficiency and act quickly to restore normal workflow processes.
The detection of environmental safety enables teams to collaborate effectively without any fear of external attacks.
CloudGuard Posture Management deploys routine checkups of the security situation from the networking system to enhance compliance. Reliable security governance has enabled the company to meet the set international policies on security and boost performance.
What needs improvement?
There is no full support for bot management, and the company can work on that to enhance faster service delivery and enhance reliable security checkups.
The reporting dashboard responds slowly, which leads to late report compilation. The next release can be equipped with robust dashboards and highly responsive data models.
The performance was more stable compared to a few challenges we faced, but with new upgrades, it could be even more stable.
The enhancement of cloud servers' security and management of dataflows has been a great achievement, and I highly recommend this solution.
For how long have I used the solution?
I've used the solution for one year.
What do I think about the stability of the solution?
CloudGuard Posture Management is highly stable and powerful in securing company workloads.
What do I think about the scalability of the solution?
The entire deployment process took place smoothly, and we were impressed by the vendor team.
How are customer service and support?
The customer service team has been helpful and very supportive when we enquire about anything.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not used a similar cloud networking security platform before.
How was the initial setup?
The initial setup process was not complicated since the customer service team had deployed professionals to set up and provide guidelines.
What about the implementation team?
We implemented it through the vendor team, and their level of expertise was very impressive.
What was our ROI?
We have achieved 35% ROI since we deployed it.
What's my experience with pricing, setup cost, and licensing?
The setup cost is high, however, the pricing terms vary based on the size of an organization.
Which other solutions did I evaluate?
We were in rush, and we did not hae enough time to evaluate other products in the market.
What other advice do I have?
This solution is highly powerful in the management of enterprise security, and I totally recommend it to other companies.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point CloudGuard CNAPP Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Product Categories
Vulnerability Management Cloud and Data Center Security Container Security Cloud Workload Protection Platforms (CWPP) Cloud Security Posture Management (CSPM) Cloud-Native Application Protection Platforms (CNAPP) Data Security Posture Management (DSPM) Compliance ManagementPopular Comparisons
SentinelOne Singularity Cloud Security
Microsoft Defender for Cloud
Prisma Cloud by Palo Alto Networks
Checkmarx One
Qualys VMDR
Varonis Platform
AWS GuardDuty
CrowdStrike Falcon Cloud Security
AWS Security Hub
Orca Security
Buyer's Guide
Download our free Check Point CloudGuard CNAPP Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the pricing for Check Point software?
- How inadvisable is it to use a single vulnerability analysis tool?
- What are the benefits of continuous scanning for vulnerability management?
- When evaluating Vulnerability Management, what aspect do you think is the most important to look for?
- What is a more effective approach to cyber defense: risk-based vulnerability management or vulnerability assessment?
- What are the main KPIs that need to be implemented to have better posture in vulnerability projects?
- Which is the best vulnerability scanner tool?
- What are your recommended automated penetration testing tools?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- Can you recommend API for Tenable Connector into ServiceNow


















