Try our new research platform with insights from 80,000+ expert users
reviewer2000268 - PeerSpot reviewer
Human Resources Executive at Randstad Nederland
User
Easy to set up with helpful support and protects against data loss
Pros and Cons
  • "This solution has saved the company from unnecessary data loss that occurs due to cyber attacks."
  • "The reporting dashboard responds slowly, which leads to late report compilation."

What is our primary use case?

This tool provides organizations with full security visualization data. It enables each department to discover the best security practices to protect data from ransomware attacks. 

It detects any security misconfigurations with an automated alert response to the IT team to take quick action. 

It has fully deployed reliable data protection tools to our cloud servers that detect any form of data theft in advance. 

The provision of advanced data analytics helps teams in the organization to deploy awareness to all sectors to ensure each team is fully equipped with data protection knowledge.

How has it helped my organization?

This solution has saved the company from unnecessary data loss that occurs due to cyber attacks. 

It has enforced the best security guidelines to protect against external threats. The cloud computing system has deployed digital security systems that monitor the entire networking system. 

The user interface gives timely security performance with suitable data indicators. The cloud monitoring tool provides timely feedback to on-premise teams on the state of cloud security to enable them to focus on more important tasks.

What is most valuable?

The solution offers full visibility of cloud workloads giving team members peace of mind since they can easily identify inefficiency and act quickly to restore normal workflow processes. 

The detection of environmental safety enables teams to collaborate effectively without any fear of external attacks. 

CloudGuard Posture Management deploys routine checkups of the security situation from the networking system to enhance compliance. Reliable security governance has enabled the company to meet the set international policies on security and boost performance.

What needs improvement?

There is no full support for bot management, and the company can work on that to enhance faster service delivery and enhance reliable security checkups. 

The reporting dashboard responds slowly, which leads to late report compilation. The next release can be equipped with robust dashboards and highly responsive data models. 

The performance was more stable compared to a few challenges we faced, but with new upgrades, it could be even more stable. 

The enhancement of cloud servers' security and management of dataflows has been a great achievement, and I highly recommend this solution.

Buyer's Guide
Check Point CloudGuard CNAPP
January 2025
Learn what your peers think about Check Point CloudGuard CNAPP. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for one year.

What do I think about the stability of the solution?

CloudGuard Posture Management is highly stable and powerful in securing company workloads.

What do I think about the scalability of the solution?

The entire deployment process took place smoothly, and we were impressed by the vendor team.

How are customer service and support?

The customer service team has been helpful and very supportive when we enquire about anything.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used a similar cloud networking security platform before.

How was the initial setup?

The initial setup process was not complicated since the customer service team had deployed professionals to set up and provide guidelines.

What about the implementation team?

We implemented it through the vendor team, and their level of expertise was very impressive.

What was our ROI?

We have achieved 35% ROI since we deployed it.

What's my experience with pricing, setup cost, and licensing?

The setup cost is high, however, the pricing terms vary based on the size of an organization.

Which other solutions did I evaluate?

We were in rush, and we did not hae enough time to evaluate other products in the market.

What other advice do I have?

This solution is highly powerful in the management of enterprise security, and I totally recommend it to other companies.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Leaderboard
Great contextualized visualization with increased security and efficiency
Pros and Cons
  • "This solution provides threat prevention and detection of anomalies automatically and investigates the activity of each one of them."
  • "I would like an interface more adapted to cell phones or tablets."

What is our primary use case?

We are at a point where we must have security at the level of the cloud that we were managing, and we reached a point where this need led us to use the alliance we had with Check Point. It was one of their solutions that came to give us analysis value. 

It offers threat security forensics through machine learning visualization and analyzes real-time and cloud anomalies. With it, we provide that security line for our two public clouds in which we have resources and applications.

How has it helped my organization?

This solution provides threat prevention and detection of anomalies automatically and investigates the activity of each one of them. It offers actionable intelligence with intuitive visualization and queries of alerts and notifications that are customizable based on the activities found.

All these benefits and features that Check Point CloudGuard Intelligence offers have helped us to achieve a security posture in our cloud environments, being safer and more efficient, enhancing a state-of-the-art level of security at the end of the day or year. 

What is most valuable?

One of its excellent or outstanding characteristics is having a contextualized visualization of the entire public cloud infrastructure and its security analysis, which helps us see and detect any intrusion in real-time. 

It is also possible to take advantage of its cloud bot technology and advanced encryption, thus the analysis of entry and exit of our cloud environment and identifying any unwanted agent or any incorrect configuration. According to those events, we can respond and take action against those activities.

What needs improvement?

I would like an interface more adapted to cell phones or tablets. In its web version, it is quite efficient, however, I would like this improvement and the possibility of action to be able to enjoy and manage even the identity and administration under applications optimized in said function - whether they are iOS or Android. 

Another feature that I would like is being able to carry out more frequent assessments on the solution with direct Check Point teams. 

For how long have I used the solution?

We've used the solution for one year.

Which solution did I use previously and why did I switch?

We did not previously use a different solution.

Which other solutions did I evaluate?

We did not evaluate other options. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point CloudGuard CNAPP
January 2025
Learn what your peers think about Check Point CloudGuard CNAPP. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.
reviewer2173374 - PeerSpot reviewer
DevOps and Security Engineer at a financial services firm with 5,001-10,000 employees
Real User
Top 20
Flexible with a good audit trail and blocking capabilities
Pros and Cons
  • "The feature that I find most valuable is the blocking feature."
  • "Especially with cloud security, there's too much clutter on the screen and too many things going on."

What is our primary use case?

We started to use Check Point as a firewall. That's what it was for. Now we use it for all the endpoint security, cloud security, and API endpoint security. That's probably our major use case. 

How has it helped my organization?

The solution has improved our organization by allowing us to be more flexible and deploy changes much more quickly. Since it gives us an audit trail, it's much easier for us to track or change things.

What is most valuable?

The feature that I find most valuable is the blocking feature. When we have to block something, the screens we have in front of us are really good. They are very user-friendly, and the processes are quick. That's something we've really liked from the beginning. 

What needs improvement?

Especially with cloud security, there's too much clutter on the screen and too many things going on.

In a future release, we'd like to have the ability to see if there is abnormal data being transferred. We'd like to see more features coming through that allow us to act more proactively and act against vulnerabilities effectively.

For how long have I used the solution?

I've used the solution for a long time. I've been with my company for more than ten years, and over that time, I've been using it. We've been using Check Point from on-premises deployments to the cloud.

What do I think about the stability of the solution?

We have not witnessed any crashing.

What do I think about the scalability of the solution?

The solution works well for us, both on-premises and on the cloud. 

How are customer service and support?

The support has always been the best.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We've used the solution for ten years. I'm not sure what we used before. 

How was the initial setup?

I was not a part of the initial setup.

What was our ROI?

We have seen an ROI in terms of flexibility and ease of use. 

What other advice do I have?

The solution is very easy to use. We've used it for a long time. Our team is very familiar with it. Different people, even with different responsibilities, can share. It has helped us free up staff time. 

I'd rate the solution a ten out of ten. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Support at a security firm with 51-200 employees
User
Top 5Leaderboard
Great machine learning and automation with good flexibility
Pros and Cons
  • "The solution has intelligence that integrates with a range of threat intelligence feeds, including Check Point's ThreatCloud, to provide real-time intelligence on emerging threats."
  • "I would like them to include support for their products in languages other than English."

What is our primary use case?

This solution is part of a robust and great security tool from Check Point, which through its multi-cloud, CloudGuard has this feature to further strengthen this great solution.

In our case, this characteristic helps us to be able to be more prepared in the face of threats. Its artificial intelligence identifies threats and has great machine learning, which further strengthens the tool.

In addition to their forensic analysis in the event of any irregularity, they strengthen and facilitate audits. All of this helps to improve security postures and best practices for the cloud.

How has it helped my organization?

CheckPoint CloudGuard, in addition to its intelligence and advanced search for threats, helps us with many forensic analyses in the event of any irregularity. It strengthens and facilitates audits as well. All of this helps to improve security postures and good practices for the cloud, which is important due to possible and future security regulations that we want to adopt.

On the other hand, it facilitates alerts and the monitoring of threats in real-time. Its integration with SIEM tools has given us a greater vision of what is happening in our environment.

What is most valuable?

The most valuable features include:

  • Machine learning algorithms to identify and prioritize security events, providing security teams with actionable insights.
  • The automation of security policy creation and enforcement to reduce the risk of misconfigurations and improve overall security posture.
  • Intelligence that integrates with a range of threat intelligence feeds, including Check Point's ThreatCloud, to provide real-time intelligence on emerging threats.
  • Flexibility and scalability.
  • What needs improvement?

    I would like them to include support for their products in languages other than English in order to have easier contact with Check Point support. This would make management easier.

    The costs of latest cloud solutions are very expensive. Some of them are only for large companies, and they should make cost improvements.

    Response times for support or problem cases sometimes take a long time to be addressed.

    The documentation can be easier with more public documents and accessibility to the client. Currently, it is difficult to find documentation for new products.

    For how long have I used the solution?

    This is an excellent tool and we've used it in the last year within the CloudGuard platform in the Infinity Portal.

    Which solution did I use previously and why did I switch?

    For solutions as complete as this multi-cloud, we had not been able to test.

    Which other solutions did I evaluate?

    We always carry out concept tests with partners first to uncover cost validation, among other aspects, before making a decision.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    reviewer2008410 - PeerSpot reviewer
    Software Engineer at Doddle
    User
    Top 5
    Good cloud threat intelligence, robust security, and out-of-the-box integrations
    Pros and Cons
    • "The system has deployed security tools to enhance effective investigations in the entire company networking system."
    • "The software configurations theory is complicated, and without proper planning and a well-skilled technical team, it cannot perform its tasks properly."

    What is our primary use case?

    Check Point CloudGuard Intelligence surveys the company's multi-cloud servers to ensure they are free from threats. 

    The software provides real-time data analytics on the performance and security situation around the applications. Data visualization enables the company IT team to easily monitor the networking system and notice any abnormality. 

    The intelligence provision on workflow infrastructure enables my team to prepare for risks and put measures for curbing malware attacks. The system has provided CloudBots that detect any threats and misconfigurations automatically from our cloud servers.

    How has it helped my organization?

    The platform has enabled the company to avoid unnecessary data threats affecting the workflow chain and slowing down performance. 

    Intelligence information with real-time data has enabled all the teams to plan effectively and make informed decisions. 

    It is highly flexible since it can operate on both mobile and desktop devices. It allows each department to access and control operations and deploy security measures based on the demands. 

    Cloud security monitoring has enhanced the safety of workloads and created a clean infrastructure for transferring data to our cloud stores and on-premises.

    What is most valuable?

    Typically, the threat-hunting mission scales down the performance of the entire network traffic flow to establish any drawback. Cloud threat intelligence detects any form of violation that goes beyond our policies for immediate rectification. The system has deployed security tools to enhance effective investigations in the entire company networking system. The out-of-the-box integrations enable us to integrate security technologies and create robust security management systems. The set features have a great impact on the overall performance of the company programs, and we are grateful for this great solution. 

    What needs improvement?

    The software configurations theory is complicated, and without proper planning and a well-skilled technical team, it cannot perform its tasks properly. Without effective mapping of critical areas, the platform cannot provide very good results. 

    The maintenance cost is high after deployment, and it requires close monitoring for effective results. 

    This version performs effectively when it is channeled to the right network infrastructure. It has created a centralized operation system that can comprehensively monitor and manage security for all connecting systems.

    For how long have I used the solution?

    I've used the solution for one year.

    What do I think about the stability of the solution?

    It is stable and has created a better work environment.

    What do I think about the scalability of the solution?

    Providing security for a multi-cloud networking system has been awesome.

    How are customer service and support?

    The customer service team has been providing reliable support at all times, and I thank them for such contribution.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have no experience from similar solution in my career experience.

    How was the initial setup?

    The setup was complex, however, the vendor's technical team provided effective guidance.

    What about the implementation team?

    We deployed it through a vendor team, and they were knowledgeable in all aspects.

    What was our ROI?

    The recorded ROI has been growing on a daily basis based on an excellent performance.

    What's my experience with pricing, setup cost, and licensing?

    The setup cost is high.

    Which other solutions did I evaluate?

    I did not check other products.

    Which deployment model are you using for this solution?

    Hybrid Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Jonathan Ramos G. - PeerSpot reviewer
    Cloud Engineer at ITQS
    Real User
    Leaderboard
    Helpful analytics, great reports, and helps strengthen our security posture
    Pros and Cons
    • "We like the ability to investigate, analyze, and generate reports."
    • "Currently, I would like this solution extended to cellular devices or tablets."

    What is our primary use case?

    In recent years, in search of a new strategy, we have tried to strengthen our security and infrastructure posture, being one of the fundamental pillars of a large organization. 

    As a result of this situation, we have begun to adapt using solutions that support us at the cloud and on-premise. Posture Management is the solution that supports us in this search for a healthy, strong infrastructure and, above all, is aligned with the legal and regulatory frameworks at an international level.

    How has it helped my organization?

    This tool is very integrated for emerging infrastructures such as the cloud. It comes to support us with this new legal framework. Ideas, opinions, and regulations serve as a baseline to protect us from new methods or attacks. Without this legal framework, it would become more difficult, as many organizations are new to the use of the cloud. This solution gives us support from the experts who have been first in this model of infrastructure and services. We can ensure that by following and adapting our needs based on these guidelines we will be a great organization with a strong vision and a great security framework established to protect us. 

    What is most valuable?

    We like the ability to investigate, analyze, and generate reports.

    Its most notable feature is to extend the analytics it performs to teams in any available cloud. 

    We can collect analysis and be able to transform in such a way that the data provided allows us to find great value in institutional security. We can support each other to be better and more efficient daily. 

    What needs improvement?

    Currently, I would like this solution extended to cellular devices or tablets. This will be able to allow us to be more efficient.

    For how long have I used the solution?

    I've used the solution for one year.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    reviewer2104284 - PeerSpot reviewer
    Java Application Developer at Oesia
    User
    Top 5
    Secures data, detects cloud anomalies, and offers reliable licensing
    Pros and Cons
    • "The comprehensive security for IaaS and PaaS cloud assets provides efficient security awareness to all the teams."
    • "No improvements are needed."

    What is our primary use case?

    Check Point CloudGuard Intelligence provides security for the organization's cloud assets. 

    It provides awareness to all the teams based on the security situations and precautions that can block future threats. 

    It detects cloud anomalies to enhance workload safety and quarantine threats with a powerful threat intelligence feed. 

    It secures data that is stored in the cloud servers. 

    The security model provides alerts on policy violations and reports on cloud security. 

    The intelligence information has helped us to plan and allocate resources efficiently.

    How has it helped my organization?

    It has established a network management system that enables each sector to monitor data flow in elastic cloud environments. 

    We have been able to get reports on cloud performance and workload safety. 

    The cloud networking infrastructure has been upgraded with modern data management tools that have advanced the communication system. 

    It has steered the implementation of projects and tasks in a secure environment that is free from malware attacks. 

    The cloud-based storage facilities are shielded from phishing attacks and cyber attacks.

    What is most valuable?

    The comprehensive security for IaaS and PaaS cloud assets provides efficient security awareness to all the teams. 

    The data querying system gives team members an opportunity to select and give priority to the most crucial information. 

    The intelligence system has powerful security management systems that have put measures in place to curb any hidden threats that can affect workflows. 

    The cost and licensing terms are reliable, and many business enterprises can maintain them without facing financial challenges.

    What needs improvement?

    No improvements are needed. The current version has great and powerful features that take care of most sets of demands. The cloud-integrated network system can be upgraded to meet company requirements on intelligence information and for customization purposes. The set features have stable performance capability with the modern threat management network infrastructure. 

    This system has a capable data orchestration system that can access data from various centers. The customer support channels are reliable, with great services when contacted.

    For how long have I used the solution?

    I've used the solution for eight months.

    What do I think about the stability of the solution?

    This solution is stable.

    What do I think about the scalability of the solution?

    I am impressed by the performance.

    How are customer service and support?

    The customer service support staff is reliable.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have not used a similar solution.

    How was the initial setup?

    The initial setup was straightforward.

    What about the implementation team?

    It was implemented by the vendor.

    What was our ROI?

    There is increased ROI from a great performance.

    What's my experience with pricing, setup cost, and licensing?

    The setup cost and licensing terms are always good.

    Which other solutions did I evaluate?

    This is the best platform that I have worked with.

    What other advice do I have?

    This is a great solution for any organization.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Solution Architect Cloud Security at a tech vendor with 10,001+ employees
    Real User
    Feature-rich, centrally managed, and stable, but it needs DLP support to be included
    Pros and Cons
    • "All of the features are very useful in today's market."
    • "Dome9 should also support deployments that are on-premises and in a hybrid cloud."

    What is our primary use case?

    We are a solution provider and we are evaluating multiple tools for cloud workload security and vulnerability management. We are evaluating products such as Dome9 to figure out which one would be best for our customers.

    This solution is used to replace a variety of cloud security and management tools.

    How has it helped my organization?

    Dome9 can be used centrally manage many different functions that take care of operations such as scanning the network.

    What is most valuable?

    All of the features are very useful in today's market.

    What needs improvement?

    Dome9 should also support deployments that are on-premises and in a hybrid cloud.

    This solution needs DLP support.

    For how long have I used the solution?

    I have been using Dome9 for less than one year.

    What do I think about the stability of the solution?

    We have not experienced any issues in terms of stability, although we are still exploring the tool.

    Which solution did I use previously and why did I switch?

    We are currently running Palo Alto Prisma and evaluating it together with Dome9.

    How was the initial setup?

    It is easy to implement Dome9 but there are many policies that need to be configured.

    Once the deployment is complete, the policies have to be set up and validated. All of the policies need to be relevant to my customers, which means that some of them will have to be disabled. For example, policy requirements will vary from country to country.

    This solution can be used in many different markets such as medical or insurance, and different challenges will be present depending on the market.

     The process can take a month or a month and a half.

    Which other solutions did I evaluate?

    In addition to evaluating Dome9 and Palo Alto Prisma, we are considering Qualys, as well as a customized solution by Security Compass.

    One of our customers is also using Check Point CloudGuard, which we are trying to replace with Dome9.

    I would like to understand the reporting, how secure the solutions are, and how it can be implemented such that my framework is mapped to those tools.

    What other advice do I have?

    The functionality that is used will vary depending on the use case. For example, in a recent use case that I worked on, the data packets had public access without exception. However, this should not have been allowed.

    I definitely suggest that people use Dome9 because I have used it since last year and I really like the features. It is also stable. There is only one feature, DLP, that is not present and we have found in Prisma.

    I would rate this solution a six out of ten.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free Check Point CloudGuard CNAPP Report and get advice and tips from experienced pros sharing their opinions.
    Updated: January 2025
    Buyer's Guide
    Download our free Check Point CloudGuard CNAPP Report and get advice and tips from experienced pros sharing their opinions.