We review CloudGuard results and generate tickets to contact the owners.
Check Point CloudGuard Posture Management will improve the organization. Currently, it is operating as a stopgap measure to address these issues. This is because there are a lot of them being generated. They are working on automation to automatically create tickets and track when issues are remediated. So, hopefully, when that comes into play, it will be a much more valuable tool.
The ability to drill down to individual hosts on an account and see which ones are affected is valuable. This is because we have a lot of cases where people remediate part of the solution on half of their hosts, but don't realize that they have more hosts that need to be addressed.
The rules are not well-tuned, and many of them generate false positives or nonsensical results. For example, they might flag port 443 as open, even though it is supposed to be open for a public web server. There needs to be a better way to exclude certain hosts that are compliant and are supposed to be open.
I have been using Check Point CloudGuard Posture Management for three months.
The solution has not crashed yet, and there are a lot of findings, so that is a good sign of its stability.
The solution is able to handle a large number of vulnerabilities, so it seems to be able to scale well.
We've only been using the solution for a few months, but we're already starting to see the numbers go down. This is encouraging, but it's important to be aware of any vulnerabilities that may exist so that we can take steps to address them.
I'm glad I don't have to pay the licensing fee. Everything in this field is very expensive. I don't have a say in the matter.
I give Check Point CloudGuard Posture Management a six out of ten. It could be better once fully tuned and properly deployed.
My usage is rather difficult because the client has not spent much time tuning the solution, as they are planning to automate a lot of it. As a result, I am currently the manual.
The solution actually created more work for the staff because it made them aware of all the vulnerabilities. As a result, their priority is now to fix them, which created a lot of work and a lot of tickets.
I wish I had been involved in the deployment because I would have done it differently.
At the RSA conference, we receive a lot of promotional items.
The RSA conference does not impact our organization's cybersecurity purchases.