We implement it to protect applications and APIs across multi-cloud environments.
The primary advantage we experienced was in terms of security capabilities. Previously, our proxy solution lacked this level of protection, but with Check Point, we now benefit from streamlined management and complete visibility.
One of its most significant benefits is its ability to defend against a diverse array of security threats, without needing a specific configuration. It seamlessly protects through machine learning, giving us visibility into potential attacks and where they come from.
CloudGuard Application Security's ability to safeguard our applications from threats without depending on signatures is crucial. The intelligence behind its operation gives us the impression that it's being overseen by a human, evaluating whether activities are benign or malicious. It consistently provides accurate responses without requiring constant intervention from us.
In terms of its performance, CloudGuard Application Security boasts remarkably low rates of false positives. Occasionally, in certain implementations or configurations of additional functionalities, it may detect new elements as potentially intrusive, prompting proactive protection measures. However, meticulous programming and clear delineation of release parameters are necessary to address such instances effectively.
The solution has effectively lowered our overall cost of ownership for the web application firewall. Without the protective function of the firewall in place, issues are bound to increase. Therefore, it's crucial to configure it correctly to ensure that the internal intelligence can operate seamlessly with the application.
We opted not to utilize our cloud vendor's web application firewall since we have minimal cloud applications, primarily relying on those managed by CheckPoint. This decision is critical for securing our internal organization's work effectively.
We recently had a discussion about the challenge of API discovery and protection. There are occasions when it interfaces with other systems, leading to a loss of visibility. It would be advantageous to improve this aspect.
We have been working with it for two years.
The stability is commendable. Since implementation, we experienced only one interruption due to an update, which was promptly resolved.
The scalability is highly commendable, continually evolving in this aspect.
The technical support provided was excellent. Whenever we encountered complex configurations, we could easily engage with them for clear guidance, and the assistance provided was satisfactory. They demonstrate high effectiveness, and their response time is prompt. I would rate it nine out of ten.
The deployment model of CheckPoint relies on virtual machines, such as VMware, which are implemented within our internal infrastructure. The deployment process was quick, smooth, and intuitive, as it was transparent. For deployment, we engaged a reseller to facilitate communication between CheckPoint and our organization. Additionally, we utilized their administrative services for monitoring the implementation process.
In regard to ROI, I believe that its capacity to safeguard our organization's information is highly advantageous.
Considering all the benefits we've observed, we find the price to be satisfactory. While licenses were slightly more expensive previously, with the addition of more clients, it has proven to be reasonable.
We assessed several SaaS options alongside Check Point, and the primary distinguishing factor was the level of protection guaranteed by Check Point. Additionally, its maturity as a solution adds another layer of reliability.
Based on its effectiveness in safeguarding us from potential attacks and the value it has demonstrated, I would give it a perfect score of ten out of ten.