Try our new research platform with insights from 80,000+ expert users
Support at a security firm with 51-200 employees
User
Offers comprehensive security, helps with compliance, and has good monitoring
Pros and Cons
  • "The solution offers continuous security monitoring and alerting, which can help organizations detect and respond to security incidents in real time."
  • "One of the big problems we found in Check Point, in general, is the support."

What is our primary use case?

The importance and use of this product were required to improve new application deployments made in the Microsoft Azure cloud. They were not one hundred percent secure, however with this CloudGuard application security from Check Point has managed to improve all these requirements to obtain greater security.

The applications are generally internal to the company, however, they are secure thanks to Check Point CloudGuard.                                   

How has it helped my organization?

Check Point CloudGuard Application Security is a cloud-based security solution designed to protect web applications and APIs from various types of cyber threats.

This tool has managed to improve security considerably in our apps and the APIs created for the company. We have not presented problems, threats, or leaks even when some are exposed to the Internet and are more susceptible to attacks. The company is now more secure, thanks to Check Point.                                             

What is most valuable?

The solution is created one hundred percent on the cloud; the portal is easy to manage.

The solution offers continuous security monitoring and alerting, which can help organizations detect and respond to security incidents in real time.

CloudGuard Application Security provides comprehensive visibility into web applications and API traffic

The solution offers support for compliance regulations such as PCI-DSS, HIPAA, and GDPR, helping organizations to meet their regulatory obligations.

What needs improvement?

One of the big problems we found in Check Point, in general, is the support. It is always attended very late or they take a long time to answer.

The cost of this tool is extremely high, which is why it must be analyzed before implementing it.

The support language is only English. This causes some problems in Spanish-speaking countries. They could expand the languages offered to help the client.

Buyer's Guide
Check Point CloudGuard WAF
March 2025
Learn what your peers think about Check Point CloudGuard WAF. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,767 professionals have used our research since 2012.

For how long have I used the solution?

This excellent security tool, Check Point CloudGuard, has multi-cloud security and is also perfect for secure developments. It's been used in recent years by the company.

Which solution did I use previously and why did I switch?

Previously we did not use a technology like this.

Which other solutions did I evaluate?

We always carry out tests and validations before acquiring a solution.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro
Real User
Great security and more visibility but needs more AI capabilities
Pros and Cons
  • "It offers good functionality of the application that is currently running."
  • "I would like to be able to integrate the theme of Artificial Intelligence to help review issues and to monitor and view the security issue while also suggesting and interpreting and additionally configuring solutions - basically, acting as an interpreter."

What is our primary use case?

We have had the need to ensure the development of each of our applications based on the fact that the applications must be safe, fast, and efficient. We want to prevent an injection of a vulnerability attack by broken authentication, exposure of confidential data, or external entities that can inject us with xml services via broken access control. All these characteristics cause insecurity. We have looked for solutions that can guide us and establish a safe and concise baseline.

How has it helped my organization?

It has given us greater security at an organizational level. It has allowed us to use components with known vulnerabilities, which have been prevented based on their multiple databases that have correlated incidents, helping the development of applications to be fast, efficient, and safe, which is what we were looking for. Thus giving us the possibility to register, monitor, and identify technological insufficiencies or absent capacities in the development of the application.

What is most valuable?

Its most outstanding feature is the registry and the possibility of monitoring everything. When it comes to simplifying or establishing an error, an infraction, or a detection due to a breach of unauthorized access, it gives us an overview of each one of the capabilities and a segmented control over the development. It offers good functionality of the application that is currently running. It's giving us the ability to test based on vulnerable interfaces, and anomalous requests and responses. All these types of characteristics give us a reference point as to whether they are secure or insecure. We get logging monitoring and general visibility of the application.

What needs improvement?

The application allows us to have control over its activities, the management, and the interconnection of monitoring which takes advantage of computing power, is exceptional. That said, I would like to be able to integrate the theme of Artificial Intelligence to help review issues and to monitor and view the security issue while also suggesting and interpreting and additionally configuring solutions - basically, acting as an interpreter.

For how long have I used the solution?

We've used the solution for about six or seven months. That was when established applications at the cloud level.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point CloudGuard WAF
March 2025
Learn what your peers think about Check Point CloudGuard WAF. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,767 professionals have used our research since 2012.
reviewer2349423 - PeerSpot reviewer
CIO at a tech services company with 51-200 employees
Real User
Has AI feature which makes operations easy but technical support needs improvement
Pros and Cons
  • "The tool's most valuable feature is AI, which makes operations easier. Moreover, it is easy to deploy."
  • "I have encountered issues with Check Point CloudGuard Application Security's technical support. It also has missing configuration features."

What is our primary use case?

I use the solution for securing web applications. 

What is most valuable?

The tool's most valuable feature is AI, which makes operations easier. Moreover, it is easy to deploy. 

Securing web applications with Check Point CloudGuard Application Security is easy. The setup and configuration are easy compared to alternatives. It stands out for its simplicity. It does not rely on signatures, one of its unique features. 

The solution helps to reduce TCO. It minimizes the pressure. 

What needs improvement?

I have encountered issues with Check Point CloudGuard Application Security's technical support. It also has missing configuration features. 

How was the initial setup?

Check Point CloudGuard Application Security's deployment is easy. 

What's my experience with pricing, setup cost, and licensing?

Check Point CloudGuard Application Security's pricing is comparable to other products in the market. 

What other advice do I have?

The tool protects newer applications. It isn't very good when dealing with both applications. However, it is expected. I rate the overall product a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Download our free Check Point CloudGuard WAF Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2025
Buyer's Guide
Download our free Check Point CloudGuard WAF Report and get advice and tips from experienced pros sharing their opinions.