Try our new research platform with insights from 80,000+ expert users

Check Point CloudGuard CNAPP vs Imperva Data Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point CloudGuard CNAPP
Ranking in Data Security Posture Management (DSPM)
4th
Average Rating
8.6
Reviews Sentiment
7.4
Number of Reviews
71
Ranking in other categories
Vulnerability Management (9th), Cloud and Data Center Security (9th), Container Security (7th), Cloud Workload Protection Platforms (CWPP) (6th), Cloud Security Posture Management (CSPM) (5th), Cloud-Native Application Protection Platforms (CNAPP) (5th), Compliance Management (6th)
Imperva Data Security
Ranking in Data Security Posture Management (DSPM)
13th
Average Rating
8.6
Reviews Sentiment
7.6
Number of Reviews
4
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2025, in the Data Security Posture Management (DSPM) category, the mindshare of Check Point CloudGuard CNAPP is 3.7%, down from 4.1% compared to the previous year. The mindshare of Imperva Data Security is 1.4%, up from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Data Security Posture Management (DSPM)
 

Featured Reviews

Bart Coddens - PeerSpot reviewer
Evolved cloud security with active monitoring but needs interface consistency
The user interface needs work. Sometimes, it is a transition from the old tool to the new CNAPP Two that I currently have, and remnants of the old environment can still be detected. I require consistency in the user interface to ensure everything is streamlined into the same look and feel. More work is needed in fine-tuning the threat data towards your CSPM and activity logs, aligning them with business intelligence, which requires a cohesive console interface. My assessment of CloudGuard CDRs in intrusion detection and threat hunting capabilities is that it still needs some work. All the threat data that comes in, you need to fine tune it a bit.
Samuel Adeyemi - PeerSpot reviewer
Real-time data monitoring and policy-based activity blocking enhance security and awareness
The development mode on the platform needs improvement. For example, the archiving functionalities should be enhanced to allow easy conversion of archived logs into CSV or Excel formats for data analysis. When I need to investigate with archived data, the inability to export to these formats can be limiting. Making this process easier would be beneficial for reviews.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We like the GSL Builder feature. When you're running a security operations center, you spend a lot of time monitoring endpoint activity to ensure there is no malicious traffic or anonymous access in the environment. The GSL Builder is helpful for deep investigations of a particular reason for an incident. You can use it to get more information."
"The product enables us to check the information that goes out of the company."
"Good interface and visibility."
"The most valuable features of CloudGuard CNAPP are its reporting capabilities for aggregating vulnerability information and scoring."
"We like the ability to investigate, analyze, and generate reports."
"We know the vulnerability in advance, so we can take some action for that vulnerability."
"The most valuable feature is the single dashboard that enables us to manage the entire cloud environment from one place."
"The most valuable feature is the separate environment."
"If something malicious occurs, I can set a policy to block it, review the action, and decide whether to release it if it's found not to be malicious."
"The benefits are operational. The outcome comes from preventing an attack on the organization. On the operational side, you generally have good, decent security measures for your application, database, and digital assets."
"I recommend the product to other users."
"The time to detect vulnerabilities has gotten a lot quicker."
"The most valuable features include a great level of automation, machine learning for attack validation, and a very flexible and comfortable management console."
 

Cons

"I would appreciate a way to receive periodic updates, like through email. I am the kind of person who likes to receive data passively."
"Improvements can be made to the user interface."
"The biggest thing is the documentation aspect of Dome9 is a little lacking. They were purchased by Check Point about a year and a half to two years ago. When they integrated into Check Point's support system, a lot of the documentation that they had previously got mangled in the transition, e.g., linking to stuff on the Dome9 website that no longer exists. There are still a lot of spaces with incomplete links and stuff that is not as fully explained as it could be."
"The impact analysis that they perform can be improved. It is currently lacking. It should be more detailed."
"It does not support on-premise deployments such as VMware Tanzu, and this has been a major drawback when it comes to integrations with some applications."
"Scalability, particularly in workload protection, is an area that needs improvement."
"I am not a technical person, but generically, the user interface can be a little more intuitive. Our staff has trained network security and cloud security professionals, and they get it, but when you are trying to get to the customers to be able to pick it up and maintain it, it can be a bit difficult."
"We were demotivated by the lack of native automation modules for the Terraform and Ansible tools."
"The development mode on the platform needs improvement. For example, the archiving functionalities should be enhanced to allow easy conversion of archived logs into CSV or Excel formats for data analysis."
"The deployment is not easy."
"The development mode on the platform needs improvement."
"Imperva Data Security needs to improve first-level support."
"One area for improvement is the inclusion of a load balancer in on-premises solutions."
 

Pricing and Cost Advice

"It is a very straightforward licensing model that is based on the number of assets you are discovering and managing with the solution."
"The solution’s pricing is a little bit high."
"I would advise taking into account the existing number of devices and add a forecast of the number of devices to be added in the coming year or two, to obtain better pricing."
"The tool's pricing is moderate. Its licensing costs are yearly."
"Licensing and costs are straightforward, as they have a baseline of 100 workloads within one license and no additional charges."
"We have the enterprise-level license and we renew it annually because it is worth the cost."
"Its price is very fair."
"The pricing is extremely competitive."
"The pricing is reasonably good in South Africa."
report
Use our free recommendation engine to learn which Data Security Posture Management (DSPM) solutions are best for your needs.
845,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
14%
Manufacturing Company
9%
University
6%
University
14%
Financial Services Firm
14%
Computer Software Company
13%
Energy/Utilities Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Imperva Data Security?
The price is high, but it is not as high as competitors like IBM, Guardian, and Oracle. It cannot be considered low-priced.
What needs improvement with Imperva Data Security?
The development mode on the platform needs improvement. For example, the archiving functionalities should be enhanced to allow easy conversion of archived logs into CSV or Excel formats for data an...
What is your primary use case for Imperva Data Security?
We onboard databases with Imperva Data Security. I can put its policies around the environment I want to monitor. I can see it actually works if I want to prevent certain activities.
 

Also Known As

Check Point CloudGuard Posture Management, Dome9, Check Point CloudGuard Workload Protection, Check Point CloudGuard Intelligence
No data available
 

Overview

 

Sample Customers

Symantec, Citrix, Car and Driver, Virgin, Cloud Technology Partners
Information Not Available
Find out what your peers are saying about Check Point CloudGuard CNAPP vs. Imperva Data Security and other solutions. Updated: March 2025.
845,406 professionals have used our research since 2012.