Learn what your peers think about Check Point CloudGuard CNAPP. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
Deputy Manager at Computer Age Management Services Pvt. Ltd.
Real User
Top 10
2024-01-23T10:15:00Z
Jan 23, 2024
We like the GSL Builder feature. When you're running a security operations center, you spend a lot of time monitoring endpoint activity to ensure there is no malicious traffic or anonymous access in the environment. The GSL Builder is helpful for deep investigations of a particular reason for an incident. You can use it to get more information.
The most valuable features are the ability to create pipeline rules, the enhanced NetOps security, and the deep visibility across our entire infrastructure.
It learns from behavior, attacks, management, detections, captures packets, real-time analysis, et cetera. It's generating knowledge from a variety of sources for an excellent analysis.
Check Point CloudGuard CNAPP is a cloud-native application protection platform designed to secure your cloud environments and applications. By combining CSPM, CWPP, CSNS, and WAF capabilities, it provides a comprehensive solution to protect your cloud environment from a wide range of threats.
CloudGuard CNAPP delivers end-to-end cloud security, including workload protection, vulnerability management, and identity management, all while maintaining continuous compliance. It uses advanced...
The new scanning function is a valuable feature that wasn't available until recently.
Cloud security posture management is the feature we've been using the longest.
The most valuable features of CloudGuard CNAPP are its reporting capabilities for aggregating vulnerability information and scoring.
The most valuable features of CloudGuard CNAPP are its compliance engine and auto-remediation features.
It offers a range of features tailored to address the unique security challenges.
We know the vulnerability in advance, so we can take some action for that vulnerability.
The most valuable feature is the ability to work with the APIs to integrate into our own backend systems.
The various CNAPP modules have granted more visibility of our cloud applications to our system engineers and developers.
We like the GSL Builder feature. When you're running a security operations center, you spend a lot of time monitoring endpoint activity to ensure there is no malicious traffic or anonymous access in the environment. The GSL Builder is helpful for deep investigations of a particular reason for an incident. You can use it to get more information.
The most valuable features are the ability to create pipeline rules, the enhanced NetOps security, and the deep visibility across our entire infrastructure.
The most valuable feature is the ability to apply common tools across all accounts.
I can take proactive actions based on an alert without having to interact with the platform directly.
Overall, it provides good security.
The product enables us to check the information that goes out of the company.
The solution is scalable.
This platform has allowed us to collect data from multiple sources, centralizing everything under a single source.
The comprehensive security for IaaS and PaaS cloud assets provides efficient security awareness to all the teams.
It provides critical insights that enable the IT team to plan and launch smart investigations when there are security breaches.
It presents a real-time database that is always updated.
The easy administration of the portal and the installation are very easy.
It learns from behavior, attacks, management, detections, captures packets, real-time analysis, et cetera. It's generating knowledge from a variety of sources for an excellent analysis.
The system has deployed security tools to enhance effective investigations in the entire company networking system.
This solution provides threat prevention and detection of anomalies automatically and investigates the activity of each one of them.
The CloudGuard for Cloud Intelligence tool has several significant features that provide security to our company.
Its monitoring and alerts are triggered by a failure or non-compliance with policies. It helps us to be able to act effectively and quickly.
After the implementation, we have seen several vulnerabilities that previously were not visible.