Director of Security EngineerIng at a financial services firm with 5,001-10,000 employees
Real User
Top 20
2024-03-15T13:43:00Z
Mar 15, 2024
We have had a number of real events where developers accidentally made commits of API keys, and we were able to detect and begin response actions in minutes. We had the API key revoked in less than five minutes in such events.
Knowing what measures we must take allows us to reduce costs associated with security in the cloud by providing early identification of a risk or a possible security breach.
Learn what your peers think about Check Point CloudGuard Code Security. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
Cloud Support at a tech company with 51-200 employees
User
2022-06-19T01:36:00Z
Jun 19, 2022
Being able to check different languages in different data centers or public clouds generates great confidence in the environment that can be checked, which has been very useful for the company.
Check Point CloudGuard Code Security enhances application and site security in Microsoft Azure, detecting vulnerabilities, preventing breaches, and safeguarding against malicious activities while ensuring compliance and improving code quality.
Check Point CloudGuard Code Security, designed for cloud and on-premise environments, scans applications configurations, detects exposed credentials, and aligns with legal frameworks. It offers simple implementation, centralized management,...
We have had a number of real events where developers accidentally made commits of API keys, and we were able to detect and begin response actions in minutes. We had the API key revoked in less than five minutes in such events.
We have a strong sense of security assurance when utilizing CloudGuard, as it consistently delivers outstanding protection capabilities.
Having a cloud detection response helps to very quickly identify security threats in our environment.
Compared to what we used before, it's helping us to be more efficient in managing our traffic.
Knowing what measures we must take allows us to reduce costs associated with security in the cloud by providing early identification of a risk or a possible security breach.
Its fastest and most outstanding characteristic is ensuring a development line that will not lead to applying applications or code development.
It maintains very effective monitoring since it has a very fast and updated database, resulting in new vulnerabilities being caught quickly.
The data center security system has provided real-time analytics on performance and data configuration processes.
You can maintain a legal framework structure at all times.
The implementation of this tool for security management and control is very simple.
Being able to check different languages in different data centers or public clouds generates great confidence in the environment that can be checked, which has been very useful for the company.