Project Manager-Cyber/Information Security at Lauren information technologies
Real User
Top 10
2024-10-17T13:08:00Z
Oct 17, 2024
We primarily use Check Point CloudGuard WAF for web application security. It protects applications from various threats and vulnerabilities like SQL injections, cross-site scripting issues, and cross-site request forgery. We ensure proper security policies and logs are maintained.
We were focused on mitigating malicious activity at the application level. We were searching for technology to help manage frequent traffic issues, which is why we decided to implement a WAF. Our main use case was to also address the security of APIs. Since we were using many APIs in our environment, we wanted a solution that could manage restrictions and throttling for these APIs effectively. The WAF allowed us to define objectives like throttling to control API usage. Additionally, we utilized the WAF to handle OWASP Top Ten vulnerabilities by creating rules to inspect incoming traffic from the internet to our internal infrastructure. Suspicious activities would be flagged and alerted as necessary. These features were key to our decision to implement the WAF in our last organization.
Sr network engineer at a outsourcing company with 10,001+ employees
Real User
Top 5
2024-07-12T07:42:00Z
Jul 12, 2024
Due to the nature of our business, we have heavily invested in backend API development, providing services exclusively through this interface. Similar to how banks and medical industries utilize data from centralized sources, our APIs cannot be exposed directly to the Internet. To safeguard these critical APIs, a robust security solution is essential. Check Point CloudGuard WAF fulfills this need by intercepting all incoming internet traffic, categorizing requests as legitimate or malicious, including attack details, and blocking suspicious activity at the initial stage. Only verified, non-malicious requests are permitted to interact with our APIs.
We have multiple cloud tenants, such as AWS and Azure, and we wanted to make sure we are secure. By implementing CloudGuard WAF, we wanted to avoid using the built-in WAF. We wanted to avoid using the WAFs built into our Azure or AWS products. We wanted to make sure that we were using something proven and secure.
Learn what your peers think about Check Point CloudGuard WAF. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Our primary use cases include enhancing security for web applications and APIs, optimizing resource utilization to reduce costs, and maximizing efficiency in log management for better insights and savings.
Network Enigner at a transportation company with 1-10 employees
Real User
Top 20
2024-03-14T16:43:00Z
Mar 14, 2024
We utilize Check Point CloudGuard to protect our Office 365 email system from phishing attempts, which were becoming increasingly common. Additionally, we rely on it to secure our usage of Microsoft Teams for collaboration, as well as for our SharePoint platform. Furthermore, we leverage CloudGuard Endpoint to safeguard our machines, particularly because many of our end users frequently travel abroad. This ensures that we have visibility into their activities and locations, allowing us to restrict access if necessary or provide remote assistance when needed.
CEO at a tech services company with 11-50 employees
Real User
Top 20
2024-03-07T19:29:00Z
Mar 7, 2024
We use AppSec. The primary use case was for our client's app. We did a successful project with the biggest university in Mexico. It was a big survey for all the former students. There were thousands of them, and it needed to be completed based on some specifications from the security team.
Account Manager at a tech vendor with 11-50 employees
Reseller
Top 5
2024-02-22T14:34:00Z
Feb 22, 2024
Check Point CloudGuard WAF can be used in various scenarios, including on-premises and cloud deployments. It integrates well with other platforms like Fortinet and can be managed through a centralized console. It is suitable for multi-cloud environments, including Google Cloud Platform and Azure. Additionally, Check Point AppSec can be used alongside CloudGuard WAF for comprehensive application security.
It's our cloud security tool for management solutions. We have tenants on the web portal and other systems, which are part of the POC activity. We haven't bought it; they just put it on the computer today.
The importance and use of this product were required to improve new application deployments made in the Microsoft Azure cloud. They were not one hundred percent secure, however with this CloudGuard application security from Check Point has managed to improve all these requirements to obtain greater security. The applications are generally internal to the company, however, they are secure thanks to Check Point CloudGuard.
Check Point CloudGuard Application Security adds additional security to cloud-connected devices. It's one of the most robust products on the market, and that is why we decided to implement it at our company. To properly utilize Azure’s cloud resources, our team needed a way to ensure secure access. As a result, they chose Microsoft’s cloud security tools. These included creating firewall rules and compliance with company policies. Additionally, devices and users that connect to Azure would also use the tools to apply security posture controls.
Check Point CloudGuard Application Security is one of the most robust tools on the market. For that reason, we decided to implement it in our company. All our operations were migrated to the Azure cloud area, where we maintain a large part of our load. We needed a tool that offered us the security of keeping all assets safe. The APIs that we have integrated into our systems could also provide protection and restrict all malware attacks in our environment, preventing us from dealing with all kinds of vulnerabilities.
Cloud Engineer at IT Quest Solutions|interglobalmsp
User
Top 5
2022-12-17T20:27:00Z
Dec 17, 2022
We currently have our infrastructure in the Azure cloud, and we need a tool to help us with the firewall functionality to protect the environment from vulnerabilities. This is one of the features that Check Point CloudGuard Network Security complies with. We also use the logs to see all the traffic entering the organization's perimeter network. This has given us a great breadth of being able to view it since previously we could not see these records clearly and in detail. With this solution, we can see where our collaborators are entering from and be able to provide security to their mobile devices.
This security management system allows teams to evaluate the performance of applications and identify vulnerabilities that could affect performance. It has deployed reliable security measures that can easily detect any potential data leaks and cyber-attacks. Before we develop any application Check Point CloudGuard Application Security provides the best data protection tools that be configured easily with the new application. We have been able to scale down workflows and monitor appropriately the entire production ecosystem.
We have had the need to ensure the development of each of our applications based on the fact that the applications must be safe, fast, and efficient. We want to prevent an injection of a vulnerability attack by broken authentication, exposure of confidential data, or external entities that can inject us with xml services via broken access control. All these characteristics cause insecurity. We have looked for solutions that can guide us and establish a safe and concise baseline.
Senior Manager at Agriculture Skill Council of India (ASCI)
User
2022-10-03T15:21:00Z
Oct 3, 2022
Check Point CloudGuard Application Security enabled us to develop strength and process efficiency coupled with a secure environment in the IT system. We've installed software all over 3rd party dashboards and internet systems. This application security platform helped us put a strong security system in place with an advanced bot prevention system, ensuring end-to-end security across a complete chain of processes. Our cost of the security system was greatly reduced, and it helped us to achieve cost efficiency within six months.
We had the need to protect the computers in the cloud that we were migrating, giving them greater security and having control over the events and tasks that they execute. This need led us to have and search for a solution that would support us directly with containers and the security of our access APIs. Above all, we needed something that would give us added value when implementing, and that was where we came to use Check Point AppSec. Its main value and what we liked the most is its powerful AI.
Check Point CloudGuard Application Security is the one-stop solution for the security of applications and providing API protection to servers and facilities 24/7. The security of API integrations is the need of the hour for all kinds of businesses. All the workloads and cloud servers are singularly managed through a unified security mechanism, which ensures round-the-clock protection of applications and servers from endpoints and malware threats. For our organization, it plays a critical role in easy deployment and API integration with all kinds of cloud servers and platforms of external stakeholders.
Check Point CloudGuard Application Security is a one-stop unified solution for securing workloads and IT assets most efficiently. The Web Application Firewalls of this solution are designed in a most customizable and advanced manner, which suits different requirements in an effortless way. Also, all APIs integrated with our IT system are completely prevented and secured by this product. It helps restrict malware attacks on our APIs and enables the blacking of any malware and phishing elements in the system. One of the highly versatile and deployable products for any kind of IT security.
Cloud Support at a tech company with 51-200 employees
User
2022-06-19T22:55:00Z
Jun 19, 2022
In our public cloud infrastructure, in this case, Microsoft Azure, we have carried out this implementation to be able to integrate CloudGuard application security through the Check Point Infinity Portal, since it was important to have a WAF of Check Point quality, its guarantee of zero false positives. It is something that helps to have total confidence in this tool, generating OWASP Top 10 protection, in addition to AI protection in our infrastructure. Everything is centralized under Check Point Infinity and is quite good. We are able to have a broad protection scheme from the same place.
Check Point CloudGuard WAF (Web Application Firewall) is a cloud-native security solution designed to protect web applications and APIs from known and unknown threats. It employs contextual AI and machine learning to prevent zero-day attacks without relying on traditional signature-based detection methods, ensuring that applications remain secure even as new threats emerge.
CloudGuard WAF offers preemptive protection against vulnerabilities by using machine learning to identify and block...
We primarily use Check Point CloudGuard WAF for web application security. It protects applications from various threats and vulnerabilities like SQL injections, cross-site scripting issues, and cross-site request forgery. We ensure proper security policies and logs are maintained.
We were focused on mitigating malicious activity at the application level. We were searching for technology to help manage frequent traffic issues, which is why we decided to implement a WAF. Our main use case was to also address the security of APIs. Since we were using many APIs in our environment, we wanted a solution that could manage restrictions and throttling for these APIs effectively. The WAF allowed us to define objectives like throttling to control API usage. Additionally, we utilized the WAF to handle OWASP Top Ten vulnerabilities by creating rules to inspect incoming traffic from the internet to our internal infrastructure. Suspicious activities would be flagged and alerted as necessary. These features were key to our decision to implement the WAF in our last organization.
Due to the nature of our business, we have heavily invested in backend API development, providing services exclusively through this interface. Similar to how banks and medical industries utilize data from centralized sources, our APIs cannot be exposed directly to the Internet. To safeguard these critical APIs, a robust security solution is essential. Check Point CloudGuard WAF fulfills this need by intercepting all incoming internet traffic, categorizing requests as legitimate or malicious, including attack details, and blocking suspicious activity at the initial stage. Only verified, non-malicious requests are permitted to interact with our APIs.
We use CloudGuard WAF to fully secure our end applications and the end-user personal information.
We have multiple cloud tenants, such as AWS and Azure, and we wanted to make sure we are secure. By implementing CloudGuard WAF, we wanted to avoid using the built-in WAF. We wanted to avoid using the WAFs built into our Azure or AWS products. We wanted to make sure that we were using something proven and secure.
With CloudGuard WAF, I can deploy a cloud-based network protection solution that secures my applications, endpoints, and data.
Our primary use cases include enhancing security for web applications and APIs, optimizing resource utilization to reduce costs, and maximizing efficiency in log management for better insights and savings.
We utilize Check Point CloudGuard to protect our Office 365 email system from phishing attempts, which were becoming increasingly common. Additionally, we rely on it to secure our usage of Microsoft Teams for collaboration, as well as for our SharePoint platform. Furthermore, we leverage CloudGuard Endpoint to safeguard our machines, particularly because many of our end users frequently travel abroad. This ensures that we have visibility into their activities and locations, allowing us to restrict access if necessary or provide remote assistance when needed.
We use AppSec. The primary use case was for our client's app. We did a successful project with the biggest university in Mexico. It was a big survey for all the former students. There were thousands of them, and it needed to be completed based on some specifications from the security team.
We implement it to protect applications and APIs across multi-cloud environments.
We use the product to access the internet internally. It helps us to block unnecessary networks.
Check Point CloudGuard WAF can be used in various scenarios, including on-premises and cloud deployments. It integrates well with other platforms like Fortinet and can be managed through a centralized console. It is suitable for multi-cloud environments, including Google Cloud Platform and Azure. Additionally, Check Point AppSec can be used alongside CloudGuard WAF for comprehensive application security.
It's our cloud security tool for management solutions. We have tenants on the web portal and other systems, which are part of the POC activity. We haven't bought it; they just put it on the computer today.
Check Point CloudGuard Application Security helps us ensure the security of contact devices and meet audit requirements for compliance.
The importance and use of this product were required to improve new application deployments made in the Microsoft Azure cloud. They were not one hundred percent secure, however with this CloudGuard application security from Check Point has managed to improve all these requirements to obtain greater security. The applications are generally internal to the company, however, they are secure thanks to Check Point CloudGuard.
Check Point CloudGuard Application Security adds additional security to cloud-connected devices. It's one of the most robust products on the market, and that is why we decided to implement it at our company. To properly utilize Azure’s cloud resources, our team needed a way to ensure secure access. As a result, they chose Microsoft’s cloud security tools. These included creating firewall rules and compliance with company policies. Additionally, devices and users that connect to Azure would also use the tools to apply security posture controls.
Check Point CloudGuard Application Security is one of the most robust tools on the market. For that reason, we decided to implement it in our company. All our operations were migrated to the Azure cloud area, where we maintain a large part of our load. We needed a tool that offered us the security of keeping all assets safe. The APIs that we have integrated into our systems could also provide protection and restrict all malware attacks in our environment, preventing us from dealing with all kinds of vulnerabilities.
We currently have our infrastructure in the Azure cloud, and we need a tool to help us with the firewall functionality to protect the environment from vulnerabilities. This is one of the features that Check Point CloudGuard Network Security complies with. We also use the logs to see all the traffic entering the organization's perimeter network. This has given us a great breadth of being able to view it since previously we could not see these records clearly and in detail. With this solution, we can see where our collaborators are entering from and be able to provide security to their mobile devices.
This security management system allows teams to evaluate the performance of applications and identify vulnerabilities that could affect performance. It has deployed reliable security measures that can easily detect any potential data leaks and cyber-attacks. Before we develop any application Check Point CloudGuard Application Security provides the best data protection tools that be configured easily with the new application. We have been able to scale down workflows and monitor appropriately the entire production ecosystem.
We have had the need to ensure the development of each of our applications based on the fact that the applications must be safe, fast, and efficient. We want to prevent an injection of a vulnerability attack by broken authentication, exposure of confidential data, or external entities that can inject us with xml services via broken access control. All these characteristics cause insecurity. We have looked for solutions that can guide us and establish a safe and concise baseline.
Check Point CloudGuard Application Security enabled us to develop strength and process efficiency coupled with a secure environment in the IT system. We've installed software all over 3rd party dashboards and internet systems. This application security platform helped us put a strong security system in place with an advanced bot prevention system, ensuring end-to-end security across a complete chain of processes. Our cost of the security system was greatly reduced, and it helped us to achieve cost efficiency within six months.
We had the need to protect the computers in the cloud that we were migrating, giving them greater security and having control over the events and tasks that they execute. This need led us to have and search for a solution that would support us directly with containers and the security of our access APIs. Above all, we needed something that would give us added value when implementing, and that was where we came to use Check Point AppSec. Its main value and what we liked the most is its powerful AI.
Check Point CloudGuard Application Security is the one-stop solution for the security of applications and providing API protection to servers and facilities 24/7. The security of API integrations is the need of the hour for all kinds of businesses. All the workloads and cloud servers are singularly managed through a unified security mechanism, which ensures round-the-clock protection of applications and servers from endpoints and malware threats. For our organization, it plays a critical role in easy deployment and API integration with all kinds of cloud servers and platforms of external stakeholders.
Check Point CloudGuard Application Security is a one-stop unified solution for securing workloads and IT assets most efficiently. The Web Application Firewalls of this solution are designed in a most customizable and advanced manner, which suits different requirements in an effortless way. Also, all APIs integrated with our IT system are completely prevented and secured by this product. It helps restrict malware attacks on our APIs and enables the blacking of any malware and phishing elements in the system. One of the highly versatile and deployable products for any kind of IT security.
In our public cloud infrastructure, in this case, Microsoft Azure, we have carried out this implementation to be able to integrate CloudGuard application security through the Check Point Infinity Portal, since it was important to have a WAF of Check Point quality, its guarantee of zero false positives. It is something that helps to have total confidence in this tool, generating OWASP Top 10 protection, in addition to AI protection in our infrastructure. Everything is centralized under Check Point Infinity and is quite good. We are able to have a broad protection scheme from the same place.