Listing Thumbnail

    CloudGuard CNAPP

     Info
    Free Trial
    CloudGuard Cloud-Native Application Protection Platform (CNAPP) offers industry-leading posture management, workload protection, and security automation throughout the software development lifecycle-from code to cloud. CloudGuard integrates with AWS natively, enhancing visibility by enriching context, provides actionable remediation insights, and speeds up threat mitigation across the software development lifecycle

    Overview

    CloudGuard Cloud-Native Application Protection Platform (CNAPP) offers industry-leading posture management, workload protection, and security automation throughout the software development lifecycle-from code to cloud. CloudGuard integrates with AWS natively, enhancing visibility by enriching context, provides actionable remediation insights, and speeds up threat mitigation across the software development lifecycle.

    https://www.checkpoint.com/cloudguard/cnapp/ 

    CloudGuard CNAPP provides intelligent risk prioritization, agentless scanning, entitlement management, and pipeline security capabilities--delivering more context, actionable security, and smarter prevention.

    CloudGuard CNAPP features:

    • Security posture management, cloud compliance automation, and policy orchestration
    • Auto-remediation of dangerous misconfigurations and threats
    • Advanced cloud security intelligence with real-time monitoring, simplified traffic visualization, and analytics
    • Cloud Infrastructure Entitlement Management (CIEM) to understand permissions and enforce least privilege across AWS
    • Agentless scanning for deep visibility and runtime workload protection across containers, serverless, and virtual machines
    • Pipeline security to shift security left, as well as detect and fix misconfigurations, secrets, and vulnerabilities in CloudFormation, Kubernetes, and other IaC templates early in the pipeline
    • Effective Risk Management (ERM) to prioritize risks and provide actionable remediation guidance based on full context including workload posture, network exposure, identity permissions, attack path analysis, and the application business value
    • 24/7 monitoring and auto-reversion of unauthorized modifications
    • Automated Compliance and Governance

    Highlights

    • More Context. Deeper visibility from code to cloud across configurations, identities, vulnerabilities, network exposure and real time security monitoring
    • Actionable Security. Intelligently prioritize critical risks based on contextual analysis of all elements to focus on the threats that matter most
    • Smarter Prevention. Prevent risks early in the dev pipeline, or stop them in production, while providing actionable remediation guidance for misconfigurations and permissions

    Details

    Delivery method

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.

    CloudGuard CNAPP

     Info
    Pricing is based on contract duration. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.

    1-month contract (3)

     Info
    Dimension
    Description
    Cost/month
    CP-CGD9-CNP-100
    CloudGuard CNAPP Compliance & Network Security, 100 Assets
    $2,235.00
    CP-CGD9-CNX-100
    CloudGuard CNAPP Compliance, Network Sec. & IAM Safety, 100 Assets
    $2,925.00
    CP-CGD9-CNP-25
    CloudGuard CNAPP Compliance & Network Security, 25 Assets
    $625.00

    Vendor refund policy

    No Refunds available.

    Custom pricing options

    Find a fit for enterprise or unique needs with a private offer.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    https://supportcenter.checkpoint.com/supportcenter/portal  24x7 email support with emergency phone number. Premier support available for enterprise customers.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By Check Point Software Technologies

    Accolades

     Info
    Top
    100
    In Network Infrastructure
    Top
    10
    In Container Workloads
    Top
    25
    In Monitoring, Application Development

    Customer reviews

     Info
    AI generated sentiment from actual customer reviews on AWS and G2
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Posture Management
    Security posture management, cloud compliance automation, and policy orchestration
    Workload Protection
    Agentless scanning for deep visibility and runtime workload protection across containers, serverless, and virtual machines
    Security Automation
    Pipeline security to shift security left, as well as detect and fix misconfigurations, secrets, and vulnerabilities in CloudFormation, Kubernetes, and other IaC templates early in the pipeline
    Risk Prioritization
    Effective Risk Management (ERM) to prioritize risks and provide actionable remediation guidance based on full context including workload posture, network exposure, identity permissions, attack path analysis, and the application business value
    Visibility and Monitoring
    Advanced cloud security intelligence with real-time monitoring, simplified traffic visualization, and analytics
    End-to-End Software Supply Chain Security
    Protect your AWS build and artifact pipelines from risks associated with third-party artifacts, open-source dependencies, and malicious actors targeting developer tools and environments. Gen-AI advanced code scanning technology to identify and mitigate unsafe use of LLM in application code.
    Robust Runtime Protection
    Prevent configuration drift, ensure immutability, and precisely block attacks across virtual machines (VMs), containers, and serverless workloads running on Amazon ECS, Amazon EKS, AWS Lambda, AWS Fargate, and AWS Graviton using real-time behavioral detection. Runtime protection capabilities actively monitor LLM-powered application workloads and prevent unauthorized actions that LLMs might attempt.
    Unified Platform for Full Lifecycle Security
    The most comprehensive, fully integrated CNAPP to monitor, prioritize, and mitigate security risks across the entire SDLC, stopping critical threats and attacks in real time.
    Vulnerability Scanning
    Detect, prioritize, and remediate misconfigurations and other security risks in your AWS cloud accounts while contextualizing risks with a unified view across your AWS infrastructure and running workloads.
    OWASP Top 10 Vulnerability Remediation
    Ensure secure application development and runtime protection by addressing OWASP Top 10 vulnerabilities for LLM applications. Identify and mitigate unsafe LLM use, runtime protection to detect and remediate LLM-related issues, GenAI assurance policies to ensure safe usage of LLM-powered applications.
    Agentless Cloud Security
    Provides deep and wide visibility into the cloud environment without requiring agents using patented SideScanning™ technology
    Risk Prioritization
    Applies a granular risk score to each alert and recognizes when seemingly unrelated issues can be combined to create dangerous attack paths
    Full SDLC Security
    Seamlessly integrates into the CI/CD process to secure applications from code to cloud and back
    AI-Powered
    Leverages Generative AI for simplified investigations and accelerated remediation, reducing required skill levels and saving time and effort
    Unified CNAPP Platform
    Unifies various security solutions including CSPM, CWPP, CIEM, DSPM, Container security, API security, AI-SPM in a single platform

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    No security profile
    -
    -
    -
    -
    -
    -
    -

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    286 external reviews
    External reviews are sourced from G2  and are not included in the star rating for this product.
    Computer & Network Security

    Perfect tool for the Cloud network security

    Reviewed on Nov 13, 2024
    Review provided by G2
    What do you like best about the product?
    I would say we had average experience using this cloud native application protection tool for our few cloud based projects
    Features of this tool perticular ly threats detection and prevention for the Cloud application.
    Ene to end security features is what outstand from other CNAPP applications.
    What do you dislike about the product?
    Not used extensively so couldn't incounter downside or nothing as to say dislikes about this CNAPP
    What problems is the product solving and how is that benefiting you?
    We got benefitted from this tool in terms of Cloud container protection and security.
    Computer & Network Security

    Perfect tool for the Cloud network security

    Reviewed on Nov 13, 2024
    Review provided by G2
    What do you like best about the product?
    I would say we had average experience using this cloud native application protection tool for our few cloud based projects
    Features of this tool perticular ly threats detection and prevention for the Cloud application.
    Ene to end security features is what outstand from other CNAPP applications.
    What do you dislike about the product?
    Not used extensively so couldn't incounter downside or nothing as to say dislikes about this CNAPP
    What problems is the product solving and how is that benefiting you?
    We got benefitted from this tool in terms of Cloud container protection and security.
    Computer & Network Security

    Excellent and Robust tool CNAPP

    Reviewed on Nov 09, 2024
    Review provided by G2
    What do you like best about the product?
    First thing to highlight about this tool and that has also impressed me is it's easy to installation and integration and set up.
    Till now what I have experienced is amazing. Talking and highlighting about the best features or things I personally liked about this tool is it's features about protecting and prevention of our cloud based SFDC lifecycle.
    Zero trust refrence architecture is one of them security feature.
    What do you dislike about the product?
    Nothing as such to be highlight but overall impressive tool for cloud code review
    What problems is the product solving and how is that benefiting you?
    To answer this question,Our business or company got benefitted with Cloud Data Security and compliance issues about data.
    Jackson W.

    Trusted threat prevention protocol

    Reviewed on Sep 20, 2024
    Review provided by G2
    What do you like best about the product?
    This is the most efficient platform that keeps our cloud hosted applications secure. It has wide threat coverage infrastructure that detects any form of ransomware attacks in advance. It is easy to setup and integrate with technical security tools in the enterprise.
    What do you dislike about the product?
    We have not encountered malware attacks since we deployed Check Point CloudGuard CNAPP.
    What problems is the product solving and how is that benefiting you?
    It enables us to safeguard cloud data from insecure and untrusted sources. The powerful security models keeps network traffic safe from all forms of vulnerabilities.
    Jackson W.

    Trusted threat prevention protocol

    Reviewed on Sep 20, 2024
    Review provided by G2
    What do you like best about the product?
    This is the most efficient platform that keeps our cloud hosted applications secure. It has wide threat coverage infrastructure that detects any form of ransomware attacks in advance. It is easy to setup and integrate with technical security tools in the enterprise.
    What do you dislike about the product?
    We have not encountered malware attacks since we deployed Check Point CloudGuard CNAPP.
    What problems is the product solving and how is that benefiting you?
    It enables us to safeguard cloud data from insecure and untrusted sources. The powerful security models keeps network traffic safe from all forms of vulnerabilities.
    View all reviews