Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

CloudGuard Network Security All-In-One

Check Point Software Technologies | R81-392.1526

Linux/Unix, Other Gaia 3.10 - 64-bit Amazon Machine Image (AMI)

Reviews from AWS Marketplace

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

102 reviews
from G2

External reviews are not included in the AWS star rating for the product.


    Financial Services

an amazing network security tool for cross platform environments

  • April 23, 2024
  • Review verified by G2

What do you like best about the product?
first and most impoertant advantage of cloud gaurd network security is that it is a cross platform tool and can greatly help us to keep a track of the security standards by filtering the malicious traffic
it comes with a very clean and neat user Interface.
the threat engine works so good.
it comes with sufficient built in filters to search for specific kind of traffic
traffic explorer helps in easier understanding of the network .
custom notification can be set
easy to integrate
easy to implement
What do you dislike about the product?
one can only get cloud trail and VPC logs.
using terraform to manage security policies can be tricky at times and might need to be reviewed to ensure objecte are created as per the expectation, these are not logged to ensure terraform state and the checkpoint databases are in sync with eachother.
What problems is the product solving and how is that benefiting you?
unlike native services specific to provider cloudgaurd provides cross platform support meaning that i can still get overall security of the cloud environments across the various proiders from a single dashboard and CloudGuard Network Security provides inspection throughout many parts of the cloud network.
Inspection of traffic from the internet to a VPC and from VPC to the internet .
inspects the traffic between VPCs
Inspeciton between VPCs and on-prem
IPS fuctionalities
Detailed traffic logging
identity based access


    Sai K.

Advanced Threat Intelligence Engine feature

  • April 23, 2024
  • Review verified by G2

What do you like best about the product?
It has a advanced features of Threat Intelligence engine which can detect and prevent the malicious and anomaly IP address.
It has having the customized intelligence rulesets to detect our organization use cases.
What do you dislike about the product?
The custom policy is not supported on Threat intelligence engine.
What problems is the product solving and how is that benefiting you?
It helps us to cover the complete Threat Intell monitoring on our applications.


    Amohan S.

Advanced Intelligence Module for Cloud

  • April 23, 2024
  • Review verified by G2

What do you like best about the product?
It provides more features to secure and monitor our application networks, like VPV logs monitoring, User Account Activity monitoring, Pod to Pod communication on kubernetes clusters,etc. I like the feature of Graphical presentation of Captured logs.
What do you dislike about the product?
This features only supported on VPC & Account Activity logs.
The Graphical presentation will be supported on limited number of traffics only.
What problems is the product solving and how is that benefiting you?
The network security solution help us to continuously monitor our application networks and prevent any anomaly behaviour happens on our networks.


    Harish M.

Thread Intelligence for Cloud Network logs

  • April 16, 2024
  • Review verified by G2

What do you like best about the product?
It having the anomaly Threat Intelligence Engine to detect our network inbound and outbound traffics effectively.
The engine having some predefined rulesets to address the runtime protection of our cloud environments.
It has supported the cluster pod to pod network communication as well.
What do you dislike about the product?
The module will be supported on Network VPC and user activity logs.
The engine will not supported to run the specific rulesets to assess.
What problems is the product solving and how is that benefiting you?
With the help of CloudGuard Network Security we continuously monitoring network and user activity logs on our cloud environments.
We have configured custom usecases to find malicious activity.


    Amohan S.

Amazing Threat Intel module for Cloud Application logs

  • April 05, 2024
  • Review verified by G2

What do you like best about the product?
The network module covers completely on console user activity logs and Vpc network logs. The additional features of gsl query will help us to easily identify and we can able to find the customized details of events.
What do you dislike about the product?
It will supports only on activity and vpc logs.
Log retention period is very low
What problems is the product solving and how is that benefiting you?
From the help of this module we reducing the malicious traffics from attackers. We can able to monitor the live traffics on continuously


    Muni D.

probably one of the best cloud network security tool.

  • March 22, 2024
  • Review verified by G2

What do you like best about the product?
These are the points that i find best from my daily use of cloud gaurd
The User Interface is clean and easy to understand
the threat engine works so good
it has built in predefined log query (filters) that can save lot of manual work
traffic explorer is really helpful interms providing a breife understanding of the network traffic
ability to set up custom notifications is very useful
It supports custom rules
easy to integrate
easy to implement
great customer support
What do you dislike about the product?
the logs are limited to cloud trial and VPC logs
although traffic graph is great it is limited we cannot get end to end traffic view.
What problems is the product solving and how is that benefiting you?
since we have multiple cloud service providers and 7 different accounts for various applications, it is challenging to keep track of the security compliance of the cloud environment and any security breach starts at network level and is by far the most important part and cloud gaurd greatly helps us to keep track of the security standards.


    Financial Services

Robust features in a cloud native world

  • March 21, 2024
  • Review verified by G2

What do you like best about the product?
Using CloudGuard network security allows for a familiar implementation with all the features of an onprem appliance. The deployment can be completely codified using Terrafrom, allowing for reapeatable deployments for each region. Using the AWS GWLB and endpoint service, inspecition can be extended to any / all member accounts for ingress / egress inspection. The GWLB deployment also allows for right sizing of EC2s that can increase/decrease with autoscaling. The policy can also be codified using Terraform, allowing for teams to inner-source access requests, but ensuring the proper security teams can still approve the access before it is rolled out.
What do you dislike about the product?
When using Terraform to manage the security policy, the object creation layout needs to be well thought through to ensure objects are created as disired. Also, publishing changes needs to be accounted for on Terraform apply success and failures so Terraform state and the Check Point database stay in sync.
What problems is the product solving and how is that benefiting you?
CloudGuard Network Security provides inspection throughout many parts of the cloud network.
1. Inspection of traffic from the internet inbound to a VPC.
2. Inspection of traffic from a VPC to the internet. Internet categories and applications can be used instead of having to know each exact FQDN, which would be a major pain and struggle for engineering teams.
3. Inspection between VPCs
4. Inspeciton between VPCs and on-prem
5. IPS
6. Detailed traffic logging
7. Identity based access

Since this deployment is EC2 based, traffic mirroing is also possible to enable external IDS systems.


    Harish M.

Cloud Guard Network Security - Best Network Threat Analyser for Cloud

  • March 15, 2024
  • Review verified by G2

What do you like best about the product?
It will help us to reduce malicious attack traffic s on our cloud applications. It will monitor all our network and user level traffics and events.
I like the option of GSL module to provide us on filter the traffic events more deeply.
What do you dislike about the product?
Currently it will supports network and user activity to integrate.
What problems is the product solving and how is that benefiting you?
We reducing the risk of malicious traffics and it will help us to monitor our application traffics on 24/7


    Financial Services

Shielding Networks in the on cloud applications

  • March 06, 2024
  • Review verified by G2

What do you like best about the product?
Its comprehensive threat protection capabilities, which seamless integrate with cloud environment traffic logs, while offering robust threat analysis, network traffic visibility, and user account activities on all our applications.
What do you dislike about the product?
The cost of licensing and maintenance could be a drawback for organizations with budget constraints, especially for smaller businesses or startups.It has the limitations the network security is only supported on vpc traffic and cloud trail logs only.
What problems is the product solving and how is that benefiting you?
It will helps us to monitor and analyse cloud network logs continuously and will reduce the risk of traffics from the attackers and malicious requests.


    Ishant G.

Cloudguard - your cloud security companion

  • November 24, 2023
  • Review provided by G2

What do you like best about the product?
CloudGuard's versatility and robust threat prevention stand out in securing diverse cloud environments.
What do you dislike about the product?
Limited visibility and complex setup are drawbacks in CloudGuard.
What problems is the product solving and how is that benefiting you?
CloudGuard tackles security concerns in cloud transitions, ensuring data control, threat prevention, and compliance. Its simplicity aids my company, securing our digital space without the complexity.