Our primary use cases include enhancing security for web applications and APIs, optimizing resource utilization to reduce costs, and maximizing efficiency in log management for better insights and savings.
CloudGuard WAF
Check Point Software TechnologiesExternal reviews
External reviews are not included in the AWS star rating for the product.
Simplifies our security management and enhances our ability to monitor and analyze logs effectively
What is our primary use case?
How has it helped my organization?
CloudGuard WAF has improved our organization by simplifying security management and enhancing our ability to monitor and analyze logs effectively.
What is most valuable?
The most valuable feature we have found in Check Point CloudGuard WAF is its rich logging capabilities.
What needs improvement?
In terms of improvement, I feel like I need more clarity in understanding pricing for DDoS protection.
For how long have I used the solution?
I have been working with CloudGuard WAF for a month.
What do I think about the stability of the solution?
CloudGuard WAF impressed us with its stability; it is a powerful tool providing great visibility.
What do I think about the scalability of the solution?
CloudGuard WAF's scalability is excellent, especially as a SaaS, offering significant improvements over on-premises environments and providing consolidated scalability.
How are customer service and support?
The technical support is amazing.
Which solution did I use previously and why did I switch?
We previously used Cloudflare. Now, we are testing WAF to enhance our log insights.
How was the initial setup?
The initial deployment was straightforward. We transitioned from an on-premises solution to a SaaS model, which was simpler and more useful. Our implementation strategy involved redirecting the site to the new solution and creating policies to ensure smooth operation.
What was our ROI?
We haven't seen ROI metrics yet, but we expect long-term benefits, especially in budget management and risk reduction.
Which other solutions did I evaluate?
Before choosing CloudGuard, we evaluated options like Azure and AWS. The main differences lie in policy customization, market size, and preset features. Each has its pros and cons, but CloudGuard stood out for its robust policy options and wide market presence.
What other advice do I have?
By implementing Check Point CloudGuard WAF we aimed to address challenges related to enhancing security for web applications while leveraging powerful logging capabilities.
We check false positives in CloudGuard WAF using logs and the interface, and we have had very few issues, which helps our business.
Using preset policies, the solution preemptively blocks zero-day attacks and detects hidden anomalies without requiring full data.
The solution has cut our web application firewall costs because it is adaptable to our environment.
My advice to new users would be to focus on the benefits of software as a service and ensure clarity in understanding pricing, particularly for DDoS protection.
Overall, I would rate Check Point CloudGuard WAF as a ten out of ten.
Robust protection against web application threats with easy deployment, comprehensive feature set and excellent catch rate compared to competitors
What is our primary use case?
We utilize Check Point CloudGuard to protect our Office 365 email system from phishing attempts, which were becoming increasingly common. Additionally, we rely on it to secure our usage of Microsoft Teams for collaboration, as well as for our SharePoint platform. Furthermore, we leverage CloudGuard Endpoint to safeguard our machines, particularly because many of our end users frequently travel abroad. This ensures that we have visibility into their activities and locations, allowing us to restrict access if necessary or provide remote assistance when needed.
How has it helped my organization?
We were facing several challenges that prompted us to implement CloudGuard Application Security. Previously, we used another vendor for email security, but we found that many emails were slipping through, requiring us to manually review each one. This became a significant overhead, as we had to ensure that every email was properly tagged. With Check Point's email security solution, this overhead was practically eliminated.
Now, the number of emails slipping through is minimal, perhaps only once or twice a month. Additionally, Check Point's solution streamlines the process by notifying users of potentially legitimate emails that were flagged as suspicious. This feature has been particularly helpful since our company relies heavily on email for contract-related communications. On the endpoint security front, we were impressed by Check Point's ransomware protection feature, including its anti-ransomware rollback capability. Having experienced the importance of such features in previous roles, it was a straightforward decision for us to switch from our previous vendor to Check Point.
The benefits we've observed are significant. On the email front, my workload has been drastically reduced, practically eliminating overhead. As for Check Point, it provides peace of mind knowing that in the event of a ransomware attack, the system has a rollback feature. This reassures me that I'll have the opportunity to investigate and diagnose any issues that may arise.
In terms of email, Check Point's solution effectively blocked numerous phishing emails that were previously slipping through, which is a significant advantage. Regarding Check Point in general, the cloud-based management capability is highly beneficial as it eliminates the need for on-premise appliances or servers. Additionally, it ensures that I can still manage the security of devices even when they're outside the corporate network.
It's very important that CloudGuard Application Security defends our applications against threats without solely relying on signatures. Relying solely on signature-based detection is limited, as it's only as effective as the signatures themselves. With the ever-evolving nature of threats, especially in environments like conferences where new threats emerge frequently, relying solely on signatures may not be sufficient. I've taken the initiative to test various security solutions by experimenting with different malware downloads and observing how they perform. This hands-on approach underscores the importance of having a robust behavioral engine, like the one provided by Check Point, which adds an additional layer of security beyond traditional signature-based detection.
Regarding false positives with CloudGuard Application Security, particularly in emails, I've encountered very few instances.
The solution has effectively lowered our total cost of ownership for our web application firewall, particularly in the context of email security.
We opted not to go with our CloudGuard vendor's web application firewall because, in the case of Microsoft, we decided to try their email security system. However, it didn't perform as expected, with many threats slipping through. Consequently, Check Point's solution proved to be more effective in this scenario.
What is most valuable?
On the endpoint side, the most valuable feature is undoubtedly the cloud-based management capability, along with the ransomware protection, despite not encountering any instances so far. Regarding email security, the standout feature is the minimal overhead, essentially reducing the task to routine maintenance.
What needs improvement?
One area for potential improvement is the management interface. Occasionally, when there are major updates, the layout of the menus changes, which can be somewhat disruptive as I need to search for familiar options. Consistency in menu structure would be beneficial, as it allows users to develop muscle memory and navigate the interface more efficiently over time. Improving the process for handling licensing renewals would be a welcome enhancement.
For how long have I used the solution?
I have been using it for five years.
What do I think about the stability of the solution?
In terms of stability, I find it generally reliable. However, there have been a few issues, particularly with license renewal, where the system would unexpectedly go offline without notifying me. This would sometimes take a couple of days to resolve, requiring support intervention to address licensing issues.
How are customer service and support?
Tech support is prompt, knowledgeable, and efficient. On a scale from zero to ten, I would rate them a solid ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, our email security solution was provided by Barracuda, and our endpoint security was handled by ESET.
How was the initial setup?
The initial setup was straightforward, primarily because it involved mainly APIs, which simplified the process.
What about the implementation team?
I was in charge for the deployment.
What was our ROI?
We've observed ROI primarily in terms of cost reduction. This is mainly because there are fewer servers to manage now compared to other solutions, where on-premise servers were necessary.
What's my experience with pricing, setup cost, and licensing?
I find the pricing to be reasonable.
Which other solutions did I evaluate?
I also evaluated SentinelOne, CrowdStrike, Mimecast, and CheckPoint. Ultimately, I chose Check Point because of its comprehensive IT toolset, which allows me to manage all aspects from a single dashboard. I appreciated the convenience of not having to switch between different units for different functionalities, thus avoiding the creation of multiple interfaces.
What other advice do I have?
The advice I would offer to others regarding Check Point products revolves around their robust features, particularly the rollback feature. I appreciate how Check Point handles this compared to some competitors who use their own driver on the DriveSpace, whereas others leverage Microsoft VSS. Regarding email security, it's straightforward to deploy and has a high catch rate compared to competitors. Overall, I would rate it ten out of ten.
Easy deployment, good reporting, and excellent support
What is our primary use case?
We use AppSec. The primary use case was for our client's app. We did a successful project with the biggest university in Mexico. It was a big survey for all the former students. There were thousands of them, and it needed to be completed based on some specifications from the security team.
How has it helped my organization?
The service was available for the client on time. They had a go-to-market or a due date to start sending the app to various students to apply. We were there 24/7 hoping and waiting for everything to be fine, and it worked perfectly and smoothly.
The client was very happy with the performance of Check Point on this project. When comparing it with Imperva, we strongly feel that the formula that Check Point delivers on WAF was what the client needed.
Check Point CloudGuard works perfectly for preemptively blocking Zero Day attacks and detecting hidden anomalies. Check Point is all about prevention. We strongly believe that if you want to prevent threats, Check Point is the one. There is no one else.
What is most valuable?
There are two main features. The first valuable feature is that it is not a complex process to get it up and running. It was not complex at all. We were in a close relationship with the team that developed the app, and it worked in a few hours.
The second valuable feature is the information that comes out of it. With the dashboard or the information that came from it, we made some executive reports for the client. They were very happy with it.
What needs improvement?
I do not know if it is already there, but I would like to have complete visibility between the posture management and firewall as a service. I would like the complete visibility of every product for the client to see in an executive way. I do not want it in a very complex way with so many warnings and threats. They should focus on the main things in all the products. I would like to see that.
For how long have I used the solution?
We started using it six months ago.
What do I think about the stability of the solution?
Its stability is perfect. We have had no issues.
What do I think about the scalability of the solution?
It is made for scalability. We have no issues on the matter.
How are customer service and support?
Check Point helped us a lot with the project. We interacted with Check Point engineers. They knew it was our first project, and we came across as one strong team in front of the client. I would rate their customer service and support a ten out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
The client had Imperva, but for this project, they used Check Point. They have some current contracts and some expiration dates. We are hoping to have more deals with them.
They went for this solution for multiple reasons. The first reason was our service as a partner. The client needed somebody to handle the solution. They are not specialists in handling WAF or security. The second reason was that Check Point has authority over security. We were not delivering a solution that was new in the market. We were not an underdog. The third reason was that when we did the workshop, not a POV, the client saw that the solution was intuitive. The dashboards were executive. They liked it a lot. It provided visibility to focus on the efforts. It gave a list of all the threats. It was focused on the main ideas and threats.
Check Point CloudGuard WAF can reduce the total cost of ownership for your web application firewall, but in this case, it was not a big deal.
What was our ROI?
Our client could see that they can have a great solution that does not cost much more than Imperva.
What's my experience with pricing, setup cost, and licensing?
It is not cheap, but it is worth it. For this project, our channel manager and our territory manager helped us a lot. We got a lot of flexibility on the license. I do not know how much discount there was, but it was big enough to win the opportunity.
What other advice do I have?
For those evaluating WAF solutions, there are so many options, but I would recommend relying on a company like Check Point that has a great ecosystem. Their solutions are not only made for the cloud. They also have specialization in all types of security. With their AI and ThreatCloud, you have information about what is happening in the security world. The information that they provide is very useful, so rely on a company that is big enough to provide the security that you deserve.
In this project, there were a lot of technical issues that we had to manage through our engineers. It was our first project and the interaction with the development teams was important. It was very important to get the due dates and stay on track. For a successful project, you need to have a close interaction with the client, especially if the client is not a specialist in security. Check Point also helped us a lot with this project.
Overall, I would rate Check Point CloudGuard WAF a ten out of ten.
Excels in providing robust protection against cyber threats while offering seamless management, scalability and responsive support
What is our primary use case?
We implement it to protect applications and APIs across multi-cloud environments.
How has it helped my organization?
The primary advantage we experienced was in terms of security capabilities. Previously, our proxy solution lacked this level of protection, but with Check Point, we now benefit from streamlined management and complete visibility.
What is most valuable?
One of its most significant benefits is its ability to defend against a diverse array of security threats, without needing a specific configuration. It seamlessly protects through machine learning, giving us visibility into potential attacks and where they come from.
CloudGuard Application Security's ability to safeguard our applications from threats without depending on signatures is crucial. The intelligence behind its operation gives us the impression that it's being overseen by a human, evaluating whether activities are benign or malicious. It consistently provides accurate responses without requiring constant intervention from us.
In terms of its performance, CloudGuard Application Security boasts remarkably low rates of false positives. Occasionally, in certain implementations or configurations of additional functionalities, it may detect new elements as potentially intrusive, prompting proactive protection measures. However, meticulous programming and clear delineation of release parameters are necessary to address such instances effectively.
The solution has effectively lowered our overall cost of ownership for the web application firewall. Without the protective function of the firewall in place, issues are bound to increase. Therefore, it's crucial to configure it correctly to ensure that the internal intelligence can operate seamlessly with the application.
We opted not to utilize our cloud vendor's web application firewall since we have minimal cloud applications, primarily relying on those managed by CheckPoint. This decision is critical for securing our internal organization's work effectively.
What needs improvement?
We recently had a discussion about the challenge of API discovery and protection. There are occasions when it interfaces with other systems, leading to a loss of visibility. It would be advantageous to improve this aspect.
For how long have I used the solution?
We have been working with it for two years.
What do I think about the stability of the solution?
The stability is commendable. Since implementation, we experienced only one interruption due to an update, which was promptly resolved.
What do I think about the scalability of the solution?
The scalability is highly commendable, continually evolving in this aspect.
How are customer service and support?
The technical support provided was excellent. Whenever we encountered complex configurations, we could easily engage with them for clear guidance, and the assistance provided was satisfactory. They demonstrate high effectiveness, and their response time is prompt. I would rate it nine out of ten.
How would you rate customer service and support?
Positive
What about the implementation team?
The deployment model of CheckPoint relies on virtual machines, such as VMware, which are implemented within our internal infrastructure. The deployment process was quick, smooth, and intuitive, as it was transparent. For deployment, we engaged a reseller to facilitate communication between CheckPoint and our organization. Additionally, we utilized their administrative services for monitoring the implementation process.
What was our ROI?
In regard to ROI, I believe that its capacity to safeguard our organization's information is highly advantageous.
What's my experience with pricing, setup cost, and licensing?
Considering all the benefits we've observed, we find the price to be satisfactory. While licenses were slightly more expensive previously, with the addition of more clients, it has proven to be reasonable.
Which other solutions did I evaluate?
We assessed several SaaS options alongside Check Point, and the primary distinguishing factor was the level of protection guaranteed by Check Point. Additionally, its maturity as a solution adds another layer of reliability.
What other advice do I have?
Based on its effectiveness in safeguarding us from potential attacks and the value it has demonstrated, I would give it a perfect score of ten out of ten.
A robust solution that provides a unified view of connections
What is most valuable?
The solution's strongest point is that you can connect everything to it, giving you a full view of what's connected. If you configure it right, it works perfectly.
What needs improvement?
You need to know exactly the system. You cannot have someone running the system if they don't have the knowledge to do so.
For how long have I used the solution?
I've been working with the solution for about a year.
What do I think about the stability of the solution?
The solution is stable. It doesn't matter which device is running Check Point. The solution works. It has never gone down. I rate the solution's stability a ten out of ten.
What do I think about the scalability of the solution?
My clients are large, but they are not enterprise-sized or small.
How was the initial setup?
I rate the initial setup a five out of ten because it is easy if you have the required knowledge and difficult if you are new to the system. The challenge isn't installing it: "Next, next, next, finish." Even a less knowledgeable person can do that. The challenge is configuring the system. There are a lot of blades in CloudGuard. You need to keep each type of security in your view, except for the Check Point view.
The initial setup is very fast, but you need to pray that the solution does all the work itself.
Which other solutions did I evaluate?
Other unified platforms like QRadar and Cisco are comparatively easier to use.
What other advice do I have?
You need someone knowledgeable to run the system. Today, with all the technology and everything, the company just wants to buy control and be lazy. "Let Check Point do the work." But this does not happen with Check Point because you need professional eyes. Check Point's price is very low compared to those controlling the system. You have to learn to investigate the solution to work better with it. The knowledge costs more than the system. The solution has a hybrid deployment, and I don't know a company that only chooses one deployment or another.
There is no support available for Check Point. There are things you have to look for, and that's it.
Check Point is the world's first and probably best security company. They might change its face, give it new names, separate into new models, and so on, but in the end, they are the best security company in the world. I rate the solution a ten out of ten.