Addresses the security of APIs and define objectives like throttling to control API usage
What is our primary use case?
We were focused on mitigating malicious activity at the application level. We were searching for technology to help manage frequent traffic issues, which is why we decided to implement a WAF. Our main use case was to also address the security of APIs. Since we were using many APIs in our environment, we wanted a solution that could manage restrictions and throttling for these APIs effectively.
The WAF allowed us to define objectives like throttling to control API usage. Additionally, we utilized the WAF to handle OWASP Top Ten vulnerabilities by creating rules to inspect incoming traffic from the internet to our internal infrastructure. Suspicious activities would be flagged and alerted as necessary. These features were key to our decision to implement the WAF in our last organization.
How has it helped my organization?
Check Point CloudGuard WAF provides a range of built-in features. It includes default policies based on the OWASP Top Ten vulnerabilities, which help detect and mitigate common threats. However, for vulnerabilities beyond the OWASP Top Ten, the WAF also offers the flexibility to create custom rules.
You can create and implement custom rules if you need to address other common vulnerabilities in the external environment. There are various options for implementing these custom rules, including using Terraform. For organizations that prefer to use only default policies, those are also effective at handling traffic and identifying application-specific vulnerabilities.
What is most valuable?
WAF solutions offer a wide range of features, and many cloud vendors integrate WAF capabilities directly into their platforms. For instance, Azure CloudGuard includes built-in WAF features fully integrated with the Azure environment.
Within this platform, you can easily define API restrictions, set web application vulnerability policies, and manage security headers like content security policies and HSTS policies. This integration streamlines the process of configuring and managing these security features, making it more efficient than using separate tools for each task.
What needs improvement?
When I was working with the WAF platform, there were limitations, particularly concerning compliance and reporting. Managing multiple tools for different functions like WAF, firewall, CDN solutions, and antivirus—could be cumbersome for organizations. They often prefer a more centralized platform to manage various features efficiently.
While having separate tools can enhance visibility and support a defense-in-depth strategy, the WAF platform's reporting capabilities could have been improved.
What other advice do I have?
Security headers, such as content security policies and HSTS policies, protect applications from web vulnerabilities like cross-site scripting attacks and cookie theft. These parameters can be defined at the CloudFront level or within a WAF.
WAFs operate in two main modes. Initially, they may be set to detection mode, monitoring activity without blocking traffic. This is useful for assessing the impact and tuning the rules. Once your implementation and team are ready, you can switch to the blocking mode, where the WAF actively blocks suspicious traffic. It’s important to carefully configure this mode to avoid blocking legitimate traffic, which can cause disruptions.
Additionally, you might see cost savings if you don’t use an API management platform and instead rely on WAF to manage API-related features. However, the decision depends on your specific architecture and implementation needs.
Overall, I rate the solution an eight out of ten.
If a zero-day attack originates in Europe, Check Point CloudGuard can detect it within minutes and distribute a new signature globally
What is our primary use case?
Due to the nature of our business, we have heavily invested in backend API development, providing services exclusively through this interface. Similar to how banks and medical industries utilize data from centralized sources, our APIs cannot be exposed directly to the Internet. To safeguard these critical APIs, a robust security solution is essential.
Check Point CloudGuard WAF fulfills this need by intercepting all incoming internet traffic, categorizing requests as legitimate or malicious, including attack details, and blocking suspicious activity at the initial stage. Only verified, non-malicious requests are permitted to interact with our APIs.
How has it helped my organization?
When we activate the WAF, our security signatures and all the latest threat intelligence are immediately updated. Our protection is automatically refreshed every few hours to address emerging threats. For example, if a zero-day attack originates in Europe, Check Point CloudGuard can detect it within minutes and distribute a new signature globally. This ensures that when the attack reaches Australia, it is already blocked by our up-to-date WAF.
Although the WAF still produces false positives because of the signatures, we can apply a rule to exclude them easily.
Automated threat intelligence is crucial because a ransomware attack can compromise a network in minutes. Imagine an attack occurring at 3 AM when staff is unavailable; the damage may already be done when someone investigates. Ransomware can infiltrate and complete its task within just a few sessions. Once inside, attackers can lay dormant for months, covertly sending data using internal IP addresses. These addresses are often whitelisted, making it difficult to detect whether the outbound traffic is authorized or malicious. Automated threat intelligence can rapidly detect and respond to attacks, unlike manual processes that take 15 to 20 minutes, often too late to prevent significant damage like a completed ransomware attack. Systems like OCSP, utilizing best practices from multiple vendors such as Azure, Microsoft, CheckPoint, Palo Alto, and CloudStrike, provide an open platform for sharing and updating threat signatures. This enables organizations to tailor their security measures based on specific application needs and behaviors, effectively mitigating risks without unnecessary restrictions.
Cloud-based WAF solutions, such as Check Point's, offer significant advantages compared to traditional on-premises WAFs like Cisco or Palo Alto. On-premises WAFs require substantial upfront costs for hardware, expensive licenses, and frequent, costly upgrades as technology evolves. Cloud-based alternatives eliminate these expenses by providing the latest features and capabilities without hardware or software management. This flexibility and cost-efficiency make cloud WAFs appealing to many organizations. However, cloud solutions can be more expensive for high-throughput applications like Instagram or Facebook due to data transfer costs. At the same time, on-premises options might be more economical in these cases. Ultimately, the best choice depends on specific network size, criticality, and application requirements.
What is most valuable?
Machine learning is a valuable tool for this assessment because it allows for a two-phase approach: secure and non-secure. In the first secure phase, pre-built signatures are used, eliminating the need for a live tracker as the necessary data is readily available. This approach efficiently blocks threats without progressing to the slower, resource-intensive second phase. Unlike competitors who process every request, this method conserves CPU power and prevents application slowdowns.
What needs improvement?
Check Point CloudGuard WAF's code could be improved. While the GUI allows configuration for application-related features, specific definitions cannot be modified through the code. Ideally, we would prefer consistent configuration across all products to simplify deployment, but in this case, the ISE is incompatible with the two or three different models we've identified. Therefore, we must rely solely on the GUI for configuration.
For how long have I used the solution?
I have used Check Point CloudGuard WAF for four months.
What do I think about the stability of the solution?
It was stable in the four months we ran Check Point CloudGuard WAF.
I would rate the stability nine out of ten.
What do I think about the scalability of the solution?
I would rate the scalability nine out of ten. We only reached 80 percent of our CPU capacity.
How are customer service and support?
The technical support is good. We didn't use them much, demonstrating the product's quality.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
At that stage, our primary goal was to select a suitable WAF to replace our existing F5 WAF. While the F5 WAF performed well, we sought to eliminate it due to excessive licensing costs. Given the high expense of our entire WAF solution, we explored alternatives, including Azure WAF, Check Point WAF, and Palo Alto WAF. Although we initially considered Cisco WAF, it was quickly discarded as outdated. After a two-week evaluation, we narrowed our options to Azure, Check Point, and Palo Alto WAFs.
How was the initial setup?
The deployment is straightforward and similar to any standard firewall installation. While the process took four days due to design finalization, deploying directly from code can be completed in less than thirty minutes.
Two people were involved in the deployment, one working on the design and the other on the ISE.
What's my experience with pricing, setup cost, and licensing?
Check Point CloudGuard WAF is expensive compared to Azure WAF. I would rate the cost of Check Point CloudGuard WAF as eight out of ten, with ten being the most costly.
Which other solutions did I evaluate?
We evaluated Cisco WAF, but it is outdated and no longer competitive. Since we utilize Azure Cloud, we opted for Azure WAF due to our preference for cloud-based solutions. Azure WAF has performed well and is seamlessly integrated behind the scenes. We also evaluated Palo Alto, but configuration challenges through ISE led us to discontinue its use seven months ago. Check Point CloudGuard WAF was abandoned for similar reasons. Azure WAF's integration with ISE, including built-in Bicep modules for CLI configuration and deployment, is a significant advantage. Currently, we manage approximately 35 IP addresses and require two distinct stages for WAF settings and module deployment. Consistent signature stem definition across different environments is essential. ISE was crucial in our decision-making process, ultimately replacing Check Point due to the latter's lack of ISE integration, a critical requirement. While Check Point offered several strengths, the absence of ISE was a deal-breaker. Overall, Azure WAF has met our expectations.
What other advice do I have?
I would rate Check Point CloudGuard WAF eight out of ten.
We have six environments in multiple locations and eight products that use 20 APIs.
We have a team of four working with the WAF.
I would recommend Check Point CloudGuard WAF if it fully meets the organization's needs, the cost is reasonable, and they desire AI and ML integration in the future. However, since we do not require AI or ML and prioritize ISE for our management approach, this solution did not align with our requirements.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Reliable, feature-rich, and value for money
What is our primary use case?
We did a PoC with Check Point CloudGuard WAF for a month. We had acquired it for a month for testing purposes to see how it would help us with our setup.
It was placed at the starting point of our network infrastructure wherein all the traffic was monitored. We created security policies on Check Point CloudGuard WAF. Whenever an IP used to come to us, it would basically go through a set of policies, and then Check Point CloudGuard WAF would search for malware and other things in the traffic.
How has it helped my organization?
During the PoC, we did not face any issues related to false positives. I am in the network security team, and we have a security operations team as well. The security operations team has an SIEM tool. Whenever an alert got updated in the SIEM tool, they used to pass it on to us. We could easily find the logs for a particular alert generated on Check Point CloudGuard WAF. It was always correct. We did not observe any false positives with them.
Check Point CloudGuard WAF protects your applications against threats without relying on signatures. It works fine without signatures, but it cannot detect all the malicious traffic that might enter the setup.
What is most valuable?
Check Point has its own threat intelligence database. It is global. All the malicious samples are added to that. Whenever there was a new CVE, Check Point CloudGuard WAF used to block them. That was a good feature of Check Point CloudGuard WAF.
We had scheduled a time for the database update, so every day at 3 pm, the CVE database used to get updated.
What needs improvement?
It was costlier than other solutions. We brought it into our setup for PoC purposes. It was there for one month. We liked all the features, but compared to its competitors, such as Fortinet and Palo Alto, it was a little bit costly. However, considering the cost, it was good and efficient. Other than the price, I did not see any room for improvement.
For how long have I used the solution?
I used Check Point CloudGuard WAF for a month. It was in the month of January 2024.
What do I think about the stability of the solution?
We never faced any issues with Check Point CloudGuard WAF. However, in the case of Check Point Firewall, we experienced crashing issues with the SmartConsole application.
How are customer service and support?
I have not contacted Check Point support for Check Point CloudGuard WAF. It was with us only during the PoC. During the one-month period, we did not face any issues, but for other products, we generally raise a TAC case with the Check Point team. We have a Check Point Firewall in our setup, and whenever we face issues with it, we raise a case with Check Point TAC. Technical support of Check Point is good. They respond on time. They analyze the logs properly and give a proper workaround.
How was the initial setup?
I was not involved in its deployment. We have a company named Softcell in India. They are the first point of contact, and Check Point is the second point of contact in our setup. Whenever we have to implement any new Check Point devices in our setup, we raise a service request with the Softcell team, and they provide an engineer for the implementation. However, I was a part of the deployment team of the Check Point Firewall 16000 series, and we did not face any issues.
What's my experience with pricing, setup cost, and licensing?
I work for an Indian banking client. In India, companies are on a budget. The company liked Check Point very much, but it was a little bit costly compared to FortiWeb. However, it had more features compared to FortiWeb.
Which other solutions did I evaluate?
Check Point CloudGuard WAF was quite good compared to FortiWeb. We have FortiWeb now due to budget constraints, but feature-wise, Check Point CloudGuard WAF was quite durable and reliable.
What other advice do I have?
I am not very aware of how Check Point CloudGuard WAF works at preemptively blocking Zero Day attacks and detecting hidden anomalies. If it is updated in the global database, Check Point CloudGuard WAF could prevent Zero Day attacks from getting triggered.
Overall, I would rate Check Point CloudGuard WAF a nine out of ten.
Offers comprehensive threat prevention capabilities and a user-friendly interface
What is our primary use case?
With CloudGuard WAF, I can deploy a cloud-based network protection solution that secures my applications, endpoints, and data.
What is most valuable?
The features I have found most valuable are the comprehensive threat prevention capabilities, automated policy management, and seamless integration with cloud environments.
What needs improvement?
For the next release, I would suggest considering features like enhanced threat intelligence integration.
For how long have I used the solution?
I have been using Check Point CloudGuard WAF for about two years.
What do I think about the stability of the solution?
The stability of the product has been good so far.
How are customer service and support?
Check Point's technical support is helpful and knowledgeable overall, but there can be delays in response, especially regarding licensing issues.
Which solution did I use previously and why did I switch?
The main reasons I chose this vendor for web application security were their ability to consolidate management facilities, their comprehensive features, and their flexibility in addressing different security needs.
What was our ROI?
We have seen ROI from using CloudGuard WAF.
What's my experience with pricing, setup cost, and licensing?
I believe that the pricing or licensing of CloudGuard WAF could be more competitive.
What other advice do I have?
Implementing CloudGuard WAF allowed me to address the challenges of securing my applications and data in a rapidly evolving cloud environment.
Using CloudGuard WAF has brought significant benefits, including improved threat protection, streamlined policy management, and enhanced usability. I noticed these advantages shortly after the first deployment.
It is extremely important to me that CloudGuard optimizes security to protect my applications without solely relying on signatures.
To access the false positive rate, I typically review assessment reports available on platforms like AWS or Azure. By evaluating how effectively the solution preemptively blocks zero-day attacks and minimizes false positives, I can reduce the total cost of ownership for my web application security.
The solution's privacy features, user-friendly web console, virtual deployment options, and physical appliance capabilities have all contributed to reducing my total cost of ownership.
Overall, I would rate CloudGuard WAF as an eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Useful for blocking applications and IPs
What is our primary use case?
We use the product to access the internet internally. It helps us to block unnecessary networks.
What is most valuable?
The tool helps us to block IPs and applications.
What needs improvement?
I have faced issues with the tool's blocking aspects. It is hard to open or block web services due to the multitude of cloud centers. I have to do the process manually at times. We have a bug which is hard to solve.
For how long have I used the solution?
I have been using Check Point CloudGuard Application Security for ten years.
What do I think about the stability of the solution?
I like the tool's stability.
What do I think about the scalability of the solution?
Check Point CloudGuard Application Security is scalable.
How are customer service and support?
Check Point CloudGuard Application Security's support is sometimes good.
Which solution did I use previously and why did I switch?
We had used Sophos before Check Point CloudGuard Application Security. We switched to the product since Sophos did not have a firewall then.
How was the initial setup?
Check Point CloudGuard Application Security's deployment is not complicated.
What about the implementation team?
The tool's control helped us with the deployment.
What's my experience with pricing, setup cost, and licensing?
Check Point CloudGuard Application Security's pricing is not friendly.
What other advice do I have?
False positives happen occasionally, but it's not a big deal for me. I prefer false positives over the risk of something going undetected. The tool's abilities for preemptively blocking zero-day attacks and detecting hidden anomalies are good. It has helped us reduce the TCO for the web application firewall. I rate it a nine out of ten.
Integrates well with existing cloud security tools and management systems and provides comprehensive security coverage
What is our primary use case?
Check Point CloudGuard WAF can be used in various scenarios, including on-premises and cloud deployments. It integrates well with other platforms like Fortinet and can be managed through a centralized console. It is suitable for multi-cloud environments, including Google Cloud Platform and Azure. Additionally, Check Point AppSec can be used alongside CloudGuard WAF for comprehensive application security.
What is most valuable?
The most effective CloudGuard feature for threat prevention is its web app protection.
What needs improvement?
CloudGuard could improve in areas such as ease of integration with Fortinet and reducing costs associated with deployment in cloud environments like Azure. Simplifying the implementation process and offering more cost-effective solutions could make it more competitive and easier for clients to adopt.
For how long have I used the solution?
I have been working with Check Point CloudGuard WAF for two years.
What do I think about the stability of the solution?
CloudGuard is stable, with minimal interruptions to service. In the event of interruptions, there is a data center alternative within CloudGuard. On a scale of one to ten, I would rate its stability as a solid nine out of ten.
What do I think about the scalability of the solution?
It is easy to scale up CloudGuard as needed, and the licensing is based on traffic rather than the number of URLs. This means that clients only need to license the solution based on their traffic requirements, regardless of the number of applications they have deployed. I would rate the scalability as an eight out of ten.
How are customer service and support?
Check Point offers strong customer service and technical support. While I interact with account managers for negotiations and collaborate with Check Point engineers during projects, the dedicated customer service team ensures a positive experience. Overall, I would rate the support as an eight out of ten.
How would you rate customer service and support?
How was the initial setup?
The initial setup of CloudGuard is somewhat straightforward, but it involves creating virtual machines, which can add complexity and cost, especially in cloud environments like Azure. Clients should carefully consider recommendations and costs associated with CloudGuard and compare them with alternatives like Fortinet to make informed decisions.
Deployment of Check Point CloudGuard typically requires a small team, often consisting of around two to three staff members from cybersecurity departments or Check Point Harmony solution teams.
For maintenance of Check Point CloudGuard, typically one or two people are required to ensure the solution functions properly, including updating applications and managing access.
What other advice do I have?
The auto-generation of WAF rules has positively impacted our security posture by efficiently identifying and mitigating threats. In cloud security, it may reduce delays in detecting and responding to security incidents. By checking the security posture of clients' websites, we can assess cybersecurity risks, such as those specific to certain industries, improving overall security awareness and readiness.
The deep API protection provided by CloudGuard has several benefits, such as comparing API calls to updates in cybersecurity groups and enhancing security for web applications and APIs. An example of CloudGuard's effectiveness is when protecting cloud-based RP systems or electronic invoice applications. In these cases, CloudGuard secures the cloud environment, including databases, against malware, encrypts applications, and provides overall application protection.
CloudGuard integrates well with existing cloud security tools and management systems, making it easy to implement and manage.
I would recommend CloudGuard to others, especially for organizations heavily reliant on cloud infrastructure and applications. It provides comprehensive security coverage, including WAF, which is essential for safeguarding applications in the cloud. I often suggest CloudGuard to clients to enhance their cybersecurity posture and mitigate risks effectively.
Overall, I would rate Check Point CloudGuard WAF as an eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
Offers good stability and improves our security posture
What is our primary use case?
It's our cloud security tool for management solutions. We have tenants on the web portal and other systems, which are part of the POC activity. We haven't bought it; they just put it on the computer today.
How has it helped my organization?
It has helped us to improve our security posture by providing us with a centralized platform for managing security across all of our cloud environments. It has also helped us to save time and money by automating many of our security tasks.
What is most valuable?
I find the configuration and real-time monitoring features valuable.
What needs improvement?
It doesn't detect user activity like some of its competitors. It's not a vulnerability, but it's a legitimate activity that it doesn't detect. It only detects vulnerabilities or misconfigurations.
Additionally, Zenix features are not handled or captured.
For how long have I used the solution?
We just had a POC for CloudGuard. It's only been two or three months.
What do I think about the stability of the solution?
It is a stable solution. We didn't face any downtimes.
What do I think about the scalability of the solution?
It is scalable enough for our use case.
How are customer service and support?
The customer service and support were very good.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We had POCs from different vendors. We haven't used any other solution before. This is our first time trying a cloud security solution.
There were a few reasons. First, we are from India, and Check Point has a strong presence in the Indian market. Second, we needed a solution that could support multiple cloud environments, including Azure, AWS, and Oracle.
How was the initial setup?
The initial setup is a straightforward process. There were no difficulties.
It took us one to two weeks to deploy it. We have deployed it in AWS and Oracle cloud.
What's my experience with pricing, setup cost, and licensing?
The pricing is competitive compared to other solutions on the market. So, the licensing cost is average.
Which other solutions did I evaluate?
What other advice do I have?
Overall, I would rate the solution an eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
Helps with compliance, mitigates security risk, and helps reduce costs
What is our primary use case?
Currently, we have our applications and devices in the Microsoft cloud in Azure. We have been modernizing our platform, and some services we have been converting to a platform as a service for which many app services have been implemented, among other workloads, and we needed to expose them to the outside. Therefore, a tool was needed that could do this security filtering and that also provided a set of native tools and functionalities for the cloud and checkpoint to meet the needs that we were presenting.
How has it helped my organization?
Since we were able to implement this new tool, we have been able to put into production all the applications that we have modernized for the use of our clients and officials, thus resulting in a more continuous and faster improvement of our services and achieving better scalability, stability and we have managed to reduce the costs and labor in IT, thus ensuring that our developers dedicate themselves to other projects and not be making patches for the applications as we were doing due to our obsolete technology, in addition, it provided us with regulatory compliance, monitoring, and analysis of all applications.
What is most valuable?
The tool has many valuable features that help us in our day-to-day life with all the applications. With the solution, we managed to obtain complete comprehensive visibility of the entire environment in the cloud, thus having better control of each of the resources.
In addition to that, we managed to have security policies that allow us to reward compliance in each of the applications. We've been able to provide better regulatory compliance, thus being able to mitigate security risks in our environment and achieve a better standard in the security of the company.
What needs improvement?
The tool is currently one of the best on the market. It has a series of more innovative features in the security market. That said, there are improvements necessary.
They should improve in the delivery of more detailed reports with more information.
They should improve in the support they provide since they have lost a lot of strength here. Quality has dropped; they do not comply with the SLA.
They should have a centralized library of each of the manual technologies, guides, and errors where everything can be found in one place so that we do not waste time searching all over the web for a solution or guide.
For how long have I used the solution?
This solution is new; I have been using it for one year,
What do I think about the stability of the solution?
To this day, the stability of the tool is very good and has not presented any problems.
What do I think about the scalability of the solution?
The scalability of the tool is very good; it is multi-cloud.
How are customer service and support?
The support must be improved. The performance and quality it offers have decreased.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
It is one of the first tools that implements application security.
How was the initial setup?
The installation was simple since we have experience with these tools, however, it does have a medium learning curve.
What about the implementation team?
The implementation was carried out by the IT department with the help and supervision of the vendor's engineer.
What was our ROI?
The investment was quite relevant; we did it to protect our information and power the applications in production.
What's my experience with pricing, setup cost, and licensing?
The price and licenses are very competitive in the market and should go down a little.
Which other solutions did I evaluate?
We did look into Microsoft tools, such as the WAF, which were evaluated. They did not meet the organization's needs.
What other advice do I have?
It is an excellent multicloud tool with good security features.
Which deployment model are you using for this solution?
Public Cloud
Performs health checkups but needs to improve integration
What is our primary use case?
Check Point CloudGuard Application Security helps us ensure the security of contact devices and meet audit requirements for compliance.
What is most valuable?
The tool performs device health checkups and updates us. It helps us to be compliant with regulatory policies.
What needs improvement?
Check Point CloudGuard Application Security needs to improve updates on integrations. It also needs to incorporate real-time monitoring features.
For how long have I used the solution?
I have been using the product for two years.
What do I think about the stability of the solution?
We encountered stability issues during the configuration. The tool's stability is good.
What do I think about the scalability of the solution?
Check Point CloudGuard Application Security is scalable. My company has 1000 users for it.
How are customer service and support?
The tool's support is good.
How would you rate customer service and support?
How was the initial setup?
Check Point CloudGuard Application Security's deployment is easy and completed in six hours. You need two to three resources to handle the deployment. You need proper training to do it.
What's my experience with pricing, setup cost, and licensing?
The tool's licensing costs are yearly and competitive.
What other advice do I have?
I rate Check Point CloudGuard Application Security an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud