Ai-driven protection has strengthened web security and reduces incidents and false positives
What is our primary use case?
My main use case for Check Point CloudGuard WAF is to protect web applications from external attacks, and I am primarily using it to monitor and filter HTTP/HTTPS traffic, block malicious requests, and protect applications from common threats such as attacks, malicious SQL injection, cross-site scripting, and bot attacks.
For example, in a web application protection scenario, we place our web application behind Check Point CloudGuard WAF, which inspects all HTTP and HTTPS traffic before it reaches the application server, and we enable automatic protection for OWASP Top 10 attacks such as SQL injection.
What is most valuable?
The best feature of Check Point CloudGuard WAF, in my experience, is the AI-based threat detection, specifically the AI-driven security engine that analyzes HTTP/HTTPS traffic and detects malicious patterns automatically, allowing it to block attacks and even unknown zero-day attacks without relying only on a signature base.
The AI-driven analysis of Check Point CloudGuard WAF helps me detect attacks that traditional signature-based systems might miss by analyzing the behavior and structure of the HTTP/HTTPS request and learning the normal behavior of the web application. It builds a baseline of normal traffic patterns, such as valid URL parameters, request types, and user behavior, and flags unusual requests as potential attacks.
The AI-driven analysis reduces normal rule creation and lowers false positives by learning application behavior while providing automatic protection updates without constant tuning.
In our organization, Check Point CloudGuard WAF has had a very positive impact on web application security and operational efficiency, significantly improving protection against web-based attacks with AI-driven protection and automatic learning, resulting in better visibility and monitoring through the dashboard and logs to quickly identify attack attempts.
What needs improvement?
In my experience, Check Point CloudGuard WAF is a strong solution but could be improved in a few areas, such as simplifying and customizing the user interface and reporting dashboard, making integration with third-party SIEM or monitoring tools easier for quick correlation of WAF events, and making policy tuning and configuration more straightforward for new users.
For how long have I used the solution?
I have been using Check Point CloudGuard WAF for around one year, during which I have been tasked with the initial deployment, policy configuration, monitoring web traffic, and protecting web applications from common attacks such as OWASP Top 10 vulnerabilities.
What do I think about the stability of the solution?
Check Point CloudGuard WAF is stable and working properly.
What do I think about the scalability of the solution?
Check Point CloudGuard WAF is built on the modern cloud and hybrid infrastructure, allowing it to scale across multiple public clouds.
How are customer service and support?
Customer support for Check Point CloudGuard WAF is good since they provide same-day responses for critical cases and sometimes even respond within one hour for high-priority cases, with a response time of five to six hours for others.
How would you rate customer service and support?
What was our ROI?
Check Point CloudGuard WAF has helped me save time by reducing my workload, although I cannot quantify the exact return on investment.
What other advice do I have?
After deploying Check Point CloudGuard WAF, we observed several measurable improvements, including a significant reduction in incidents because the WAF blocks malicious traffic such as SQL injection, as well as improved incident detection and response time and a reduction in false positives, all of which help strengthen application security and improve operational efficiency for the security team.
I am using the WAF alongside Check Point Quantum Security Gateway, although it is not integrated with the WAF. I am only using the WAF for my application side.
In my experience, Check Point CloudGuard WAF is very effective at preemptively blocking zero-day attacks and detecting hidden anomalies, unlike traditional WAFs that rely mostly on signature-based detection, as it utilizes AI-driven behavior analysis and contextual learning.
Check Point CloudGuard WAF has helped reduce my false positives.
In my experience, Check Point CloudGuard WAF provides significant efficiency improvements compared to traditional WAF solutions, which rely on static signature-based rules, whereas CloudGuard learns the normal behavior of the application, detects suspicious patterns, and blocks attacks without constant manual rule creation.
My advice for organizations considering Check Point CloudGuard WAF is to clearly understand their application architecture and traffic patterns before deployment to help the WAF learn normal application behavior faster and reduce false positives and to consider starting with monitoring mode. I would rate this solution a 9 out of 10.
Solid Protection with Machine Learning; Console Improvable
What do you like best about the product?
I greatly appreciate the machine learning engine of Check Point CloudGuard WAF for prevention, because it automates much of the complex work of rule management, drastically reducing false positives. I don't have to write custom rules from scratch and the policies adapt well to real traffic after the initial learning period. Additionally, I like the security policy updates that come from the cloud without me having to intervene manually. The preemptive bot protection is very effective, clearly distinguishing between good and malicious bots, and the automatic API discovery is convenient for mapping APIs and detecting unprotected endpoints. The unified console for policy management across different environments, cloud and on-prem, is very useful to avoid maintaining separate stacks.
What do you dislike about the product?
The management console could be improved; sometimes you have to click too many times to find specific information, and the logging system is not granular enough during troubleshooting. The documentation lacks concrete examples for real use cases, and more practical troubleshooting support would be helpful. Integration with Splunk requires writing custom parsing, and support for configuration as code has room for improvement.
What problems is the product solving and how is that benefiting you?
Check Point CloudGuard WAF manages false positives using machine learning, better protecting APIs and reducing bot traffic. It unifies management on cloud and on-premises, simplifying work compared to the past, but the management console has room for improvement.
Cloud security has strengthened risk posture and improved advanced threat visibility
What is our primary use case?
I use Check Point CloudGuard WAF for CSPM and posture management. In some places, I use native app protection-related management, and in other places, I use it for runtime protection. These are all some of the use cases I have utilized it for. I also use it for CASB in some locations, compliance assessment, adaptive access control, UEBA, policy enforcement, and threat protection. I have performed all of these functions using firewalls.
Traditional WAF with Check Point CloudGuard WAF has some features that could be integrated inside the WAF that might be helpful. I normally use a separate tool for API security, and I used to perform OWASP top 10 or 20 assessments. Not everything falls under WAF.
However, if it is included, especially in today's market where AI-related features are all integrated, that would be tremendously helpful. AI and modern viruses such as token theft, tool poisoning, command injection, unauthorized access, and prompt injection are all concerns. If you have prompt injection detection in Check Point CloudGuard WAF, that would be the greatest help for the market. I would give you one more thing called a rug pull attack. Prompt injection is critical to address. Today everything is prompt-based and AI-based, and there will definitely be some bots. Those bots will definitely cross this WAF. There are some modern AI-based vulnerabilities such as token theft and tool poisoning. Tool poisoning means that some malicious command will be hidden inside, and then passwords will be saved insecurely. This happens everywhere, sometimes by mistake or unintentionally, but these mistakes are what allow hackers to penetrate. Token theft, tool poisoning, token passthrough, command injection, rug pull attack, unauthenticated access, and prompt injection are all seven major problems for people like me, CISOs.
What is most valuable?
I have worked as a customer, partner, solutioner, and implementer. I have been with Check Point since Check Point NG's time. Check Point launched the new generation around 2000 if I understood correctly, and I have been with Check Point since then.
These kinds of Israeli products are strong, clever, and powerful tools. They are all strong, clever, and powerful tools compared with American products, to be honest and upfront. Palo Alto has beaten Check Point in the recent past by bringing these creamy layers of Israeli companies into their organization, if I understood correctly.
I am a CCSE by the way. Check Point Certified CCSE. I have been holding this certification for quite some time. In short, Check Point CloudGuard WAF is a powerful tool. In short, its look and feel is also not something everyone will like. People like me, a rare breed, will like Check Point CloudGuard WAF. Not everyone, to be honest.
There are some scoring companies I have worked with that focus on security scoring, risk scoring, and prioritization. These are all very good in Check Point CloudGuard WAF, I would say. Advanced threat detection is also fine. Check Point CloudGuard WAF also provides threat intelligence for us, which includes actionable information about current and emerging security threats. Check Point CloudGuard WAF produces all kinds of reports that involve collecting, analyzing, and sharing data about threat actors and their TTPs and IOCs. It is also strategic, tactical, technical, and operational. I like their threat intelligence products. It is strategic, tactical, technical, and operational.
What needs improvement?
There are some API gateway and API securities I mentioned. If these are incorporated with AI-related features, particularly those seven key vulnerabilities I mentioned—token theft and tool poisoning—that would be beneficial. AI-related features are not included yet in Check Point CloudGuard WAF. However, they are present in FortiGate. That is the advantage of FortiGate now. FortiGate is stopping all AI-related vulnerabilities now. FortiGate has this capability. It is unfortunate that even Palo Alto also lacks one or two of these features.
Check Point Quantum is very good, without a doubt. However, their capabilities are not in comparison with Palo Alto. There are some features, but there are some gaps in comparison with Palo Alto.
For how long have I used the solution?
I have been using this solution for a few months only.
What do I think about the stability of the solution?
I have not encountered glitches. There is something called implicit deny. Until I face any issues on the network as a CISO, such as issues due to the firewall being down or glitches, or if any vulnerabilities penetrated in, then I would be worried. However, by default, Check Point CloudGuard WAF will not be configured in that way.
How was the initial setup?
Based on what the customer is requesting, if the customer wants some third-party integration, such as Wazuh, which is a SIEM tool, or they want to deploy with some open source product, then complexity comes in. However, if we are only installing Check Point CloudGuard WAF, the deployment is very nice and very cool. Check Point CloudGuard WAF has very nice videos, deployment documents, and deployment guides available. I have seen it, run it, and installed it in various operating systems and appliances, as well as virtual appliances in the cloud.
What was our ROI?
I have seen ROI. However, when I am not worrying about the cost, I am also not worrying about the ROI. Selling a product is not my job. I am a CISO for a service organization. If you want, I will create the solution. When someone is requesting a solution, if that someone is also requesting ROI information, then I will give all of those metrics. However, it is a rare case that they will request ROIs, because I am not going to worry about the cost of the product. I am worrying about the features and vulnerabilities. Reduction of vulnerabilities is important. I hope you understand.
What's my experience with pricing, setup cost, and licensing?
Check Point CloudGuard WAF is expensive. It is a little bit expensive. You cannot avoid this from an Israeli product. Israeli products follow a certain pricing model. If they could reduce the cost a bit, then they can compete with Palo Alto. Palo Alto is leading, Cisco is down, and Palo Alto is coming up. There is something peculiar in the market. Cisco for the last three or four quarters has been very down. In fact, last year they made very less profits. However, Palo Alto was somewhere in the cloud. Check Point CloudGuard WAF is also coming up, but not the Palo Alto.
Which other solutions did I evaluate?
We do not care about alternate solutions. We never care about the cost. There is something called pair-wise comparison. I am a CISO, by the way. When any of the clients are in a process of deploying a firewall or global firewall for their organization, they will come to me and request, "CISO Krishna, why can't you give me the top three or four firewalls in the market?" I normally say the first one is Palo Alto, FortiGate, and then Check Point Quantum. These are the three top firewalls I usually recommend. I have a readymade PowerPoint deck in comparison, a pair-wise comparison with these three. In that comparison, there is the cost of each one and everything.
Cost is normally something I do not worry about. I will explain to the client, and it is their responsibility. Finally, they will choose the cheap one. Many people are going with FortiGate. And some people come to Check Point CloudGuard WAF. Rare people go for Palo Alto, or someone is really worried about their security, like banking organizations or financial institutes, those people go for Palo Alto.
I will not give any total cost of ownership about the product. I will give the features for this cost. I will explain the advantages, disadvantages, pros, and cons of each product, and then I will present it to the customer. It is up to the customer who will select the product, and we will also recommend. Sometimes we recommend Palo Alto, sometimes we recommend Check Point CloudGuard WAF, sometimes FortiGate, and sometimes other firewalls. In many places, we will not recommend. We will give it as it is. That is called pair-wise comparison. We will compare it and give it to the client, and it is the client's responsibility to choose their own product.
What other advice do I have?
I also use Orca and Palo Alto. With the four products — true positive, false positive, true negative, false negative — these are problems everywhere. That is the reason I recommend this tier-one firewall companies to the client. Out of ten, maybe one or two might be false positives.
Great Protection Without the Need to Be a Pro
What do you like best about the product?
CloudGuard WAF is an excellent non-cloud choice to keep the applications or website secured without being a security expert. It hides the background or ground level details of application and acts as a barrier layer in front of your site and automatically blocks unauthorized and DDos and others attacks.
What do you dislike about the product?
Just liek any other software out there Cloudguard does have some complex and rigid configuration policies which i really feel aren't worthy.
Sometimes configuration takes more time than actual benefits.
What problems is the product solving and how is that benefiting you?
It actually secures applications by just exposing it via secured channel which is more beneficial or public apps.
Its inbuilt support to stop the bot, SQLi, heavy body, DDos and more traffic is really appreciative of.
We can configure our own security rules to make sure what is allowed and what is not.
AI-Driven WAF with Minimal Manual Tuning
What do you like best about the product?
I like Check Point CloudGuard WAF because of its contextual AI that delivers near-zero false positives and automatic zero-day protection. I find it extremely valuable for providing strong automatic protection against zero-day threats with almost no false positives and requiring zero daily tuning effort.
What do you dislike about the product?
One area that could be improved is the initial learning period for very complex or highly dynamic applications, which sometimes requires a bit more manual exception tuning than I'd prefer in the first few weeks. Also, the initial setup/learning phase for complex apps can be a bit involved, and pricing feels premium, though the low-maintenance protection usually justifies it for serious environments.
What problems is the product solving and how is that benefiting you?
I expect Check Point CloudGuard WAF to solve zero-day attack exposure and reduce manual tuning and false positives. It offers strong, automatic protection with contextual AI, near-zero false positives, and minimal daily management, making it valuable for securing our cloud/web environments.
Effective Security with Easy-to-Use Interface
What do you like best about the product?
I like the Check Point CloudGuard WAF's GUI, which is very easy to use. It effectively helps in providing security to applications by allowing and blocking IPs, which is especially useful as we work on zero internet in our project. If we know an IP is part of our internal or external client, we can easily allow that IP. Check Point CloudGuard WAF's security is a key reason why we switched from using Azure Firewall.
What do you dislike about the product?
I think internal DNS needs to be removed. Also, the initial setup isn't easy, and when we try to resolve any ip it getting resolved but not from given source
What problems is the product solving and how is that benefiting you?
I use Check Point CloudGuard WAF to provide security to our application, allowing us to manage IPs by allowing internal and external client IPs and blocking others.
Effortless Hybrid App Security and Rock-Solid API Protection
What do you like best about the product?
What really stands out to me is how easy it is to manage across our hybrid environment it doesn’t care if our apps are in AWS, Azure, or on-prem, everything just works. The SSL offloading took a massive load off our backend servers, and the API protection has been rock solid. Honestly, I don’t have to think about WAF configs anymore, and that’s the dream.
What do you dislike about the product?
The reporting and logging could definitely be more intuitive I usually end up exporting logs just to make sense of them because the built-in tools feel clunky. Also, the dashboard sometimes takes a few extra seconds to load, which is more annoying than it should be for a product at this price point. Minor frustrations, but they add up.
What problems is the product solving and how is that benefiting you?
We were drowning in alert fatigue our old setup would ping us for every tiny anomaly, and half the time it was just noise. CloudGuard actually filters out the garbage and tells us what really needs attention, so my team can focus on actual threats instead of babysitting logs. It’s cut our incident response time in half and honestly made work a lot less stressful.
Lower TCO and DevOps-Friendly Nano Agent
What do you like best about the product?
Total Cost of Ownership (TCO) is often lower because you don't need a full-time engineer just to babysit the WAF rules. The Nano agent is perfect in a devops environment
What do you dislike about the product?
Frustration where troubleshooting deep technical bugs results in a loop of being told to wait for a specific "hotfix" rather than receiving immediate configuration help.
Slow Response for Lower Tiers: If you aren't on a high-tier support plan, getting an L3 engineer on the phone for a P1 issue can take longer than desired.
What problems is the product solving and how is that benefiting you?
CloudGuard WAF uses contextual AI to stop manual rule tuning and alert fatigue. It solves the "zero-day gap" by blocking threats like Log4Shell preemptively. Benefit from a 0.81% false positive rate and auto-API discovery that finds "shadow" endpoints. While pricey and complex to license, it saves massive dev time via automation.
Web protection has simplified basic rule setup but still needs better multi-site flexibility
What is our primary use case?
I am using not only Fortinet, but I am also dealing with other vendors as well, such as Check Point. I am working with email security by Check Point. I have a little bit of experience with Check Point CloudGuard WAF, as we ran a proof of concept here.
What is most valuable?
The efficiency improvements provided by Check Point CloudGuard WAF are something I can describe. It was fairly easy to set up Check Point CloudGuard WAF if you are looking at the basic configuration. It was pretty acceptable with setting up rules, and so forth. If you were looking for advanced configurations, then you had to go for a different setup, and that made it a little bit complicated.
In terms of efficiency, Check Point CloudGuard WAF is very straightforward to set up rules because you really do not need to do much customization, as it is the case with all Cloud WAFs.
I have been familiar with Check Point CloudGuard WAF for about six months.
What needs improvement?
Check Point could improve or add more flexibility when it comes to migrating to different sites. Multi-tenancy is an area where Check Point has room for improvement.
How are customer service and support?
From what I saw, the customer support by Check Point was pretty good, but they were trying to sell it to us, so I would rate it eight out of ten.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I have experience with FortiWeb, although we just stopped using them. We used to have FortiWeb for the last few years, but now we have actually stopped using them.
Which other solutions did I evaluate?
The price of Check Point CloudGuard WAF is not expensive, as it was the cheapest solution we found. There is good competition for Check Point CloudGuard WAF at the moment, with big players in the market.
What other advice do I have?
If we selected Check Point CloudGuard WAF, which we did not, it would certainly be much cheaper. I would recommend Check Point CloudGuard WAF to others at a rating of seven out of ten. I would recommend it if you have a simple setup, then it is cheaper and it does the job. My overall review rating for Check Point CloudGuard WAF is seven out of ten.
Cloud security has improved and now consolidates multiple applications under one flexible firewall
What is our primary use case?
I can use Check Point CloudGuard WAF for multiple purposes, as I am using it as our cloud security posture management tool. I have started using it since cloud security posture management was sold to Wiz. Wiz is another product these days. I have started using Check Point CloudGuard WAF along with bot protection and API protection.
What is most valuable?
Check Point CloudGuard WAF provides great visibility and flexibility to use multiple FQDNs in a single load balancer. I am using multiple products with a similar solution, such as F5 and Check Point CloudGuard WAF. F5 operates with the discovery module and the API protection module only on a number of FQDN basis. This is a great, flexible option where I can implement multiple applications using a single load balancer.
The total cost of ownership has definitely reduced for my application firewall because there is no limitation on the load balancer for implementing FQDNs. FQDN is a fully qualified domain name. For example, I have an application on the load balancer with a.novaktech.one, and similarly, b.novaktech.one is another application, while c.novaktech.in is a third application. I can implement multiple FQDNs in a single load balancer.
Regarding the false positive rate, Check Point CloudGuard WAF has helped to reduce it as it gives more true positive cases rather than false positives. The technology leveraging Check Point's security provides threat intelligence where I can get DDoS and attack signatures and all AI/ML-based signatures. The false positive rate is very low. The approximately reduced false positive rate is about seventy percent. No product will give one hundred percent accuracy, but it detects seventy percent.
What needs improvement?
I see areas for improvement primarily on the reporting functionality front, as there are very limited functions in the reporting section. For example, I want to run a consolidated dashboard for the last six months, but it is not available.
Reporting functions alone have limitations, and sometimes this portal has latency issues when loading pages. Since I am using it as a SaaS platform, sometimes the loading pages take more time.
Regarding the Breach Reduction feature, I had a discussion with the Check Point account manager and pre-sale representative, but they have not yet provided a proof of concept demo. We are still in discussion.
For how long have I used the solution?
I am using the product for more than six months.
What do I think about the stability of the solution?
Regarding stability, I see no issues. Check Point CloudGuard WAF is quite stable and very reliable.
What do I think about the scalability of the solution?
I would say scalability is not a challenge with Check Point CloudGuard WAF, and there are no issues with scalability.
How are customer service and support?
The technical support from Check Point is good, especially since I am new to this particular product. They are providing good support currently.
How would you rate customer service and support?
How was the initial setup?
Check Point CloudGuard WAF is easy to deploy.
What other advice do I have?
If I were to rate the support from zero to ten points, I would give them nine points.
If I were to rate Check Point CloudGuard WAF on a scale from zero to ten points, I would give it nine points.
Regarding the solution's ability for preemptive blocking of zero-day attacks and detecting hidden anomalies, zero-day protection with Check Point products is very less compared to all other vendors. For example, I am using Fortinet and F5 as well. Every forty-five days, I have to forcefully update my firmware and other aspects, while I have never seen much zero-day vulnerability on Check Point CloudGuard WAF. Yearly, I only do the patch management and firmware upgrade. Compared to other service and security providers, the zero-day vulnerability on Check Point is very less. I know this because I am using all the products and understand the challenges. Check Point CloudGuard WAF has very low zero-day vulnerability, which is evident in security reports. My overall rating for this solution is nine out of ten points.