Try our new research platform with insights from 80,000+ expert users
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Great centralized monitoring, alerts, and helpful integration
Pros and Cons
  • "The CloudGuard for Cloud Intelligence tool has several significant features that provide security to our company."
  • "Check Point tools need to improve the latency in the portal since they take a long time to load."

What is our primary use case?

Currently, the company I work for has implemented several cloud solutions such as Azure and AWS, in which they are migrating from AWS to Azure to have everything unified in a single environment. 

At the moment, we have different applications in both clouds, which have their own system of security in the environments. Recently, in the country there were several ransomware attacks on government companies they were the target due to this we decided to expand security a little more and it was where we made use of Check Point tools that will help us comply with a more centralized security that is more robust on all our end devices.

How has it helped my organization?

We have made the decision to centralize our security infrastructure via that CloudGuard for Cloud Intelligence tool. It has contributed a lot to security since many companies were having security problems. We decided we could be one of the few that was not violated with this tool as it gave us a lot of security and helped us avoid vulnerabilities. We were able to counteract attacks with the recommendations that the tool gave us since each point of vulnerability that we found told us how to increase security. That is how our organization was able to survive even an attack.

What is most valuable?

The CloudGuard for Cloud Intelligence tool has several significant features that provide security to our company. These are helping us to prevent misfortune. Some of these features are centralized monitoring, alerts that indicate some type of vulnerability, recommendations on how to reduce these vulnerabilities, and configuration and monitoring of policies, all based on real-time monitoring with excellent efficiency. They are very effective.

One of the most effective functionalities is integration with the cloud since a match can also be done between the two. 

What needs improvement?

Check Point tools need to improve the latency in the portal since they take a long time to load. 

They also need to improve the support a little or hire more staff since the response time is slow or the solutions take a long time to implement.

Check Point should give added value to all those customers who purchase their product by providing training so that they can certify in the tool. That way, the customer stops depending so much on support and can solve incidents themselves.

Buyer's Guide
Check Point CloudGuard CNAPP
June 2025
Learn what your peers think about Check Point CloudGuard CNAPP. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for approximately Three year.

What do I think about the stability of the solution?

The stability is very good. Even when updates are made, it has not presented any type of failure.

What do I think about the scalability of the solution?

The tool has excellent scalability.

How are customer service and support?

The support must improve the level of service and must train their staff a bit more.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Currently, we only had other Check Point tools.

How was the initial setup?

Making the investment is a bit high, however, it is very effective to make the acquisition of the tool.

What about the implementation team?

The implementation was done with the help of the vendor and an engineer.

What was our ROI?

Here it will be reflected in the long term since it is not something tangible but by making the investment in security we can have a company always working

What's my experience with pricing, setup cost, and licensing?

The cost is a bit high, however, the investment is worth it.

Which other solutions did I evaluate?

We evaluated Palo Alto and Cisco however, they forced us through Check Point at the company.

What other advice do I have?

The solution is very effective. It fulfills perfectly for what it was made to do.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Mohan Janarthanan - PeerSpot reviewer
Assosiate Vice President at Novac Technology Solutions
Real User
Top 5
Great asset detection, risk assessment, and remediation processes
Pros and Cons
  • "It offers security insights and recommendations to assist organizations in acting and remediating issues swiftly."
  • "Compliance checks on cloud resources against various industry standards and compliance framework templates need to be improved."

What is our primary use case?

CloudGuard constantly monitors cloud systems for misconfigurations and vulnerabilities that attackers could exploit. Many processes associated with cloud security management, such as asset detection, risk assessment, and remediation, are automated by CloudGuard. This allows security teams to concentrate on more strategic efforts. CloudGuard is intended to assist organizations in securing their cloud environments by continuously monitoring and analyzing cloud setups for misconfigurations, vulnerabilities, and compliance violations.

How has it helped my organization?

Many of the duties associated with maintaining cloud security are automated by CloudGuard, including asset detection, risk assessment, and remediation. 

In addition to improving compliance, this frees up security personnel to concentrate on more strategic initiatives and enables organizations to adhere to industry standards and laws like PCI DSS, HIPAA, and GDPR. 

It offers security advice and insights to assist organizations in acting quickly to address concerns. It also has automated remediation capabilities to address found problems and automatically enact security policies.

What is most valuable?

The asset detection, risk assessment, and remediation processes are only a few of the duties that CloudGuard automates while managing cloud security. This improves compliance, enables organizations to adhere to industry standards and laws like PCI DSS, HIPAA, and GDPR, and frees up security personnel to concentrate on more strategic objectives. 

It offers security insights and recommendations to assist organizations in acting and remediating issues swiftly. It also has automated remediation capabilities to address found issues and automatically enforce security policies.

What needs improvement?

Compliance checks on cloud resources against various industry standards and compliance framework templates need to be improved, to ensure that organizations meet regulatory requirements with clear visibility action controls. This can make it difficult to create and manage custom security policies. 

Cloud security posture management is a proprietary solution, which means that there is no open-source community to support it. This can make it difficult to get help with troubleshooting and other issues.

For how long have I used the solution?

We have been adopting the solution for more than a year.

What do I think about the stability of the solution?

CloudGuard is known for being highly scalable and reliable. It handles big cloud workloads with ease and may be implemented in complex cloud infrastructures.

What do I think about the scalability of the solution?

In terms of cloud solutions, the scalability was a fairly simple and entirely software-driven approach.

How are customer service and support?

The customer support is good and offers regularly updated new features and security patches. This ensures that CloudGuard is always protected against the most advanced threats.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We adopted our cloud journey last year, and while developing the cloud, we took all security precautions. CSPM was a priority solution, and we have apt.

How was the initial setup?

We implemented CSPM in 30 days. Since the solution was simple to implement and the transition was painless, we added many of our cloud environments.

What about the implementation team?

We implemented the solution through a partner.

What was our ROI?

CloudGuard's return on investment (ROI) varies based on the organization and its cloud environment.

What's my experience with pricing, setup cost, and licensing?

CSPM is an invaluable resource for any organization that makes use of cloud computing. It can assist organizations in improving their cloud security posture, reducing the risk of cyberattacks, and adhering to industry norms and regulations.

Which other solutions did I evaluate?

We evolved various CSPM tools such as PAN, TRELIX, and Fortinet, however, our management opted to install CloudGuard as a strategic step.

What other advice do I have?

CloudGuard provides a comprehensive set of security solutions for cloud environments.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point CloudGuard CNAPP
June 2025
Learn what your peers think about Check Point CloudGuard CNAPP. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Identifies issues, offers good analysis, and has automation capabilities
Pros and Cons
  • "It has an analytics service that does research for us."
  • "The solution could be improved with a greater analysis of its Microsoft Security score."

What is our primary use case?

We were in the review analysis, seeking a fast, efficient infrastructure with solid bases of data analysis and investigation. We wanted something that managed to establish and analyze systems in production so that it would not impact their use. We also wanted a visualization of our current state, with a solution that could give an example of the route that must be taken to achieve excellence in security. This tool has allowed us to achieve stronger security, allows for better analysis, and provides structure and guidance for better guides and international policies under a legal framework. 

How has it helped my organization?

It has given us a way to clearly and objectively identify items or issues before making any changes to the network. It offers assurance, after investigation, of a clear understanding of what each analysis is trying to define. We can now clearly and specifically achieve what we need to do from a security standpoint to help us make an action plan and achieve goals. Once we have the information, it is important to define and analyze the data collected, organize information in a format that makes sense to us administrators, and look for patterns or trends that may be useful for our investigation.

What is most valuable?

It has an analytics service that does research for us. This can provide valuable information to ultimately improve our infrastructure. Via research and analysis, we are able to identify problem areas. We can find trends and take action to fix problems while improving performance. 

Its fairly advanced automation allows us to simplify and speed up security management in the cloud. This includes being able to identify, correct, and validate all kinds of vulnerabilities that reduce the manual workload for each of our company's administrators, thus being more efficient. With this new efficiency, we are able to reach effective resolutions at all times. 

What needs improvement?

The tool has several specific characteristics at the Microsoft 365 or Exchange level. 

The solution could be improved with a greater analysis of its Microsoft Security score. They should be improving the visualization of data and greater coverage in Sharepoint or Teams. Its posture analysis is currently low. There could be improvement or capacity to be more efficient if we managed to achieve greater integration with Microsoft Security score, improvements in data visualization,, and greater coverage of Microsoft 365 resources.

For how long have I used the solution?

I've used the solution for one year. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Multicloud posture and review, modern, and backed by all checkpoint security.
Pros and Cons
  • "The administration portal panel is very intuitive."
  • "The guidelines to implement or to link with the clouds are not complete."

What is our primary use case?

It helped us a lot in improving the regulations and security of our cloud environments.


We still manage an on-premise environment, however, many companies at the beginning believe that the cloud is invulnerable or that the manufacturer must ensure everything, which is not correct. With this implementation, it is possible to improve all current cloud security.

In the company I work for, it was implemented to be able to have governance in addition to good practices in our Microsoft Azure environment. It's a somewhat expensive tool, however, it is worth it to be able to solve all those improvements and avoid so many modern vulnerabilities, which have their point in cloud attacks.

How has it helped my organization?

As in our company we have environments that are hybrid in some cases and others totally cloud. We find in Check Point a reliable tool to improve security, implement regulations, and generate governance in cloud environments. In our case, we have a Microsoft Azure public cloud with enough resources which we need to protect. We achieved it together with  Check Point.

It was possible to provide greater security to identities with admin access to the cloud - a critical part of IT management.

What is most valuable?

The most striking features are:

1- Identity protection generated through Check Point posture management, which is helping to prevent user theft or unauthorized access.

2- The governance that can be provided with this tool is very good since we have been able to implement good practices to avoid vulnerabilities.

3- The administration portal panel is very intuitive. It also generates scores based on regulations and good practices to go little by little with the recommendations, significantly improving security.

What needs improvement?

Some general improvement characteristics can be made, including the following:

1- Cost improvement. Some tools are quite expensive, and some non-equal manufacturers offer more comfortable capabilities at the cost level.

2- The guidelines to implement or to link with the clouds are not complete. Following them sometimes the task of implementing under the best practices of the manufacturer is not achieved.

3- Many Check Point guides are only available to partners and not to the general public. They can make a better impression by having them public and thereby helping the client.

For how long have I used the solution?

It's an excellent tool and is available in the Infinity Check Point Portal. Its main function is to centralize governance in the same administration portal and has been tested for more than a year to validate our cloud security.

Which solution did I use previously and why did I switch?

Previously we used only Microsoft with Defender for Cloud. However, we wanted to have our security centralized. Check Point through the infinity portal achieves that feature.

What's my experience with pricing, setup cost, and licensing?

It's very important to have a reliable and good partner. The proactivity helps us to see the existing needs and check with Check Point what characteristics are required.

Which other solutions did I evaluate?

We chose Check Point as it provides integrated and centralized security, improving the effectiveness of security reviews.

What other advice do I have?

Even though the cost is somewhat expensive. I recommend this solution for users who use the public cloud.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Information sharing capabilities, and excellent web portal
Pros and Cons
  • "Its monitoring and alerts are triggered by a failure or non-compliance with policies. It helps us to be able to act effectively and quickly."
  • "The costs are high."

What is our primary use case?

We wanted to have a centralized and modern security environment, and it was possible to obtain it through Check Point Infinity.

It was possible to implement Check Point CloudGuard to take advantage of cloud intelligence to analyze modern threats. The global learning that Check Point obtains from all its devices for the improvement and confidence of security.

We currently use Microsoft Azure, which has several security features, all with costs, to perform governance, control, vulnerability improvements and regulatory compliance. However, we manage Check Point.

Forensics as your monitoring portal is exceptional.

How has it helped my organization?

The features included in Check Point CloudGuard help us a lot with the security of our Microsoft Azure cloud, which we successfully integrate with Check Point CloudGuard.

We have validated the score generated to improve security performance, thereby making improvements to avoid vulnerabilities.

The threat attack is reviewed and covered in an automated manner through cloud intelligence. Its alerts have kept us notified so that we can make the necessary adjustments. It offers incredible performance.

What is most valuable?

The most important characteristics are the following:

1- The detection of vulnerabilities in real-time. Its monitoring and alerts are triggered by a failure or non-compliance with policies. It helps us to be able to act effectively and quickly.

2- The use of Check Point ThreatCloud allows sharing of information between other Check Point devices to improve trust and form of protection against new threats.

3- Finally, its security application portals are very intuitive. It has helped us with the simple handling of Check Point CloudGuard.

What needs improvement?

Some possibilities of improvements for Check Point include:

1- Improving or creating best practices that can be generated publicly so that customers can have a package of policies, for example, that the manufacturer provides in addition to easy access to this material.

2- Improvement at the support level for management, handling and solution of cases in a better, faster, and more effective way. Sometimes the cases take a long time to be able to schedule a session and solve together with the client and support.

3- The costs are high. They could provide better costs for the client to make a simpler decision and not be affected by this issue.

For how long have I used the solution?

One of its characteristics is cloud intelligence. It was adapted to our centralization and public cloud requirements.

Our company already uses several centralized products in the Check Point Infinity platform. For more than six months, we have used CloudGuard.

Which solution did I use previously and why did I switch?

We used Azure Defender for the cloud. It is good, however, I liked more the form and the trust of Check Point.

What's my experience with pricing, setup cost, and licensing?

It is always important to have access to a partner to help you with costs, and requirements and to help you choose the best option within Check Point.

Which other solutions did I evaluate?

We previously validated some solutions. However, the features of Check Point CloudGuard were better suited to our requirements.

What other advice do I have?

It is an expensive solution. However, I recommend it.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited
Real User
Strengthens and centralizes all the security infrastructure and reduces attacks
Pros and Cons
  • "It presents a real-time database that is always updated."
  • "The support it provides is not very good. They should improve it since we have had several setbacks due to support issues."

What is our primary use case?

Check Point CloudGuard Intelligence Security is one of the most robust tools on the market. That's why we decided to implement it in our company when all our operations were migrated to the Azure cloud area. 

We needed a tool that would provide security in the network and help analyze any vulnerabilities that we might face in these new environments. We wanted to be able to attack all the weak points that we have in the cloud in order to guarantee effective and stable security. We also have some applications in our systems that deserve excellent security.

How has it helped my organization?

Check Point CloudGuard Intelligence came to strengthen our security and has helped the IT department achieve excellent network security. 

In addition to that, it has helped us centralize all the security infrastructure in this tool and helped us a lot to counteract vulnerabilities that were present. With this product, we were able to reduce the rate of attacks that we had. The database that they have is in real-time and updated instantaneously. All these factors helped a lot to reduce vulnerabilities.

What is most valuable?

Check Point's CloudGuard Intelligence tool presents some features that should be highlighted. For example:

It presents a real-time database that is always updated.

The environment can be centralized within Check Point Infinity, and thus we can have several security tools.

It also presents a forensic analysis that helped us to determine the root of several issues. 

Integration with Sentinel can be made, which allows us to obtain more security data and analyze it.

It presents a portal that is relatively easy to use and configure.

What needs improvement?

The tool works perfectly and improvements should be made, if any, in various technical and administrative aspects.

For how long have I used the solution?

It was implemented approximately one year ago.

What do I think about the stability of the solution?

Check Point CloudGuard Intelligence has good stability. We have not presented performance problems or any other that would lead to a forced restart of the tool.

What do I think about the scalability of the solution?

The tool presents very good and functional scalability. To this day, we have not presented any problems.

How are customer service and support?

The support it provides is not very good. They should improve it since we have had several setbacks due to support issues.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously, there was no tool in the company's infrastructure. We needed the solution when we moved to the cloud and decided to improve security.

How was the initial setup?

The implementation of the tool is very easy. There are several steps in the wizard where it gets complicated around the configuration, however. If you do not have extensive knowledge of the tool, it becomes complicated.

What about the implementation team?

The implementation was done through the vendor, who gave us a support engineer to help us with the implementation and configuration of the tool. We also received some training.

What was our ROI?

By making an investment in security tools, we are doing ourselves a great favor. With this tool, we are protecting our information while maintaining operations. It is always a great investment to acquire these tools. Also, afterward, there is a noticeable economic return.

What's my experience with pricing, setup cost, and licensing?

Whenever an investment is made in a security tool, it is high due to many factors. that said, investing in security will provide economic returns in the short or long term since it will greatly lighten workloads and provide security.

Which other solutions did I evaluate?

We evaluated many options on the market, such as Fortinet, Sophos, and Cisco NGFW. However, Check Point had better features.

What other advice do I have?

With the time that I have used this tool, we have noticed that it is a very good solution and that it has excellent features. It provides very secure connections.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2029350 - PeerSpot reviewer
Database Administrator at Ordina
Real User
Saves time, offers great advanced detection, and offers enhanced security insights
Pros and Cons
  • "It offers advanced detection of threats that can harm data from the cloud database."
  • "The entire system is complicated, and the setup process may not cater to the company's demands."

What is our primary use case?

This software protects cloud data from security malpractices and enhances policy compliance. 

It provides full data visualization of saved workloads and workflows that runs across the organization. 

Posture Management provides data analytics from network security, enabling departments to monitor work processes effectively. 

It has deployed automatic security models across the cloud computing infrastructure to enhance best data protection practices. 

The database management team has fully benefited since we secured this product due to increased efficiency.

How has it helped my organization?

Check Point CloudGuard Posture Management has created the best data management environment that can easily monitor workloads from the entire company networking system. 

It offers advanced detection of threats that can harm data from the cloud database. 

It has saved the cost and time used before to monitor the security status of our infrastructure manually. 

The modern platform has upgraded technological models that enhance faster data transfer from one server to the other. 

It has allowed the IT team to scale and develop suitable security policies that track our daily activities.

What is most valuable?

The data governance features have comprehensive security features that block malware attacks. 

The security automation functionalities accelerate performance and close all insecurity loopholes that can expose company data to unauthorized users. 

The integrated customized security setups have complied with the set security rule sets. 

The intelligence security insights enable teams to set reliable awareness that can caution them when there are negative data threats. 

The dashboards provide summarized data representations that can be analyzed for improved performance.

What needs improvement?

The entire system is complicated, and the setup process may not cater to the company's demands. 

Tiny misconfigurations may not be detected in advance and can easily affect performance from some cloud servers. 

When the platform is overloaded with a lot of tasks at the same time, it can delay results and lead to poor security responses. 

The cost is high for small businesses that have no stable revenue-generation assets. 

Security and compliance posture reports created from the audited results have confirmed that we are doing well and the organization has stable security tools.

For how long have I used the solution?

I've used the solution for one year.

What do I think about the stability of the solution?

The product has maintained a stable performance from the time of deployment.

What do I think about the scalability of the solution?

I am happy with scaling since there is comprehensive security compliance in the organization.

How are customer service and support?

We usually have a close and productive relationship with the support team.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not yet switched to another software.

How was the initial setup?

The setup was complicated, however, the vendor support team provided effective guidelines.

What about the implementation team?

We implemented the solution through a vendor.

What was our ROI?

We have recorded a high ROI growth rate.

What's my experience with pricing, setup cost, and licensing?

The setup cost is good, and the pricing depends on the size of the company.

Which other solutions did I evaluate?

We negotiated with other service providers. The best bid came from Check Point.

What other advice do I have?

We have achieved the set objectives with Check Point CloudGuard Posture Management.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1459770 - PeerSpot reviewer
Advisory Information Security Analyst at a financial services firm with 501-1,000 employees
Real User
Security visibility accuracy is tremendous, letting us see who is trying to access what
Pros and Cons
  • "I love the work involved in maintaining and scaling security services and configurations across multiple public clouds using this solution, versus using native native cloud security controls. It is so much better. The different cloud platforms all have their own way that they handle a lot of the stuff that Dome9 handles. Even within their platform, they are in a lot of disparate places, e.g., in AWS, there are five different tools. You have to jump between them to get the same information that you can just pull in automatically on Dome9, which is just one platform. We are using multiple platforms, so that makes it even more complicated and time consuming if you had to just rely on them to get all of your information. Whereas, it's all just summarized and put together on the Dome9 end."
  • "The biggest thing is the documentation aspect of Dome9 is a little lacking. They were purchased by Check Point about a year and a half to two years ago. When they integrated into Check Point's support system, a lot of the documentation that they had previously got mangled in the transition, e.g., linking to stuff on the Dome9 website that no longer exists. There are still a lot of spaces with incomplete links and stuff that is not as fully explained as it could be."

What is our primary use case?

We pull all of our cloud platforms into Dome9: AWS and Azure as well as our Kubernetes environment. We use it for a few things: 

  1. It provides policy compliance. If we wanted to use SOX compliance or HIPAA, then we can turn on rules for that. Then, if something is in violation of one of those rules, it will let us know and we can correct it.
  2. We are able to set users, authentication, and powers, e.g., give users the ability to create networks. 
  3. We use it for log monitoring. We are able to pull in logs from cloud environments, review them, and take action.

How has it helped my organization?

Dome's security rule sets and compliance frameworks do great at helping us stay in line with various industry standards that we try to keep our company inline with automatically. We have had several examples where we have had users create machines or networks that wouldn't be in compliance with those policies. Dome9 immediately took care of them, preventing them from even being stood up. There is a lot of peace of mind with this stuff.

We are pretty thoroughly regulated for financial compliance. When we are talking to new clients or existing clients, we can point out that our cloud environment is completely in sync with the various industry standards of regulations.

The solution helps us to minimize attack surface and manage dynamic access because it automatically takes action based on the rules that we provide for it. It closes holes before they even open.

Dome9 integrates security best practices and compliance regulations well into the CI/CD, across cloud providers. This helps automate security and improve compliance posture. Rules are automated on their own. You set the policy that you want to hold your cloud environment and company to, while Dome9 is scanning your cloud platforms for those issues which are occurring at all times. If we didn't have that in place, then we would have to manually check every single network or machine that anyone stands up with a cloud. Because Dome9 is so efficient at this, anytime a machine, environment, or network gets stood up, it's able to go in and check the parameters to see if it is inline with our compliance rules.

What is most valuable?

All the features are very valuable. The policy compliance piece is probably the most valuable. It provides monitoring of your environment and whether you are actively looking at it. So, if I have a user who will try to spin up a network in the cloud that isn't inline with our policies, it will automatically stop that from being able to be created, then delete it. Therefore, it will take action whether or not we are explicitly looking at the platform, keeping it in compliance with the rest of the company at all times.

Dome9 enables customizable governance using simple, readable language. It comes with a robust tool set that they have already created with their own rules that they have already built. However, you do have the capability of going in to write your own stuff. We haven't had to do too much of that because the prebuilt stuff that they have is really good, but it is there if you need it.

Dome9's accuracy when it comes to compliance checking is tremendous. It finds issues in the environment pretty quickly when you run a scan. It will do it on an automated basis as well, so you don't have to manually scan your environment all the time. It will be constantly doing it in the background for you.

Security visibility accuracy is tremendous. A lot of that comes in as flow logs and lets us see who is trying to access what almost on a real-time basis. That is not something you usually get easily from cloud providers.

It works great at identifying, prioritizing, and auto-remediating events. Whatever scenario or set of criteria you feed Dome9, it will quickly and efficiently look for those issues in your environment and correct them.

What needs improvement?

The biggest thing is the documentation aspect of Dome9 is a little lacking. They were purchased by Check Point about a year and a half to two years ago. When they integrated into Check Point's support system, a lot of the documentation that they had previously got mangled in the transition, e.g., linking to stuff on the Dome9 website that no longer exists. There are still a lot of spaces with incomplete links and stuff that is not as fully explained as it could be. However, the product itself is really easy to use, so there is not too much of an issue with that. Also, it's not too hard to get on with the actual Check Point support to go over this stuff.

For how long have I used the solution?

I have been using it for about two years.

What do I think about the stability of the solution?

I haven't had any issues with it going down or any connectivity issues.

This solution doesn't require any post-deployment maintenance. It takes care of itself. The only stuff that you would want to do is look for new rule sets as they get added by Dome9, i.e., if you want to add anything or change it. Otherwise, you can set and forget it pretty well.

What do I think about the scalability of the solution?

It scales well. The only thing to watch out for is the licensing. We just ran into that. Dome9 will take how much you have from a cloud deployment standpoint, and you need to be appropriately licensed for it. You can't have too many cloud assets or you will exceed your license, then it stops reviewing the data that was added later.

Everyone who uses Dome9 is security at the moment. We are probably going to change that, as we are probably going to expand it in the future. We will have a lot of developers in there pretty soon.

How are customer service and technical support?

I haven't had to use Check Point's technical support in a while. I used them more back during the initial deployment, and earlier on, when the solution was just purchased by Check Point. I think the documentation could definitely use some improvement: their secure knowledge stuff. 

Which solution did I use previously and why did I switch?

Before Dome9, we just used native.

What we were doing natively wasn't sufficient. Once we saw what we were capable of doing with Dome9, that showed us all the stuff that we weren't doing with the native stuff that we could and should have been doing. Because it was so buried in there, we didn't know about it or how to do it. So, Dome9 helped us learn from a native tool perspective that there are other things that you can be doing with those tools that may not be that apparent.

How was the initial setup?

The initial setup was straightforward. A lot of the work for Dome9 is done upfront. There is an onboarding tool that Dome9 has when you want to add a cloud environment. That holds your hand and walks you through it pretty easily. It will show you everything you need to do both on the Dome9 side and on the cloud side to get the cloud environment integrated and set up. From there, the compliance rule sets that you want to apply to your company are all neatly laid out. With a single click, you can tell it that you want to run the X, Y, Z rule set against your current environment, then it will do that in a matter of minutes.

Initially, our deployment took probably a week just to get ourselves up and running. At that time, we were also trying to get the cloud deployment figured out. Knowing what we know now, we have stood up subsequent environments in minutes.

What about the implementation team?

We did the deployment ourselves. Two people were involved in the deployment process; I worked with a cloud security architect for Dome9's deployment. 

What was our ROI?

I have 100 percent seen ROI from money and time savings. We don't have to spend all day maintaining cloud environments. They take care of that for us. 

Dome9 helps our developers save time by as much as 50 percent. It prevents us from having to make them go back and redo their work. They do not even have the option to be out of compliance. It stops them from building machines and non-compliant stuff only to have to go back and redo them later, especially if Dome9 will shut that down before it even starts. A lot of people, when they get in the cloud, don't know what they're doing. So, if we're limiting the options they have available, then we see that cutting their time in half.

For security, there is a 90 percent time savings. Just having to manually check this stuff would be a nightmare, so I don't mind doing it on an automated basis.

A unified security solution across all major public clouds affects our cloud security operations by saving us a ton of time and effort. We don't have to redo things manually or check every individual environment all the time for compliance. This frees us up to build out and make a more sophisticated environment, really working on fine tuning things. We have a smaller team, so this has definitely helped us.

What's my experience with pricing, setup cost, and licensing?

The pricing is tremendous and super cheap. It is shockingly cheap for what you get out of it. I am happy with that. I hope that doesn't get reported back and they increase the prices. I love the pricing and the licensing makes sense. It is just assets: The more stuff that you have, the more you pay.

Which other solutions did I evaluate?

We didn't evaluate other solutions or vendors. We were impressed with the demo and PoC that we received.

While other vendors do have tools that are pretty good, the thing which we run into is that we have multiple cloud environments. Also, even within the cloud environments themselves, there are a lot of the tools but they are not as streamlined as the one that Dome9 offers. Dome9 pulls everything together into a single pane of glass for you.

I love the work involved in maintaining and scaling security services and configurations across multiple public clouds using this solution, versus using native native cloud security controls. It is so much better. The different cloud platforms all have their own way that they handle a lot of the stuff that Dome9 handles. Even within their platform, they are in a lot of disparate places, e.g., in AWS, there are five different tools. You have to jump between them to get the same information that you can just pull in automatically on Dome9, which is just one platform. We are using multiple platforms, so that makes it even more complicated and time consuming if you had to just rely on them to get all of your information. Whereas, it's all just summarized and put together on the Dome9 end.

What other advice do I have?

I would recommend people buy it. Design your environment with Dome9 in mind. From the ground up, let Dome9 analyze your environment and get you compliant with the rules that you need to be compliant with.

Its remediation works really well. Some of the more advanced remediation stuff can get more complicated because it involves spinning up, like Lambda functions in the cloud. That can be a more complicated procedure than some of the normal compliance remediation, but it's there and it's powerful.

We just use AWS and Azure, but they have Google Cloud Platform as well that you could use.

We are using it pretty extensively for what we are currently doing now, and we will expand that. My team manages all our cloud deployments, so we have everything that we are currently using integrated into Dome9, but we are also in the process of redoing our cloud deployment. So, instead of just building the cloud stuff, then putting Dome9 on top of it, we will be building it knowing that we will have Dome9 from the ground up.

I would rate this solution as a 10 out of 10. I love it.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Buyer's Guide
Download our free Check Point CloudGuard CNAPP Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Check Point CloudGuard CNAPP Report and get advice and tips from experienced pros sharing their opinions.