Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Great API integration, good pricing, and offers good security
Pros and Cons
  • "It is a very scalable and stable solution."
  • "CloudGuard for Application Security, like the other Check Point applications, has been presenting major latency problems when entering their administrative portal."

How has it helped my organization?

CloudGuard for Application Security came to provide a layer and organization of security to our company. The management of the devices became easier and faster to manage. In addition, the tool had very good reviews since it is the one in the market with the best detection rate of threats.

The solution is scalable, reliable, and does not present many false positives. 

In addition, CloudGuard for Application Security helped us with its AI. With the ability to assess vulnerabilities, it helps us with the best practices to implement in the company.

What is most valuable?

CloudGuard for Application Security one of its most valuable features is that it can be integrated into an API more easily and effortlessly. 

It is also a very scalable and stable solution. That is one of the points that a company looks for when implementing something like this in an organization. 

With this tool, we have been able to release the overload that was being caused in the IT department and be able to focus on other security functions and thus be able to apply all good practices and be able to manage security 100% of the time. 

What needs improvement?

CloudGuard for Application Security, like the other Check Point applications, has been presenting major latency problems when entering their administrative portal. That should be one of the priorities to take into account. 

They must also improve the support provided to the client and improve the documentation library. 

The tool fulfills the functionality very well. Hopefully, the next improvements will surprise us with something new since at present it fulfills the security expectations very well.

For how long have I used the solution?

it was implemented approximately one year ago.

Buyer's Guide
Check Point CloudGuard WAF
May 2024
Learn what your peers think about Check Point CloudGuard WAF. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
770,428 professionals have used our research since 2012.

What do I think about the stability of the solution?

The stability it presents is excellent. It goes up to 100%.

What do I think about the scalability of the solution?

The scalability that it presents is very good.

How are customer service and support?

The support must be improved. It presents a lot of deficiency.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No previous solution was implemented.

How was the initial setup?

The configuration is very simple and the product is easy to implement.

What about the implementation team?

We had an engineer that helped us with the implementation. Overall, it was fast and good.

What was our ROI?

The investment that is made is an investment that will be reflected in the security. It's worth it. 

What's my experience with pricing, setup cost, and licensing?

The cost is competitive in the market.

Which other solutions did I evaluate?

We wanted to continue with the same horizon as we have several Check Point solutions in our environment.

What other advice do I have?

The solution works very well. They just need to improve the support and documentation.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Nagendra Nekkala - PeerSpot reviewer
Senior Manager ICT & Innovations at Bangalore International Airport Limited
Real User
Top 5Leaderboard
Performs health checkups but needs to improve integration
Pros and Cons
  • "The tool performs device health checkups and updates us. It helps us to be compliant with regulatory policies."
  • "Check Point CloudGuard Application Security needs to improve updates on integrations. It also needs to incorporate real-time monitoring features."

What is our primary use case?

Check Point CloudGuard Application Security helps us ensure the security of contact devices and meet audit requirements for compliance. 

What is most valuable?

The tool performs device health checkups and updates us. It helps us to be compliant with regulatory policies. 

What needs improvement?

Check Point CloudGuard Application Security needs to improve updates on integrations. It also needs to incorporate real-time monitoring features. 

For how long have I used the solution?

I have been using the product for two years. 

What do I think about the stability of the solution?

We encountered stability issues during the configuration. The tool's stability is good. 

What do I think about the scalability of the solution?

Check Point CloudGuard Application Security is scalable. My company has 1000 users for it. 

How are customer service and support?

The tool's support is good. 

How would you rate customer service and support?

Positive

How was the initial setup?

Check Point CloudGuard Application Security's deployment is easy and completed in six hours. You need two to three resources to handle the deployment. You need proper training to do it. 

What's my experience with pricing, setup cost, and licensing?

The tool's licensing costs are yearly and competitive. 

What other advice do I have?

I rate Check Point CloudGuard Application Security an eight out of ten. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point CloudGuard WAF
May 2024
Learn what your peers think about Check Point CloudGuard WAF. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
770,428 professionals have used our research since 2012.
Project Manager at Digitas APAC
User
Top 5
Great support, excellent ROI, and good performance
Pros and Cons
  • "It provides advanced analytics that gives each team time to prepare for any threat that might occur in the future."
  • "The coding configurations can be simplified to save time for IT teams and developers."

What is our primary use case?

This solution safeguards applications that are hosted in the organization's cloud servers. 

It monitors the performance of applications from the deployment stage to the implementation of assigned tasks. 

Check Point CloudGuard Application Security blocks any cyber attacks channeled to destroy confidential data. 

Configuration of this platform with other tools took place efficiently without any challenge. The set security features alert the IT team when there are external threats that can affect workflows. the organization's networking infrastructure is ever secure since we deployed this product.

How has it helped my organization?

The solution has comprehensive security cover for the cloud applications, which has been a great achievement in the organization since we deployed this platform. 

It provides advanced analytics that gives each team time to prepare for any threat that might occur in the future. 

Enhanced data intelligence helps us to plan and turn provides analytics into actionable insights. 

Safeguarding applications has enabled members to focus on more productive activities without fear of being attacked. The set of security tools enables each app to perform its role without external interference.

What is most valuable?

Sensitive data exposure has enabled us to plan and make reliable decisions based on the work environment. 

The product has confirmed to each department that the injection of new data into the systems is highly secured to enhance transparency. 

Security misconfigurations enable the IT team to rearrange application codes and take full control. 

Insecure deserialization provides a comprehensive report of applications that enables the IT team to identify malicious coding and execute it in advance before it affects workflows.

What needs improvement?

The coding configurations can be simplified to save time for IT teams and developers. 

Insufficient logging among applications breaches security, and this may lead to undetected malware attacks contributing to data compromise. 

The set security tools target known vulnerabilities, and when there is an outbreak of new viruses, it may not be noticed, easily exposing data to cyber attackers. 

Broken access control enables members to gain unauthorized access to saved files allowing them to edit accounts to enable other users to gain access. The software has great capability of preventing data with the set organization policies.

For how long have I used the solution?

I've used the solution for nine months.

What do I think about the stability of the solution?

This platform is stable, and the performance is excellent.

What do I think about the scalability of the solution?

I am impressed by the scalability.

How are customer service and support?

There is great support and cooperation from the customer service team.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with a similar solution.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

The vendor team was responsible for the full deployment.

What was our ROI?

There is increased ROI from improved application security.

What's my experience with pricing, setup cost, and licensing?

The cost and setup are good, depending on the company size.

Which other solutions did I evaluate?

I have no experience with other security products on the market.

What other advice do I have?

This platform is good for safeguarding cloud applications.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Java Developer at EROAD
User
Top 5
Guards privacy, protects data, and offers good security configuration
Pros and Cons
  • "After integrating AppSec with other applications, team members can easily work without fear of confidential information exposure."
  • "The creation of security profiles for each application takes a lot of time."

What is our primary use case?

This security management system allows teams to evaluate the performance of applications and identify vulnerabilities that could affect performance. 

It has deployed reliable security measures that can easily detect any potential data leaks and cyber-attacks. Before we develop any application Check Point CloudGuard Application Security provides the best data protection tools that be configured easily with the new application. We have been able to scale down workflows and monitor appropriately the entire production ecosystem.

How has it helped my organization?

We have prevented many potential threats that could be a major setback to our set goals. 

After integrating AppSec with other applications, team members can easily work without fear of confidential information exposure. It has really empowered employees with modern online security measures that can affect business progress. 

Learning new security coding techniques has been a great opportunity for my team and the entire organization. We have quashed many authentication and code injection attempts by ransomware attacks to secure our networking infrastructure.

What is most valuable?

Sensitive data exposure models have helped in guarding the privacy of company and customer information from landing in unauthorized hands. 

Confidential details like bank statements and the financial status of employees is very sensitive and can easily be exposed to cyber-attacks. AppSec has created a secure environment that allows members to create and manage their personal email accounts and related personal data. 

Application security configuration gives the IT team and authorized personnel to have full access and control of workflows without fear.

What needs improvement?

The creation of security profiles for each application takes a lot of time. The new release can have a unified security control system that can access the security situation of all applications from one single source. 

The system blocks some authorized data entries that are not threats. AppSec could easily deploy a system with set commands that can be used to block unsafe operations and authorize areas of interest based on the user's needs. I have loved the way this software works, and I am impressed by the increased security across the applications.

For how long have I used the solution?

I've used the solution for eight months.

What do I think about the stability of the solution?

It is stable throughout.

What do I think about the scalability of the solution?

This software is good and the performance is excellent.

How are customer service and support?

The customer support staff is dedicated to delivering the best services ever.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We decided to test the performance of this product for the first time, and it impressed the departments.

How was the initial setup?

The setup process was straightforward, and the vendor guided us effectively.

What about the implementation team?

Deployment took place through the vendor team.

What was our ROI?

ROI has increased from 40% to 65% in eight months.

What's my experience with pricing, setup cost, and licensing?

The price is good for all businesses.

Which other solutions did I evaluate?

I did not consider other options.

What other advice do I have?

We could not have prevented many external attacks without AppSec. I am happy due to its great performance.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
Great security tool, intuitive tool
Pros and Cons
  • "The portal is quite intuitive."
  • "We would like the solution to be more economical since it is not accessible to all clients."

What is our primary use case?

We require the use of a solid security tool for our websites provisioned in Microsoft Azure App Service, which is used for internal use by the company and for external use by the client.

The key requirements that we needed to solve were to have automated protection, to have little administration in addition to providing few false positives, all this was successfully solved or provided through CloudGuard Application Security, in addition to the fact that we were able to centralize everything in the whole family. 

How has it helped my organization?

Thanks to the centralized use of Check Point CloudGuard App Security we managed to have protection for our Windows and Linux sites, in addition to having little interaction with exceptions due to having this tool in prevention mode.

This tool does not require a lot of learning time, it is incredible. With other tools, adaptation time is required, which with Check Point is not necessary.

We have also been able to find a sensible implementation of the application, providing confidence and business peace of mind.

What is most valuable?

Check Point CloudGuard Application Security offers us many virtues, the ones we liked the most were:

  • Very few false positives, which generates a lot of confidence in the product
  • The portal is quite intuitive
  • The solution does not require much time to adapt to the sites and applications it protects.

In itself, the application really meets our expectations. At the management level, the solution is what was needed to protect this area of the company's infrastructure.

What needs improvement?

This Check Point solution is an extremely complete security solution, it is really amazing. However, there are always improvements that can be made to all of the tools.

We would like the solution to be more economical since it is not accessible to all clients or is a point of consideration.

Regarding the documentation, starting implementation was not so clear. We had to validate several guides until we could do it correctly.

Finally, we would like the Infinity portal perform better.

For how long have I used the solution?

During this last year we have been adding the use of CloudGuard checkpoint for the protection of our infrastructure in Microsoft Azure.

What do I think about the scalability of the solution?

It is a cloud solution, managed by Check Point. So far we have not had performance problems.

Which solution did I use previously and why did I switch?

We previously tested Microsoft Azure Application Gateway with the WAF feature. However, two points led us to switch to Check Point:

1- We wanted a centralized security environment. We already have Check Point solutions based on the infinity checkpoint portal.

2- The WAF solution required more time in detection mode.

What's my experience with pricing, setup cost, and licensing?

Costs are an important issue to discuss with the partner. Validate the documentation and its scope to validate if they meet corporate requirements.

Which other solutions did I evaluate?

We always evaluate the solutions in the market to make the best decision.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Top 5Leaderboard
Help s guarantee that applications are secure, protected, and resistant to attacks
Pros and Cons
  • "The solution offers sophisticated security techniques with unique characteristics that can be particularly valuable for the financial sector, which is where we develop apps."
  • "Deeper and more transparent integration between Cloud Application Security and analysis monitoring tools could be very valuable - although the solution currently offers integrations with third-party security tools."

What is our primary use case?

As one of the solutions that we need for protection at the API level, we have found the level of attack detection needed to comply with the internal regulations of the corporation.

It protects both financials and identity searches. It is a new generation of security that can help us seek, implement, and select different brands products for enhanced protection. This is important due to the acceleration and development of many applications. It helps us reduce the risk of vulnerability in productive applications. 

How has it helped my organization?

The use of CloudGuard Application Security protects the page and online web services against SQL injection attacks. This prevents attackers from accessing our databases and stealing financial information from customers. These services help identify and fix vulnerabilities in our application and allow us to identify when there is a vulnerability, such as a code injection, and click on the site to see recommendations in order to fix issues before attackers can exploit weaknesses.

What is most valuable?

The solution offers sophisticated security techniques with unique characteristics that can be particularly valuable for the financial sector, which is where we develop apps. It helps us to guarantee that financial applications are secure, protected, and resistant to attacks, which is essential to maintain trust and reputational power with any client that is subscribed to our services.

What needs improvement?

Deeper and more transparent integration between Cloud Application Security and analysis monitoring tools could be very valuable - although the solution currently offers integrations with third-party security tools. Still, a deeper integration could provide better visibility of all the threats. It would be ideal if they could be found in real-time, allowing our financial or security team to offer a more effective response to attacks. 

For how long have I used the solution?

I've used the solution for two years.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 5Leaderboard
Easily deployed with good visibility and excellent security capabilities
Pros and Cons
  • "By using a cloud application security solution, our company can save costs by reducing the need for additional security hardware and software and improving operational efficiency."
  • "A feature we'd like to see in the future is something that could protect against other attack vectors, with a focus on application protection."

What is our primary use case?

We were looking for a solution that met the following criteria: 

  • A web application security solution that uses real-time attack prevention techniques and vulnerability scanning to protect applications and data running in public or private cloud environments. 
  • Monitoring and logging of application traffic to detect anomalies and suspicious attacks.
  • Integration with automation and orchestration tools for cloud application security management and scalability. 
  • Detection and prevention of SQL injection attacks, cross-site scripting (XSS), and other types of injection attacks. 

How has it helped my organization?

The product benefits my business by giving enhanced protection for useful cloud applications. 

Using enhanced visibility and analytics, the product provides visibility into security. By using a cloud application security solution, our company can save costs by reducing the need for additional security hardware and software and improving operational efficiency. 

With this product, we are achieving regulatory compliance. CloudGuard Application Security can help businesses meet security regulatory requirements, which makes for an outstanding organization. 

What is most valuable?

This cloud web application security solution can be quickly and easily deployed in public or private cloud environments, allowing a company to protect web applications and reduce downtime quickly. 

This solution provides us with enhanced visibility, giving us the ability to provide web application security analysis in the cloud.

What needs improvement?

A feature we'd like to see in the future is something that could protect against other attack vectors, with a focus on application protection. We need to protect against other attack vectors like network or device email attacks in order to provide the greatest protection possible. It is very understandable that there are many characteristics of an attack, including if it is from the inside or outside the organization. However, it would be important to validate threats and have all manner of solutions on hand to help protect the company.  

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Jefe De Infraestructura at a real estate/law firm with 201-500 employees
Real User
Top 20
Excels in providing robust protection against cyber threats while offering seamless management, scalability and responsive support
Pros and Cons
  • "It seamlessly protects through machine learning, giving us visibility into potential attacks and where they come from."
  • "There are occasions when it interfaces with other systems, leading to a loss of visibility."

What is our primary use case?

We implement it to protect applications and APIs across multi-cloud environments.

How has it helped my organization?

The primary advantage we experienced was in terms of security capabilities. Previously, our proxy solution lacked this level of protection, but with Check Point, we now benefit from streamlined management and complete visibility.

What is most valuable?

One of its most significant benefits is its ability to defend against a diverse array of security threats, without needing a specific configuration. It seamlessly protects through machine learning, giving us visibility into potential attacks and where they come from.

CloudGuard Application Security's ability to safeguard our applications from threats without depending on signatures is crucial. The intelligence behind its operation gives us the impression that it's being overseen by a human, evaluating whether activities are benign or malicious. It consistently provides accurate responses without requiring constant intervention from us.

In terms of its performance, CloudGuard Application Security boasts remarkably low rates of false positives. Occasionally, in certain implementations or configurations of additional functionalities, it may detect new elements as potentially intrusive, prompting proactive protection measures. However, meticulous programming and clear delineation of release parameters are necessary to address such instances effectively.

The solution has effectively lowered our overall cost of ownership for the web application firewall. Without the protective function of the firewall in place, issues are bound to increase. Therefore, it's crucial to configure it correctly to ensure that the internal intelligence can operate seamlessly with the application.

We opted not to utilize our cloud vendor's web application firewall since we have minimal cloud applications, primarily relying on those managed by CheckPoint. This decision is critical for securing our internal organization's work effectively.

What needs improvement?

We recently had a discussion about the challenge of API discovery and protection. There are occasions when it interfaces with other systems, leading to a loss of visibility. It would be advantageous to improve this aspect.

For how long have I used the solution?

We have been working with it for two years.

What do I think about the stability of the solution?

The stability is commendable. Since implementation, we experienced only one interruption due to an update, which was promptly resolved.

What do I think about the scalability of the solution?

The scalability is highly commendable, continually evolving in this aspect.

How are customer service and support?

The technical support provided was excellent. Whenever we encountered complex configurations, we could easily engage with them for clear guidance, and the assistance provided was satisfactory. They demonstrate high effectiveness, and their response time is prompt. I would rate it nine out of ten.

How would you rate customer service and support?

Positive

What about the implementation team?

The deployment model of CheckPoint relies on virtual machines, such as VMware, which are implemented within our internal infrastructure. The deployment process was quick, smooth, and intuitive, as it was transparent. For deployment, we engaged a reseller to facilitate communication between CheckPoint and our organization. Additionally, we utilized their administrative services for monitoring the implementation process.

What was our ROI?

In regard to ROI, I believe that its capacity to safeguard our organization's information is highly advantageous.

What's my experience with pricing, setup cost, and licensing?

Considering all the benefits we've observed, we find the price to be satisfactory. While licenses were slightly more expensive previously, with the addition of more clients, it has proven to be reasonable.

Which other solutions did I evaluate?

We assessed several SaaS options alongside Check Point, and the primary distinguishing factor was the level of protection guaranteed by Check Point. Additionally, its maturity as a solution adds another layer of reliability.

What other advice do I have?

Based on its effectiveness in safeguarding us from potential attacks and the value it has demonstrated, I would give it a perfect score of ten out of ten.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user