The solution's strongest point is that you can connect everything to it, giving you a full view of what's connected. If you configure it right, it works perfectly.
Chief Technology Officer at a legal firm with 11-50 employees
A robust solution that provides a unified view of connections
Pros and Cons
- "The solution's strongest point is that you can connect everything to it, giving you a full view of what's connected."
- "You need to know exactly the system. You cannot have someone running the system if they don't have the knowledge to do so."
What is most valuable?
What needs improvement?
You need to know exactly the system. You cannot have someone running the system if they don't have the knowledge to do so.
For how long have I used the solution?
I've been working with the solution for about a year.
What do I think about the stability of the solution?
The solution is stable. It doesn't matter which device is running Check Point. The solution works. It has never gone down. I rate the solution's stability a ten out of ten.
Buyer's Guide
Check Point CloudGuard WAF
August 2025

Learn what your peers think about Check Point CloudGuard WAF. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,164 professionals have used our research since 2012.
What do I think about the scalability of the solution?
My clients are large, but they are not enterprise-sized or small.
How was the initial setup?
I rate the initial setup a five out of ten because it is easy if you have the required knowledge and difficult if you are new to the system. The challenge isn't installing it: "Next, next, next, finish." Even a less knowledgeable person can do that. The challenge is configuring the system. There are a lot of blades in CloudGuard. You need to keep each type of security in your view, except for the Check Point view.
The initial setup is very fast, but you need to pray that the solution does all the work itself.
Which other solutions did I evaluate?
Other unified platforms like QRadar and Cisco are comparatively easier to use.
What other advice do I have?
You need someone knowledgeable to run the system. Today, with all the technology and everything, the company just wants to buy control and be lazy. "Let Check Point do the work." But this does not happen with Check Point because you need professional eyes. Check Point's price is very low compared to those controlling the system. You have to learn to investigate the solution to work better with it. The knowledge costs more than the system. The solution has a hybrid deployment, and I don't know a company that only chooses one deployment or another.
There is no support available for Check Point. There are things you have to look for, and that's it.
Check Point is the world's first and probably best security company. They might change its face, give it new names, separate into new models, and so on, but in the end, they are the best security company in the world. I rate the solution a ten out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer.

Security IT at a tech services company with 51-200 employees
Great security tool, intuitive tool
Pros and Cons
- "The portal is quite intuitive."
- "We would like the solution to be more economical since it is not accessible to all clients."
What is our primary use case?
We require the use of a solid security tool for our websites provisioned in Microsoft Azure App Service, which is used for internal use by the company and for external use by the client.
The key requirements that we needed to solve were to have automated protection, to have little administration in addition to providing few false positives, all this was successfully solved or provided through CloudGuard Application Security, in addition to the fact that we were able to centralize everything in the whole family.
How has it helped my organization?
Thanks to the centralized use of Check Point CloudGuard App Security we managed to have protection for our Windows and Linux sites, in addition to having little interaction with exceptions due to having this tool in prevention mode.
This tool does not require a lot of learning time, it is incredible. With other tools, adaptation time is required, which with Check Point is not necessary.
We have also been able to find a sensible implementation of the application, providing confidence and business peace of mind.
What is most valuable?
Check Point CloudGuard Application Security offers us many virtues, the ones we liked the most were:
- Easy and simple implementation from the Check Point Infinity portal
- Very few false positives, which generates a lot of confidence in the product
- The portal is quite intuitive
- The solution does not require much time to adapt to the sites and applications it protects.
In itself, the application really meets our expectations. At the management level, the solution is what was needed to protect this area of the company's infrastructure.
What needs improvement?
This Check Point solution is an extremely complete security solution, it is really amazing. However, there are always improvements that can be made to all of the tools.
We would like the solution to be more economical since it is not accessible to all clients or is a point of consideration.
Regarding the documentation, starting implementation was not so clear. We had to validate several guides until we could do it correctly.
Finally, we would like the Infinity portal perform better.
For how long have I used the solution?
During this last year we have been adding the use of CloudGuard checkpoint for the protection of our infrastructure in Microsoft Azure.
What do I think about the scalability of the solution?
It is a cloud solution, managed by Check Point. So far we have not had performance problems.
Which solution did I use previously and why did I switch?
We previously tested Microsoft Azure Application Gateway with the WAF feature. However, two points led us to switch to Check Point:
1- We wanted a centralized security environment. We already have Check Point solutions based on the infinity checkpoint portal.
2- The WAF solution required more time in detection mode.
What's my experience with pricing, setup cost, and licensing?
Costs are an important issue to discuss with the partner. Validate the documentation and its scope to validate if they meet corporate requirements.
Which other solutions did I evaluate?
We always evaluate the solutions in the market to make the best decision.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point CloudGuard WAF
August 2025

Learn what your peers think about Check Point CloudGuard WAF. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,164 professionals have used our research since 2012.
Offers comprehensive security, helps with compliance, and has good monitoring
Pros and Cons
- "The solution offers continuous security monitoring and alerting, which can help organizations detect and respond to security incidents in real time."
- "One of the big problems we found in Check Point, in general, is the support."
What is our primary use case?
The importance and use of this product were required to improve new application deployments made in the Microsoft Azure cloud. They were not one hundred percent secure, however with this CloudGuard application security from Check Point has managed to improve all these requirements to obtain greater security.
The applications are generally internal to the company, however, they are secure thanks to Check Point CloudGuard.
How has it helped my organization?
Check Point CloudGuard Application Security is a cloud-based security solution designed to protect web applications and APIs from various types of cyber threats.
This tool has managed to improve security considerably in our apps and the APIs created for the company. We have not presented problems, threats, or leaks even when some are exposed to the Internet and are more susceptible to attacks. The company is now more secure, thanks to Check Point.
What is most valuable?
The solution is created one hundred percent on the cloud; the portal is easy to manage.
The solution offers continuous security monitoring and alerting, which can help organizations detect and respond to security incidents in real time.
CloudGuard Application Security provides comprehensive visibility into web applications and API traffic
The solution offers support for compliance regulations such as PCI-DSS, HIPAA, and GDPR, helping organizations to meet their regulatory obligations.
What needs improvement?
One of the big problems we found in Check Point, in general, is the support. It is always attended very late or they take a long time to answer.
The cost of this tool is extremely high, which is why it must be analyzed before implementing it.
The support language is only English. This causes some problems in Spanish-speaking countries. They could expand the languages offered to help the client.
For how long have I used the solution?
This excellent security tool, Check Point CloudGuard, has multi-cloud security and is also perfect for secure developments. It's been used in recent years by the company.
Which solution did I use previously and why did I switch?
Previously we did not use a technology like this.
Which other solutions did I evaluate?
We always carry out tests and validations before acquiring a solution.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Administrative Assistant at Tecapro
Great security and more visibility but needs more AI capabilities
Pros and Cons
- "It offers good functionality of the application that is currently running."
- "I would like to be able to integrate the theme of Artificial Intelligence to help review issues and to monitor and view the security issue while also suggesting and interpreting and additionally configuring solutions - basically, acting as an interpreter."
What is our primary use case?
We have had the need to ensure the development of each of our applications based on the fact that the applications must be safe, fast, and efficient. We want to prevent an injection of a vulnerability attack by broken authentication, exposure of confidential data, or external entities that can inject us with xml services via broken access control. All these characteristics cause insecurity. We have looked for solutions that can guide us and establish a safe and concise baseline.
How has it helped my organization?
It has given us greater security at an organizational level. It has allowed us to use components with known vulnerabilities, which have been prevented based on their multiple databases that have correlated incidents, helping the development of applications to be fast, efficient, and safe, which is what we were looking for. Thus giving us the possibility to register, monitor, and identify technological insufficiencies or absent capacities in the development of the application.
What is most valuable?
Its most outstanding feature is the registry and the possibility of monitoring everything. When it comes to simplifying or establishing an error, an infraction, or a detection due to a breach of unauthorized access, it gives us an overview of each one of the capabilities and a segmented control over the development. It offers good functionality of the application that is currently running. It's giving us the ability to test based on vulnerable interfaces, and anomalous requests and responses. All these types of characteristics give us a reference point as to whether they are secure or insecure. We get logging monitoring and general visibility of the application.
What needs improvement?
The application allows us to have control over its activities, the management, and the interconnection of monitoring which takes advantage of computing power, is exceptional. That said, I would like to be able to integrate the theme of Artificial Intelligence to help review issues and to monitor and view the security issue while also suggesting and interpreting and additionally configuring solutions - basically, acting as an interpreter.
For how long have I used the solution?
We've used the solution for about six or seven months. That was when established applications at the cloud level.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Delivery Engineer at a tech services company with 51-200 employees
Offers comprehensive threat prevention capabilities and a user-friendly interface
Pros and Cons
- "The features I have found most valuable are the comprehensive threat prevention capabilities, automated policy management, and seamless integration with cloud environments."
- "For the next release, I would suggest considering features like enhanced threat intelligence integration."
What is our primary use case?
With CloudGuard WAF, I can deploy a cloud-based network protection solution that secures my applications, endpoints, and data.
What is most valuable?
The features I have found most valuable are the comprehensive threat prevention capabilities, automated policy management, and seamless integration with cloud environments.
What needs improvement?
For the next release, I would suggest considering features like enhanced threat intelligence integration.
For how long have I used the solution?
I have been using Check Point CloudGuard WAF for about two years.
What do I think about the stability of the solution?
The stability of the product has been good so far.
How are customer service and support?
Check Point's technical support is helpful and knowledgeable overall, but there can be delays in response, especially regarding licensing issues.
Which solution did I use previously and why did I switch?
The main reasons I chose this vendor for web application security were their ability to consolidate management facilities, their comprehensive features, and their flexibility in addressing different security needs.
What was our ROI?
We have seen ROI from using CloudGuard WAF.
What's my experience with pricing, setup cost, and licensing?
I believe that the pricing or licensing of CloudGuard WAF could be more competitive.
What other advice do I have?
Implementing CloudGuard WAF allowed me to address the challenges of securing my applications and data in a rapidly evolving cloud environment.
Using CloudGuard WAF has brought significant benefits, including improved threat protection, streamlined policy management, and enhanced usability. I noticed these advantages shortly after the first deployment.
It is extremely important to me that CloudGuard optimizes security to protect my applications without solely relying on signatures.
To access the false positive rate, I typically review assessment reports available on platforms like AWS or Azure. By evaluating how effectively the solution preemptively blocks zero-day attacks and minimizes false positives, I can reduce the total cost of ownership for my web application security.
The solution's privacy features, user-friendly web console, virtual deployment options, and physical appliance capabilities have all contributed to reducing my total cost of ownership.
Overall, I would rate CloudGuard WAF as an eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
CIO at a tech services company with 51-200 employees
Has AI feature which makes operations easy but technical support needs improvement
Pros and Cons
- "The tool's most valuable feature is AI, which makes operations easier. Moreover, it is easy to deploy."
- "I have encountered issues with Check Point CloudGuard Application Security's technical support. It also has missing configuration features."
What is our primary use case?
I use the solution for securing web applications.
What is most valuable?
The tool's most valuable feature is AI, which makes operations easier. Moreover, it is easy to deploy.
Securing web applications with Check Point CloudGuard Application Security is easy. The setup and configuration are easy compared to alternatives. It stands out for its simplicity. It does not rely on signatures, one of its unique features.
The solution helps to reduce TCO. It minimizes the pressure.
What needs improvement?
I have encountered issues with Check Point CloudGuard Application Security's technical support. It also has missing configuration features.
How was the initial setup?
Check Point CloudGuard Application Security's deployment is easy.
What's my experience with pricing, setup cost, and licensing?
Check Point CloudGuard Application Security's pricing is comparable to other products in the market.
What other advice do I have?
The tool protects newer applications. It isn't very good when dealing with both applications. However, it is expected. I rate the overall product a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner

Buyer's Guide
Download our free Check Point CloudGuard WAF Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Popular Comparisons
SonarQube Server (formerly SonarQube)
Checkmarx One
Microsoft Azure Application Gateway
Azure Front Door
F5 Advanced WAF
Fortinet FortiWeb
Cloudflare Web Application Firewall
Imperva Web Application Firewall
Radware Alteon
Barracuda Web Application Firewall
Radware Cloud WAF Service
open-appsec
Buyer's Guide
Download our free Check Point CloudGuard WAF Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- If you had to both encrypt and compress data during transmission, which would you do first and why?
- When evaluating Application Security, what aspect do you think is the most important to look for?
- What are the Top 5 cybersecurity trends in 2022?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- We're evaluating Tripwire, what else should we consider?
- Which application security solutions include both vulnerability scans and quality checks?
- Is SonarQube the best tool for static analysis?
- Why Do I Need Application Security Software?
- Which Email Security enterprise solution would you choose: Cisco Secure Email vs Forcepoint Email Security vs Barracuda Email Security Gateway?
- SAST vs. DAST: Which is better for application security testing?