We have had the need to ensure the development of each of our applications based on the fact that the applications must be safe, fast, and efficient. We want to prevent an injection of a vulnerability attack by broken authentication, exposure of confidential data, or external entities that can inject us with xml services via broken access control. All these characteristics cause insecurity. We have looked for solutions that can guide us and establish a safe and concise baseline.
Administrative Assistant at a engineering company with 51-200 employees
Great security and more visibility but needs more AI capabilities
Pros and Cons
- "It offers good functionality of the application that is currently running."
- "I would like to be able to integrate the theme of Artificial Intelligence to help review issues and to monitor and view the security issue while also suggesting and interpreting and additionally configuring solutions - basically, acting as an interpreter."
What is our primary use case?
How has it helped my organization?
It has given us greater security at an organizational level. It has allowed us to use components with known vulnerabilities, which have been prevented based on their multiple databases that have correlated incidents, helping the development of applications to be fast, efficient, and safe, which is what we were looking for. Thus giving us the possibility to register, monitor, and identify technological insufficiencies or absent capacities in the development of the application.
What is most valuable?
Its most outstanding feature is the registry and the possibility of monitoring everything. When it comes to simplifying or establishing an error, an infraction, or a detection due to a breach of unauthorized access, it gives us an overview of each one of the capabilities and a segmented control over the development. It offers good functionality of the application that is currently running. It's giving us the ability to test based on vulnerable interfaces, and anomalous requests and responses. All these types of characteristics give us a reference point as to whether they are secure or insecure. We get logging monitoring and general visibility of the application.
What needs improvement?
The application allows us to have control over its activities, the management, and the interconnection of monitoring which takes advantage of computing power, is exceptional. That said, I would like to be able to integrate the theme of Artificial Intelligence to help review issues and to monitor and view the security issue while also suggesting and interpreting and additionally configuring solutions - basically, acting as an interpreter.
Buyer's Guide
Check Point CloudGuard WAF
December 2025
Learn what your peers think about Check Point CloudGuard WAF. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,422 professionals have used our research since 2012.
For how long have I used the solution?
We've used the solution for about six or seven months. That was when established applications at the cloud level.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cloud Engineer at a tech services company with 51-200 employees
Great AI, less false positives, and great administration capabilities
Pros and Cons
- "Its main value and what we liked the most is its powerful AI."
- "We would like to have a solution of this type for the administration of applications from mobile devices."
What is our primary use case?
We had the need to protect the computers in the cloud that we were migrating, giving them greater security and having control over the events and tasks that they execute.
This need led us to have and search for a solution that would support us directly with containers and the security of our access APIs.
Above all, we needed something that would give us added value when implementing, and that was where we came to use Check Point AppSec.
Its main value and what we liked the most is its powerful AI.
How has it helped my organization?
With so many tasks that we have at the administration level, as administrators, we find this solution as one of the best recommendations due to its powerful AI. It supports us to be scalable and learn in management with the data it is learning.
Zero-day management and preemptive stop management provide detection in hours, not weeks. These help us to be much more proactive and efficient in our security management and in much of what we have in the cloud and the infrastructure that we have been migrating to the various cloud.
What is most valuable?
Among its most outstanding features is the powerful AI in container security. Above all, it is one of the most powerful and easy-to-manage solutions. It manages to protect itself, and it manages to include its new rules based on what manages to learn. This helps us protect web applications and APIs by eliminating false positives and stops automated attacks against our organization. It eliminates the need to adjust rules manually and create exceptions each time an update is performed.
What needs improvement?
We would like to have a solution of this type for the administration of applications from mobile devices. It would help us to be more portable with management from tablets, iPads, or some cell phones, becoming easier to administer.
We'd lie to see it take on the characteristics of quantum applications and have these solutions all in one, protecting us and giving us even more value than what it is giving us today.
For how long have I used the solution?
I've used the solution for one year.
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
Which other solutions did I evaluate?
We did not evaluate other options.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point CloudGuard WAF
December 2025
Learn what your peers think about Check Point CloudGuard WAF. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,422 professionals have used our research since 2012.
CIO at a tech services company with 51-200 employees
Has AI feature which makes operations easy but technical support needs improvement
Pros and Cons
- "The tool's most valuable feature is AI, which makes operations easier. Moreover, it is easy to deploy."
- "I have encountered issues with Check Point CloudGuard Application Security's technical support. It also has missing configuration features."
What is our primary use case?
I use the solution for securing web applications.
What is most valuable?
The tool's most valuable feature is AI, which makes operations easier. Moreover, it is easy to deploy.
Securing web applications with Check Point CloudGuard Application Security is easy. The setup and configuration are easy compared to alternatives. It stands out for its simplicity. It does not rely on signatures, one of its unique features.
The solution helps to reduce TCO. It minimizes the pressure.
What needs improvement?
I have encountered issues with Check Point CloudGuard Application Security's technical support. It also has missing configuration features.
How was the initial setup?
Check Point CloudGuard Application Security's deployment is easy.
What's my experience with pricing, setup cost, and licensing?
Check Point CloudGuard Application Security's pricing is comparable to other products in the market.
What other advice do I have?
The tool protects newer applications. It isn't very good when dealing with both applications. However, it is expected. I rate the overall product a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Download our free Check Point CloudGuard WAF Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2025
Popular Comparisons
Prisma Cloud by Palo Alto Networks
Checkmarx One
Imperva Application Security Platform
CrowdStrike Falcon Cloud Security
Fortinet FortiWeb
Azure Front Door
Microsoft Azure Application Gateway
F5 Advanced WAF
Cloudflare Web Application Firewall
Radware Alteon
NGINX App Protect
Radware Cloud WAF Service
Buyer's Guide
Download our free Check Point CloudGuard WAF Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- If you had to both encrypt and compress data during transmission, which would you do first and why?
- When evaluating Application Security, what aspect do you think is the most important to look for?
- What are the Top 5 cybersecurity trends in 2022?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- We're evaluating Tripwire, what else should we consider?
- Which application security solutions include both vulnerability scans and quality checks?
- Is SonarQube the best tool for static analysis?
- Why Do I Need Application Security Software?
- Which Email Security enterprise solution would you choose: Cisco Secure Email vs Forcepoint Email Security vs Barracuda Email Security Gateway?
- SAST vs. DAST: Which is better for application security testing?















