Try our new research platform with insights from 80,000+ expert users
Support at a security firm with 51-200 employees
User
Top 5Leaderboard
Mar 2, 2023
Offers comprehensive security, helps with compliance, and has good monitoring
Pros and Cons
  • "The solution offers continuous security monitoring and alerting, which can help organizations detect and respond to security incidents in real time."
  • "One of the big problems we found in Check Point, in general, is the support."

What is our primary use case?

The importance and use of this product were required to improve new application deployments made in the Microsoft Azure cloud. They were not one hundred percent secure, however with this CloudGuard application security from Check Point has managed to improve all these requirements to obtain greater security.

The applications are generally internal to the company, however, they are secure thanks to Check Point CloudGuard.                                   

How has it helped my organization?

Check Point CloudGuard Application Security is a cloud-based security solution designed to protect web applications and APIs from various types of cyber threats.

This tool has managed to improve security considerably in our apps and the APIs created for the company. We have not presented problems, threats, or leaks even when some are exposed to the Internet and are more susceptible to attacks. The company is now more secure, thanks to Check Point.                                             

What is most valuable?

The solution is created one hundred percent on the cloud; the portal is easy to manage.

The solution offers continuous security monitoring and alerting, which can help organizations detect and respond to security incidents in real time.

CloudGuard Application Security provides comprehensive visibility into web applications and API traffic

The solution offers support for compliance regulations such as PCI-DSS, HIPAA, and GDPR, helping organizations to meet their regulatory obligations.

What needs improvement?

One of the big problems we found in Check Point, in general, is the support. It is always attended very late or they take a long time to answer.

The cost of this tool is extremely high, which is why it must be analyzed before implementing it.

The support language is only English. This causes some problems in Spanish-speaking countries. They could expand the languages offered to help the client.

Buyer's Guide
Check Point CloudGuard WAF
March 2026
Learn what your peers think about Check Point CloudGuard WAF. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,286 professionals have used our research since 2012.

For how long have I used the solution?

This excellent security tool, Check Point CloudGuard, has multi-cloud security and is also perfect for secure developments. It's been used in recent years by the company.

Which solution did I use previously and why did I switch?

Previously we did not use a technology like this.

Which other solutions did I evaluate?

We always carry out tests and validations before acquiring a solution.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Feb 19, 2023
Help s guarantee that applications are secure, protected, and resistant to attacks
Pros and Cons
  • "The solution offers sophisticated security techniques with unique characteristics that can be particularly valuable for the financial sector, which is where we develop apps."
  • "Deeper and more transparent integration between Cloud Application Security and analysis monitoring tools could be very valuable - although the solution currently offers integrations with third-party security tools."

What is our primary use case?

As one of the solutions that we need for protection at the API level, we have found the level of attack detection needed to comply with the internal regulations of the corporation.

It protects both financials and identity searches. It is a new generation of security that can help us seek, implement, and select different brands products for enhanced protection. This is important due to the acceleration and development of many applications. It helps us reduce the risk of vulnerability in productive applications. 

How has it helped my organization?

The use of CloudGuard Application Security protects the page and online web services against SQL injection attacks. This prevents attackers from accessing our databases and stealing financial information from customers. These services help identify and fix vulnerabilities in our application and allow us to identify when there is a vulnerability, such as a code injection, and click on the site to see recommendations in order to fix issues before attackers can exploit weaknesses.

What is most valuable?

The solution offers sophisticated security techniques with unique characteristics that can be particularly valuable for the financial sector, which is where we develop apps. It helps us to guarantee that financial applications are secure, protected, and resistant to attacks, which is essential to maintain trust and reputational power with any client that is subscribed to our services.

What needs improvement?

Deeper and more transparent integration between Cloud Application Security and analysis monitoring tools could be very valuable - although the solution currently offers integrations with third-party security tools. Still, a deeper integration could provide better visibility of all the threats. It would be ideal if they could be found in real-time, allowing our financial or security team to offer a more effective response to attacks. 

For how long have I used the solution?

I've used the solution for two years.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point CloudGuard WAF
March 2026
Learn what your peers think about Check Point CloudGuard WAF. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,286 professionals have used our research since 2012.
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 20
Feb 15, 2023
Easily deployed with good visibility and excellent security capabilities
Pros and Cons
  • "By using a cloud application security solution, our company can save costs by reducing the need for additional security hardware and software and improving operational efficiency."
  • "A feature we'd like to see in the future is something that could protect against other attack vectors, with a focus on application protection."

What is our primary use case?

We were looking for a solution that met the following criteria: 

  • A web application security solution that uses real-time attack prevention techniques and vulnerability scanning to protect applications and data running in public or private cloud environments. 
  • Monitoring and logging of application traffic to detect anomalies and suspicious attacks.
  • Integration with automation and orchestration tools for cloud application security management and scalability. 
  • Detection and prevention of SQL injection attacks, cross-site scripting (XSS), and other types of injection attacks. 

How has it helped my organization?

The product benefits my business by giving enhanced protection for useful cloud applications. 

Using enhanced visibility and analytics, the product provides visibility into security. By using a cloud application security solution, our company can save costs by reducing the need for additional security hardware and software and improving operational efficiency. 

With this product, we are achieving regulatory compliance. CloudGuard Application Security can help businesses meet security regulatory requirements, which makes for an outstanding organization. 

What is most valuable?

This cloud web application security solution can be quickly and easily deployed in public or private cloud environments, allowing a company to protect web applications and reduce downtime quickly. 

This solution provides us with enhanced visibility, giving us the ability to provide web application security analysis in the cloud.

What needs improvement?

A feature we'd like to see in the future is something that could protect against other attack vectors, with a focus on application protection. We need to protect against other attack vectors like network or device email attacks in order to provide the greatest protection possible. It is very understandable that there are many characteristics of an attack, including if it is from the inside or outside the organization. However, it would be important to validate threats and have all manner of solutions on hand to help protect the company.  

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2037513 - PeerSpot reviewer
Project Manager at Digitas APAC
User
Jan 22, 2023
Great support, excellent ROI, and good performance
Pros and Cons
  • "It provides advanced analytics that gives each team time to prepare for any threat that might occur in the future."
  • "The coding configurations can be simplified to save time for IT teams and developers."

What is our primary use case?

This solution safeguards applications that are hosted in the organization's cloud servers. 

It monitors the performance of applications from the deployment stage to the implementation of assigned tasks. 

Check Point CloudGuard Application Security blocks any cyber attacks channeled to destroy confidential data. 

Configuration of this platform with other tools took place efficiently without any challenge. The set security features alert the IT team when there are external threats that can affect workflows. the organization's networking infrastructure is ever secure since we deployed this product.

How has it helped my organization?

The solution has comprehensive security cover for the cloud applications, which has been a great achievement in the organization since we deployed this platform. 

It provides advanced analytics that gives each team time to prepare for any threat that might occur in the future. 

Enhanced data intelligence helps us to plan and turn provides analytics into actionable insights. 

Safeguarding applications has enabled members to focus on more productive activities without fear of being attacked. The set of security tools enables each app to perform its role without external interference.

What is most valuable?

Sensitive data exposure has enabled us to plan and make reliable decisions based on the work environment. 

The product has confirmed to each department that the injection of new data into the systems is highly secured to enhance transparency. 

Security misconfigurations enable the IT team to rearrange application codes and take full control. 

Insecure deserialization provides a comprehensive report of applications that enables the IT team to identify malicious coding and execute it in advance before it affects workflows.

What needs improvement?

The coding configurations can be simplified to save time for IT teams and developers. 

Insufficient logging among applications breaches security, and this may lead to undetected malware attacks contributing to data compromise. 

The set security tools target known vulnerabilities, and when there is an outbreak of new viruses, it may not be noticed, easily exposing data to cyber attackers. 

Broken access control enables members to gain unauthorized access to saved files allowing them to edit accounts to enable other users to gain access. The software has great capability of preventing data with the set organization policies.

For how long have I used the solution?

I've used the solution for nine months.

What do I think about the stability of the solution?

This platform is stable, and the performance is excellent.

What do I think about the scalability of the solution?

I am impressed by the scalability.

How are customer service and support?

There is great support and cooperation from the customer service team.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with a similar solution.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

The vendor team was responsible for the full deployment.

What was our ROI?

There is increased ROI from improved application security.

What's my experience with pricing, setup cost, and licensing?

The cost and setup are good, depending on the company size.

Which other solutions did I evaluate?

I have no experience with other security products on the market.

What other advice do I have?

This platform is good for safeguarding cloud applications.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro
Real User
Top 20
Nov 17, 2022
Great security and more visibility but needs more AI capabilities
Pros and Cons
  • "It offers good functionality of the application that is currently running."
  • "It has allowed us to use components with known vulnerabilities, which have been prevented based on their multiple databases that have correlated incidents, helping the development of applications to be fast, efficient, and safe, which is what we were looking for."
  • "I would like to be able to integrate the theme of Artificial Intelligence to help review issues and to monitor and view the security issue while also suggesting and interpreting and additionally configuring solutions - basically, acting as an interpreter."
  • "I would like to be able to integrate the theme of Artificial Intelligence to help review issues and to monitor and view the security issue while also suggesting and interpreting and additionally configuring solutions - basically, acting as an interpreter."

What is our primary use case?

We have had the need to ensure the development of each of our applications based on the fact that the applications must be safe, fast, and efficient. We want to prevent an injection of a vulnerability attack by broken authentication, exposure of confidential data, or external entities that can inject us with xml services via broken access control. All these characteristics cause insecurity. We have looked for solutions that can guide us and establish a safe and concise baseline.

How has it helped my organization?

It has given us greater security at an organizational level. It has allowed us to use components with known vulnerabilities, which have been prevented based on their multiple databases that have correlated incidents, helping the development of applications to be fast, efficient, and safe, which is what we were looking for. Thus giving us the possibility to register, monitor, and identify technological insufficiencies or absent capacities in the development of the application.

What is most valuable?

Its most outstanding feature is the registry and the possibility of monitoring everything. When it comes to simplifying or establishing an error, an infraction, or a detection due to a breach of unauthorized access, it gives us an overview of each one of the capabilities and a segmented control over the development. It offers good functionality of the application that is currently running. It's giving us the ability to test based on vulnerable interfaces, and anomalous requests and responses. All these types of characteristics give us a reference point as to whether they are secure or insecure. We get logging monitoring and general visibility of the application.

What needs improvement?

The application allows us to have control over its activities, the management, and the interconnection of monitoring which takes advantage of computing power, is exceptional. That said, I would like to be able to integrate the theme of Artificial Intelligence to help review issues and to monitor and view the security issue while also suggesting and interpreting and additionally configuring solutions - basically, acting as an interpreter.

For how long have I used the solution?

We've used the solution for about six or seven months. That was when established applications at the cloud level.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2008407 - PeerSpot reviewer
Java Developer at EROAD
User
Nov 17, 2022
Guards privacy, protects data, and offers good security configuration
Pros and Cons
  • "After integrating AppSec with other applications, team members can easily work without fear of confidential information exposure."
  • "We have prevented many potential threats that could be a major setback to our set goals."
  • "The creation of security profiles for each application takes a lot of time."
  • "The creation of security profiles for each application takes a lot of time."

What is our primary use case?

This security management system allows teams to evaluate the performance of applications and identify vulnerabilities that could affect performance. 

It has deployed reliable security measures that can easily detect any potential data leaks and cyber-attacks. Before we develop any application Check Point CloudGuard Application Security provides the best data protection tools that be configured easily with the new application. We have been able to scale down workflows and monitor appropriately the entire production ecosystem.

How has it helped my organization?

We have prevented many potential threats that could be a major setback to our set goals. 

After integrating AppSec with other applications, team members can easily work without fear of confidential information exposure. It has really empowered employees with modern online security measures that can affect business progress. 

Learning new security coding techniques has been a great opportunity for my team and the entire organization. We have quashed many authentication and code injection attempts by ransomware attacks to secure our networking infrastructure.

What is most valuable?

Sensitive data exposure models have helped in guarding the privacy of company and customer information from landing in unauthorized hands. 

Confidential details like bank statements and the financial status of employees is very sensitive and can easily be exposed to cyber-attacks. AppSec has created a secure environment that allows members to create and manage their personal email accounts and related personal data. 

Application security configuration gives the IT team and authorized personnel to have full access and control of workflows without fear.

What needs improvement?

The creation of security profiles for each application takes a lot of time. The new release can have a unified security control system that can access the security situation of all applications from one single source. 

The system blocks some authorized data entries that are not threats. AppSec could easily deploy a system with set commands that can be used to block unsafe operations and authorize areas of interest based on the user's needs. I have loved the way this software works, and I am impressed by the increased security across the applications.

For how long have I used the solution?

I've used the solution for eight months.

What do I think about the stability of the solution?

It is stable throughout.

What do I think about the scalability of the solution?

This software is good and the performance is excellent.

How are customer service and support?

The customer support staff is dedicated to delivering the best services ever.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We decided to test the performance of this product for the first time, and it impressed the departments.

How was the initial setup?

The setup process was straightforward, and the vendor guided us effectively.

What about the implementation team?

Deployment took place through the vendor team.

What was our ROI?

ROI has increased from 40% to 65% in eight months.

What's my experience with pricing, setup cost, and licensing?

The price is good for all businesses.

Which other solutions did I evaluate?

I did not consider other options.

What other advice do I have?

We could not have prevented many external attacks without AppSec. I am happy due to its great performance.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2349423 - PeerSpot reviewer
CIO at a tech services company with 51-200 employees
Real User
Top 20
Apr 15, 2024
Has AI feature which makes operations easy but technical support needs improvement
Pros and Cons
  • "The tool's most valuable feature is AI, which makes operations easier. Moreover, it is easy to deploy."
  • "I have encountered issues with Check Point CloudGuard Application Security's technical support. It also has missing configuration features."

What is our primary use case?

I use the solution for securing web applications. 

What is most valuable?

The tool's most valuable feature is AI, which makes operations easier. Moreover, it is easy to deploy. 

Securing web applications with Check Point CloudGuard Application Security is easy. The setup and configuration are easy compared to alternatives. It stands out for its simplicity. It does not rely on signatures, one of its unique features. 

The solution helps to reduce TCO. It minimizes the pressure. 

What needs improvement?

I have encountered issues with Check Point CloudGuard Application Security's technical support. It also has missing configuration features. 

How was the initial setup?

Check Point CloudGuard Application Security's deployment is easy. 

What's my experience with pricing, setup cost, and licensing?

Check Point CloudGuard Application Security's pricing is comparable to other products in the market. 

What other advice do I have?

The tool protects newer applications. It isn't very good when dealing with both applications. However, it is expected. I rate the overall product a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Download our free Check Point CloudGuard WAF Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2026
Buyer's Guide
Download our free Check Point CloudGuard WAF Report and get advice and tips from experienced pros sharing their opinions.