No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point CloudGuard CNAPP vs Red Hat Advanced Cluster Security for Kubernetes comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point CloudGuard CNAPP
Ranking in Container Security
11th
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
72
Ranking in other categories
Vulnerability Management (13th), Cloud and Data Center Security (9th), Cloud Workload Protection Platforms (CWPP) (6th), Cloud Security Posture Management (CSPM) (6th), Cloud-Native Application Protection Platforms (CNAPP) (6th), Data Security Posture Management (DSPM) (7th), Compliance Management (6th)
Red Hat Advanced Cluster Se...
Ranking in Container Security
19th
Average Rating
8.2
Reviews Sentiment
7.5
Number of Reviews
12
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Container Security category, the mindshare of Check Point CloudGuard CNAPP is 2.7%, up from 2.0% compared to the previous year. The mindshare of Red Hat Advanced Cluster Security for Kubernetes is 2.0%, down from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security Mindshare Distribution
ProductMindshare (%)
Check Point CloudGuard CNAPP2.7%
Red Hat Advanced Cluster Security for Kubernetes2.0%
Other95.3%
Container Security
 

Featured Reviews

reviewer2751468 - PeerSpot reviewer
Assistant Manager at a computer software company with 201-500 employees
Boosts security and compliance in multi-cloud environments while real-time threat detection enhances risk management
Check Point CloudGuard CNAPP flagged a misconfiguration in our AWS S3 bucket that had overly permissive access settings. That configuration could have exposed our sensitive data to the public internet. The platform not only identified the issue but also provided remediation that our team was able to apply immediately. This prevented a potential data exposure. Check Point CloudGuard CNAPP offers a unified, modular platform that combines CSPM, CWPP, CIEM, code security, and cloud detection and response. The agentless workload posture, real-time threat detection and response, multi-cloud coverage and visibility, compliance automation, and one-click remediations stand out as its best features. I find myself relying on the risk management engine and prioritization the most day-to-day. In any cloud environment, you are flooded with findings, misconfigurations, vulnerabilities, and compliance gaps. Without prioritization, it is overwhelming for our team to take care of the posture. CloudGuard's risk scoring helps us cut through incidents. This makes remediation faster and focused instead of wasting time checking every alert. We get to fix the issues that pose real business risks. Check Point CloudGuard CNAPP has positively impacted our organization at a significant level. We get greater visibility and control across all our cloud environments. Some biggest benefits we have seen are faster detection and remediation of misconfigurations, improved compliance posture, reduced risk exposure, operational efficiency, and cost savings. Overall, it has made our cloud environment more secure, compliant, and easier to manage while freeing up our teams to focus on projects instead of chasing alerts.
Daniel Stevens - PeerSpot reviewer
Software Engineer at Galley
Offers easy management and container connection with HTTPS, but the support needs to improve
I have experience with the solution's setup in Rio de Janeiro, Brazil and our company has assisted in the development of a cluster in a research department, but we didn't start from scratch because we have IT professionals who have installed Kubernetes across 12 nodes of a cluster and a new environment can be created for a new platform. I also had another setup experience of Red Hat Advanced Cluster Security for Kubernetes in Portugal where I had to implement the solution in a cluster of 22 computer servers, which was completed with assistance from the IT department of the company. The initial setup process of the solution can be considered as difficult. The setup process involves using the permissions, subnets and range of IPs, which makes it complex. Deploying Red Hat Advanced Cluster Security for Kubernetes takes around eight to ten hours for new clusters. The solution's deployment can be divided into three parts. The first part involves OpenStack, where the cluster's resources need to be identified. The second part involves virtualizing assets and identifying other physical assets, for which OpenStack, Kubernetes, or OpenShift are used. The third part of the deployment involves dividing the networks into subnetworks and implementing automation to deploy the microservices using Helm. The number of professionals required for the solution's deployment depends upon the presence of automated scripts. Ideally, two or three professionals are required to set up Red Hat Advanced Cluster Security for Kubernetes.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The reporting is quite good. It is the most powerful aspect of this solution."
"It presents a real-time database that is always updated."
"Using CloudGuard, I was able to manage a multi-cloud platform based on AWS, Azure, and Google for a multinational company in Europe with only three engineers."
"The initial setup is easy and not complex at all."
"The CloudGuard for Cloud Intelligence tool has several significant features that provide security to our company."
"The product allows us to enhance the security of the implementations we have."
"It streamlines visibility, so this is the right tool if you are trying to meet a specific compliance standard or you are managing hundreds or thousands of servers within your cloud environment."
"The initial setup was straightforward."
"The most valuable feature of the solution is its monitoring feature."
"The technical support is good."
"The most beneficial security feature of the product revolves around the areas of vulnerability and configuration."
"I am impressed with the tool's visibility."
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
"Offers easy management with authentication and authorization features"
"One of the most valuable features I found was the ability of this solution to map the network and show you the communication between your containers and your different nodes."
"Segmentation is the most powerful feature."
 

Cons

"The rules are not well-tuned, and many of them generate false positives or nonsensical results."
"I would like to see improvements in the vulnerability assessments in terms of how the solution discovers vulnerabilities or compromised workloads. Also, customizable reports would be nice."
"The technical support could be better, but I do not know of any other needed improvements."
"I’d like to see more integration with third-party tools. For example, it would be helpful to have an integration between Dome9 and ServiceNow to manage security incidents and security changes."
"Reporting should have more options."
"The impact analysis that they perform can be improved. It is currently lacking. It should be more detailed."
"The technical support could be better, but I do not know of any other needed improvements."
"The license cost is expensive and has room for improvement."
"The tool's command line and configuration are hard for us to understand and make deployment complex. It should also include zero trust, access control features and database connectivity."
"The initial setup is pretty complex. There's a learning curve, and its cost varies across different environments. It's difficult."
"The solution's price could be better."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The solution's visibility and vulnerability prevention should be improved."
"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The deprecation of APIs is a concern since the deprecation of APIs will cause issues for us every time we upgrade."
"I do see that some features associated with the IAST part are not included in the tool, making it an area where improvements are required."
 

Pricing and Cost Advice

"The solution’s pricing is a little bit high."
"Check Point CloudGuard Posture Management is always known as a good solution but an expensive one. When you're using Cisco, Check Point, or Palo Alto, you know that you will pay more, but you know that it will work."
"The licensing part still needs some work. The issue that I have is that we do not use all the services in the cloud, but sometimes, CloudGuard identifies them as an asset."
"I would advise taking into account the existing number of devices and add a forecast of the number of devices to be added in the coming year or two, to obtain better pricing."
"In the beginning, the price of Dome9 was cheap, whereas now it is not."
"I suggest that you pay attention to the product pricing because while there are no tricks, and the licensing model is transparent, the final numbers may surprise you."
"The licensing and costs are straightforward, as they have a baseline of 100 workloads (number of instances) within one license with no additional nor hidden charges. If you want to have 200 workloads under Dome9, then you need to take out two licenses for that. Also, it does not have any impact on cloud billing, as data is shared using the API call. This is well within the limit of free API calls provided by the cloud provider."
"​They support either annual licensing or hourly. At the time of our last negotiation, it was either one or the other, you could not mix or match. I would have liked to mix/match. ​"
"The price of Red Hat Advanced Cluster Security for Kubernetes is better than Palo Alto Prisma."
"Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus."
"We purchase a yearly basis license for the solution."
"It's a costly solution"
"The pricing model is moderate, meaning it is not very expensive."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
885,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
10%
Manufacturing Company
8%
Computer Software Company
7%
Outsourcing Company
7%
Financial Services Firm
28%
Computer Software Company
8%
Government
8%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business55
Midsize Enterprise18
Large Enterprise56
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise2
Large Enterprise4
 

Questions from the Community

What is your experience regarding pricing and costs for CloudGuard Workload Protection?
My experience with pricing, setup cost, and licensing has been reasonable for the value it delivers. The initial setup cost was fair. Understanding the right modules and tiers took a bit of plannin...
What do you like most about CloudGuard for Cloud Intelligence?
The new scanning function is a valuable feature that wasn't available until recently.
What needs improvement with CloudGuard for Cloud Intelligence?
One area that Check Point CloudGuard CNAPP could use improvement is the navigation when switching between modules. A more streamlined interface and a quicker drill-down into findings would make the...
What needs improvement with Red Hat Advanced Cluster Security for Kubernetes?
From an improvement perspective, I would like to create new policies in the tool, especially if it is deployed for the prevention part, but currently, we need to do it manually. I hear that Palo Al...
What is your primary use case for Red Hat Advanced Cluster Security for Kubernetes?
I use the solution in my company for vulnerability management, configuration management, compliance, safety handling, and everything else.
What advice do you have for others considering Red Hat Advanced Cluster Security for Kubernetes?
The tool's policy management supports our company's compliance efforts since any corporate entity or enterprise must follow specific regulations, which include periodic analysis and configuration r...
 

Also Known As

Check Point CloudGuard Posture Management, Dome9, Check Point CloudGuard Workload Protection, Check Point CloudGuard Intelligence
StackRox
 

Overview

 

Sample Customers

Symantec, Citrix, Car and Driver, Virgin, Cloud Technology Partners
City National Bank, U.S. Department of Homeland Security
Find out what your peers are saying about Check Point CloudGuard CNAPP vs. Red Hat Advanced Cluster Security for Kubernetes and other solutions. Updated: March 2026.
885,311 professionals have used our research since 2012.