"The solution offers an excellent price, benefit, and installation relationship."
"The reporting against compliance is an important feature that helps you comply with policies and standards within your organization."
"Auto remediation is a very effective feature that helps ensure less manual intervention."
"The two most valuable features for us are the central firewall administrator and the real-time cloud compliance monitoring."
"The reporting is quite good. It is the most powerful aspect of this solution."
"The audit feature is the most valuable for compliance reasons. It gives you a full view of the whole environment, no matter how many accounts you have in AWS or Azure. You have it all under one umbrella."
"It provides complete visibility of workload hosted on different cloud platforms including AWS and Azure, along with multiple tenants."
"We can monitor each activity from our mobile devices, so there is complete visibility of our cloud traffic flows, with threat intelligence provided by Check Point."
"The reporting on the solution is good."
"Rapid7 Metasploit is a useful product."
"The most valuable feature for us is the support for testing Linux-based web server components."
"All of the features are great."
"The solution is open source and has many small targetted penetration tests that have been written by many people that are useful. You can choose different subjects for the test, such as Oracle databases or Apache servers."
"It should capture more information in metadata including communication detail. Also, Internal IP addresses should not be tracked as this might be having some compliance issues."
"The main issue that we found with Dome9 is that we have a default rule set with better recommendations that we want to use. So, you do a clone of that rule set, then you do some tweaks and customizations, but there is a problem. When they activate the default rule set with the recommendations and new security measures, it doesn't apply the new security measures to your clones profile. Therefore, you need to clone the profile again. We are already writing a report to Check Point."
"Reporting should have more options."
"We were demotivated by the lack of native automation modules for the Terraform and Ansible tools."
"Currently, worldwide, there are many companies of all sizes that do not understand the value that their data has, but even with all existing clouds, they also do not understand what the shared responsibility model is. They only assume that by having a cloud, the provider must ensure safety, when the truth is that the providers only secure their sites. Everything we do in the cloud and how we configure it is actually our responsibility."
"CloudGuard could be more customizable. It has built-in standards for things like GDPR compliance. But depending on your business lane, you might want to build your own controls based on your own standards."
"Reporting should have more options."
"Automatic remediation requires read/write access. When providing read/write access to third-party applications, this can add risk. It should have some options of triggering API calls to the cloud platform, which in turn, can make the required changes."
"Better automation capabilities would be an improvement."
"The solution should improve the responsiveness of its live technical support."
"Rapid7 Metasploit can add a GUI feature because it is only available online."
"The solution is not very scalable, it does not provide any automation to be able to scale it."
"At the time I was using it, the graphical user interface needed some improvements."
Check Point CloudGuard provides cloud native security for all your assets and workloads, across multi-clouds, allowing you to automate security everywhere, with unified threat prevention and posture management. The only solution that provides context to secure your cloud with confidence.
Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.
Check Point CloudGuard Posture Management is ranked 3rd in Cloud Workload Security with 19 reviews while Rapid7 Metasploit is ranked 10th in Vulnerability Management with 5 reviews. Check Point CloudGuard Posture Management is rated 8.2, while Rapid7 Metasploit is rated 7.6. The top reviewer of Check Point CloudGuard Posture Management writes "Security visibility accuracy is tremendous, letting us see who is trying to access what". On the other hand, the top reviewer of Rapid7 Metasploit writes "Straightforward to set up, and helpful for moving from development to production". Check Point CloudGuard Posture Management is most compared with Prisma Cloud by Palo Alto Networks, Prisma SaaS by Palo Alto Networks, Microsoft Defender for Cloud, Check Point Harmony Email & Office and Amazon GuardDuty, whereas Rapid7 Metasploit is most compared with Tenable Nessus, Rapid7 InsightVM, Wireshark, Darktrace and Cisco Stealthwatch.
We monitor all Cloud Workload Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.