We performed a comparison between Check Point Security Management and Microsoft Defender for Cloud Apps based on real PeerSpot user reviews.
Find out in this report how the two Advanced Threat Protection (ATP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Each department can easily share data with the management without fear of data compromise."
"The compliance is great."
"The firewall's blades are the solution's most valuable feature."
"We can easily push the policies to any of our gateways."
"The management API is the best new feature for me. It allows us to further automate our customers' automated server ordering."
"Check Point management is one of the most complete solutions for managing Check Point Firewall appliances."
"It provides for capabilities and has allowed us to be more scalable."
"With the generation and review of logs, we have verified some vulnerabilities and attempted attacks to generate improvements in our infrastructure and policies to help avoid issues in the future."
"The most valuable feature of Microsoft Defender for Cloud Apps is to stop shadow IT."
"All of the features are valuable because all of the features are related."
"One of the most valuable features is auditing. Some of the other protection services have issues with auditing. Microsoft Defender for Cloud has an excellent auditing technique that helps us avoid the risk of filtering or information loss. You can use different tools to guarantee these things. It allows you to conduct an in-depth exploration of applications, users, and files that are harmful or suspicious. You can also enhance your security setup by creating personalized rules or policies that help you better control traffic in the cloud."
"There are a lot of features with benefits, including discovery, investigation, and putting controls around things. You can't say that you like the investigation part but not the discovery. Everything is correlated; that's how the tool works."
"The general usability of the solution is very straightforward."
"Defender helps us control which applications are being used and gain more security insight into remote and hybrid users based on user identity and log in location. You can also integrate Defender for Cloud Apps with Defender for Endpoint to extend its capabilities."
"Threat detection is its key feature, and that's why we use this tool. It gives an alert if a PC is attacked or there is any kind of anomaly, such as there is a spike in sending emails or we see an unauthorized website being accessed. So, it keeps us on our toes. We get to know that there is something wrong, and we can isolate the user and find any issues with it. So, threat detection is very robust in this tool."
"The most valuable feature is the alerting system."
"It also offers compatibility with third-party security solutions, however, it is not a lot. This needs to be improved."
"Being a security appliance, there should be the ability for the Security Management server to send email alerts via authenticated email."
"Sometimes the security system slows down when it is overloaded."
"It would be helpful if the documentation and good practice guides are updated. Many are still from R77."
"Check Point could improve by enhancing the networking in their solution in order to align it with the existing network architecture."
"It would be helpful if we could enable URL and application traffic control remote access."
"Check Point EDR has room for improvement, especially in the area of Data Loss Prevention where it currently lacks functionality."
"You need some technical expertise to use the solution. I don't think it's accessible to the typical end-user. You need to access the box and use some command lines or the web interface. It would be nice to have a user-friendly dashboard and comprehensive reporting."
"Currently, reporting is not very straightforward and it needs to be enhanced. Specific reports are not included and you need to run a query, drill down, and then export it and share it. I would love to have reports with more fine-tuning or granularity, and more predefined reports."
"It doesn't actually decrease the time to respond. This has been an issue with Microsoft recently. Sometimes, there is a delay when it comes to getting an alert policy email... Sometimes it takes two or three hours for that email to be sent."
"There could be more granular roles that are out of the box included in the product."
"I believe it's only set to be integrated with Microsoft Defender for identity and identity protection. I would like to see it available for use with something like Office 365 Defender. I don't think it's integrated with that yet."
"Generally, the pricing can always be improved along with the management system."
"We would like to get more information from the endpoint. I don't get enough detailed information right now on why something failed. There is not enough visibility."
"They need to improve the attack surface reduction (ASR) rules. In the latest version, you can implement ASR rules, which are quite useful, but you have to enable those because if they're not enabled, they flag false positives. In the Defender portal, it logs a block for WMI processes and PowerShell. Apparently, it's because ASR rules are not configured. So, you generally have to enable them to exclude, for example, WMI queries or PowerShell because they have a habit of blocking your security scanners. It's a bit weird that they have to be enabled to be configured, and it's not the other way around."
"I want them to enhance in-session policy."
More Check Point Security Management Pricing and Cost Advice →
More Microsoft Defender for Cloud Apps Pricing and Cost Advice →
Check Point Security Management is ranked 13th in Advanced Threat Protection (ATP) with 55 reviews while Microsoft Defender for Cloud Apps is ranked 11th in Advanced Threat Protection (ATP) with 30 reviews. Check Point Security Management is rated 8.8, while Microsoft Defender for Cloud Apps is rated 8.4. The top reviewer of Check Point Security Management writes "Great DDoS protection, high availability, and useful firewall rule implementation". On the other hand, the top reviewer of Microsoft Defender for Cloud Apps writes "Integrates well and helps us in protecting sensitive information, but takes time to scan and apply the policies and cannot detect everything we need". Check Point Security Management is most compared with Wazuh, Fortinet FortiAnalyzer, IBM Security QRadar, LogRhythm SIEM and Splunk Cloud Platform, whereas Microsoft Defender for Cloud Apps is most compared with Zscaler Internet Access, Cisco Umbrella, Netskope , Prisma Access by Palo Alto Networks and Qualys VMDR. See our Check Point Security Management vs. Microsoft Defender for Cloud Apps report.
See our list of best Advanced Threat Protection (ATP) vendors.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.