

CrowdStrike Falcon Cloud Security and Check Point WAF compete in the endpoint protection and web application security categories. Based on features, CrowdStrike Falcon Cloud Security has the upper hand due to its efficient malware protection and comprehensive threat hunting abilities, while Check Point WAF stands out for its AI-based threat prevention and zero-day attack mitigation.
Features: CrowdStrike Falcon Cloud Security offers robust endpoint protection with a lightweight design, comprehensive threat hunting, and real-time threat response. Check Point WAF excels with AI-driven threat prevention, advanced DDoS protection, and automated policy creation.
Room for Improvement: CrowdStrike Falcon Cloud Security could enhance Linux support, vulnerability management, and user education, alongside reviewing its pricing model. Check Point WAF should focus on reducing latency, improving technical support, and offering more flexible pricing structures.
Ease of Deployment and Customer Service: CrowdStrike Falcon Cloud Security provides versatile deployment across various cloud environments and offers quick customer support. Check Point WAF, while also deployable in different cloud setups, faces challenges with latency and initial configuration complexity.
Pricing and ROI: CrowdStrike Falcon Cloud Security is priced higher but delivers significant ROI through time savings and enhanced security. Check Point WAF, despite its pricing complexity, offers competitive value with its superior security features, yet doesn't match CrowdStrike in reducing total cost of ownership as effectively.
When we are attacked, we can understand how important the solution is.
When you migrate to the cloud, it feels like saving 90% of your time.
Most of the operations happen in the background, so I do not spend much time on it.
More than 12 million vulnerabilities have been identified and resolved while working with CrowdStrike Falcon Cloud Security over the past 10 years.
We have seen a return on investment through time saved and managed employee workload.
Faster remediation and better prevention of cloud incidents.
They need to increase the number of people for 24/7 support.
They were responsive even before we committed to buying their solution.
I also received full technical support, especially during the implementation.
Based on my experience with CrowdStrike Falcon Cloud Security's technical support, I would rate them a solid 10 out of 10.
Technical support is quite good.
I have contacted customer service, and they are fast.
If I need to scale, I open a Whatsapp group with the director and the team, and we quickly proceed to do so.
They have sufficient resources, and there are no challenges from a scalability perspective.
Check Point CloudGuard WAF's scalability is very good.
It is deployed across multiple departments and multiple locations.
CrowdStrike Falcon Cloud Security is indeed highly scalable, ideally for enterprises with a minimum of 2,000 servers to ensure cost efficiency and easier setup.
The scalability of CrowdStrike Falcon Cloud Security is good, and it can easily scale up to over 20,000 or 30,000 endpoints.
It is very stable.
It is very stable, never crashing or giving me an error that I can see.
I did not have any issues in the last three years during which I had more than ten critical services running on CloudGuard.
Occasionally, when the workload increases, it slows down considerably and sometimes becomes unresponsive.
When evaluating the stability of CrowdStrike Falcon Cloud Security, their partnerships with all major cloud service providers ensure their servers are optimally positioned.
The provider could improve by providing better guidance and support during the configuration process.
Future releases should include better bot mitigation, behavioral anomaly detection, compliance templates, advanced threat intel integration, and streamlined multi-cloud support to boost protection and usability.
A machine learning-based adaptive mode could help the WAF learn over time and auto-tune policies.
If CrowdStrike Falcon Cloud Security could implement pushing out remediation from the sensor installed on machines, that would be beneficial.
The user interface needs improvement as it's sometimes difficult to locate specific dashboards or reports.
Another issue is the lack of proper documentation.
It is more expensive than f5, where we purchased everything as bundles, and Check Point costs more, but it is worth the money.
It is less costly than Cloudflare, Fortinet, and other vendors.
I know that its price is relatively expensive compared to other products but it gives benefits that are worth it.
The pricing for CrowdStrike Falcon Cloud Security is reasonable, especially for small companies with limited budgets.
No additional cost for maintenance or support; it's all included in the quotation.
However, the main point is that even though it is expensive, it provides a huge capability to the organization.
Upon implementation and evaluation with third-party penetration testing, it meets rigorous security standards required for dealing with financial institutions.
It can protect against zero-day attacks and hidden anomalies.
The solution preemptively blocks zero-day attacks and detects hidden anomalies effectively.
It automatically blocks duplication and activities that could result in data loss, effectively preventing unintended copying of data to personal devices.
The threat detection capability of CrowdStrike Falcon Cloud Security has always been the major seller, and it works effectively.
CrowdStrike Falcon plays a crucial role in our environment and gives us a clear point where we can focus our efforts rather than hunting down what is happening.
| Product | Mindshare (%) |
|---|---|
| Check Point CloudGuard WAF | 0.6% |
| CrowdStrike Falcon Cloud Security | 1.1% |
| Other | 98.3% |

| Company Size | Count |
|---|---|
| Small Business | 35 |
| Midsize Enterprise | 20 |
| Large Enterprise | 19 |
| Company Size | Count |
|---|---|
| Small Business | 14 |
| Midsize Enterprise | 6 |
| Large Enterprise | 15 |
Check Point WAF uses AI-driven threat prevention with seamless API integration, offering advanced DDoS protection. It auto-learns attack patterns, updates protection, and minimizes false positives. Its interface simplifies policy management for secure web applications across cloud environments.
Check Point WAF combines AI-driven threat detection with streamlined policy management to provide effective security for web applications and APIs. It offers zero-day protection, threat intelligence, and advanced DDoS protection. Users enjoy robust logging and compliance management across multi-cloud environments. Integration is smooth, with reduced reliance on signatures, facilitating multi-layer security. Despite its strengths, users note areas for improvement, such as latency and pricing, and call for enhancements in API security, real-time monitoring, and reporting. Challenges include integration complexity and limited technical support accessibility. Effective application security across dynamic environments is a key offering.
What are Check Point WAF's key features?Check Point WAF finds particular relevance in industries requiring robust cybersecurity measures such as finance, healthcare, and e-commerce. These sectors benefit from its advanced threat detection and adaptive security policy management, crucial for securing sensitive data across multi-cloud infrastructures. By managing API usage efficiently, it helps maintain regulatory compliance while ensuring optimal operation. Enhanced traffic logging and malware threat management add to its appeal for organizations focusing on securing transactions and sensitive information.
CrowdStrike Falcon Cloud Security is a platform of cloud security solutions aimed at protecting organizations from breaches while simplifying cloud security management. The unified platform combines several cloud security functionalities for comprehensive protection. Built on the CrowdStrike Falcon Platform, it leverages the powerful agent and technology used in CrowdStrike's renowned endpoint protection solutions, extending its capabilities seamlessly to cloud environments.
CrowdStrike Falcon Cloud Security is designed to be a shield for the cloud infrastructure. One of its key strengths is its ability to monitor cloud workloads for potential breaches and attacks. It doesn't matter if you're running virtual machines, containers, or a combination of both across different cloud providers – Falcon Cloud Security offers visibility and protection. Additionally, it works tirelessly to pinpoint misconfigurations or vulnerabilities in your cloud setup, proactively stopping issues before they become full-blown security incidents. Compliance becomes easier too, as it can check if your deployments meet the requirements of various industry standards and regulations.
If you heavily utilize containers and Kubernetes, Falcon Cloud Security has you covered. It delves deep into container images and running containers to spot weaknesses and potential threats, helping you secure your containerized applications from the moment they're developed to when they're up and running. Finally, it tackles the often messy world of permissions in the cloud. Falcon Cloud Security analyzes identities and their attached permissions, ensuring that the principle of least privilege is followed and sensitive data isn't exposed due to overly broad access rights.
In essence, CrowdStrike Falcon Cloud Security aims to simplify the complexities of cloud security by consolidating tools, providing a centralized view of your risks and threats, and delivering advanced protection that blends seamlessly with your development processes.
Based on the interviews we conducted with CrowdStrike Falcon Cloud Security users, overall, the sentiment is positive. Users praise the solution's efficacy in detecting and preventing threats, its ease of use, scalability, stability, and integration with existing systems. There were also mentions of areas for improvement, such as the pricing, the user interface, and customer support.
We monitor all Application Security Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.