

Veracode and Check Point WAF are key players in the application security space. Veracode seems to have an edge in static analysis and vulnerability detection, while Check Point WAF excels in AI-driven threat prevention and comprehensive protection against attack vectors.
Features: Veracode focuses on static code analysis, providing developers with comprehensive security vulnerability categorization and reports. It offers integration with CI/CD pipelines and tools like OWASP for effective dependency checks. Check Point WAF offers AI-driven threat prevention, API security, and DDoS protection, with real-time threat learning and machine learning capabilities that enhance its security posture.
Room for Improvement: Veracode users seek improvements in false positive reduction, user interface enhancements, and faster scan times along with better API support. Check Point WAF faces challenges regarding latency issues, pricing for smaller businesses, and support efficiency, with users looking for better integration with third-party tools and a more cost-effective solution.
Ease of Deployment and Customer Service: Both products cater to a range of cloud environments, such as Private, Public, and Hybrid Clouds. Veracode’s support is mixed, with feedback highlighting both responsiveness and the need for faster resolutions. Similarly, Check Point WAF’s support requires improvement in response times, despite the deployment being generally straightforward, although more complex configurations increase the challenge.
Pricing and ROI: Veracode is considered high-priced, especially for SMEs, yet many find value in its security features, seeing a significant ROI through reduced breaches and compliance ease. Check Point WAF is also costly but offers extensive security capabilities, where the ROI mainly stems from enhanced threat prevention and streamlined security management.
When we are attacked, we can understand how important the solution is.
When you migrate to the cloud, it feels like saving 90% of your time.
Most of the operations happen in the background, so I do not spend much time on it.
The scanners of Veracode bring status of the weaknesses in the current infrastructure. It scans and provides reports regarding the servers, the network, and the applications running on those servers.
Regarding price, the evaluation should focus on how efficiently they will recover their investment, considering the time saved through the use of Veracode Fix, for example, and the ability to fix code at dev time compared to the problems faced when fixing after the product is already deployed.
We did see a return on investment with Veracode, as we segregated our remediation efforts, which reduced our time to delivery as well as the number of engineers needed to help us in delivering a secure solution.
They need to increase the number of people for 24/7 support.
They were responsive even before we committed to buying their solution.
I also received full technical support, especially during the implementation.
Access to the engineering team is crucial for faster feedback on the product fix process.
I have communicated with the technical support of Veracode a couple of times, and this was a really great experience because these professionals know their material.
They share detailed information via email, including screenshots or further clarification about the issue.
If I need to scale, I open a Whatsapp group with the director and the team, and we quickly proceed to do so.
They have sufficient resources, and there are no challenges from a scalability perspective.
Check Point CloudGuard WAF's scalability is very good.
Cloud solutions are easier to scale than on-premise solutions.
It has a good capacity to scale effectively.
Implementing these features into our normal CI/CD was good, so I can say that scalability is really good.
It is very stable.
It is very stable, never crashing or giving me an error that I can see.
I did not have any issues in the last three years during which I had more than ten critical services running on CloudGuard.
If the Veracode server is down, we experience many issues during the scan.
I have observed that it is not that reliable in terms of security because Veracode was not able to find some security threats in our application that existed since the product was developed.
It's not that easy to onboard, but once they have been onboarded on the platform, and the pipeline configured alongside the product configured, it works effectively.
The provider could improve by providing better guidance and support during the configuration process.
Future releases should include better bot mitigation, behavioral anomaly detection, compliance templates, advanced threat intel integration, and streamlined multi-cloud support to boost protection and usability.
A machine learning-based adaptive mode could help the WAF learn over time and auto-tune policies.
If it could be integrated directly with code repositories such as Bitbucket or GitHub, without the need to create a pipeline to upload and decode code, it would simplify the code scan process significantly.
We had issues with scanning large applications. Scanning took a lot of time, so we kept it outside the DevOps pipeline to avoid delaying deployments.
A nice addition would be if it could be extended for scenarios with custom cleansers.
It is more expensive than f5, where we purchased everything as bundles, and Check Point costs more, but it is worth the money.
It is less costly than Cloudflare, Fortinet, and other vendors.
I know that its price is relatively expensive compared to other products but it gives benefits that are worth it.
It's not the most expensive solution.
Overall, Veracode's pricing is lower and more scalable than many alternatives in the market.
If there's a security gap, you'll never know the cost or effect.
Upon implementation and evaluation with third-party penetration testing, it meets rigorous security standards required for dealing with financial institutions.
It can protect against zero-day attacks and hidden anomalies.
The solution preemptively blocks zero-day attacks and detects hidden anomalies effectively.
It offers confidence by preventing exposure to vulnerabilities and helps ensure that we are not deploying vulnerable code into production.
The best features in Veracode include static analysis and the early detection of vulnerable libraries; it integrates with tools such as Jenkins.
It fixes issues directly in the IDE while you're doing it.
| Product | Mindshare (%) |
|---|---|
| Veracode | 4.4% |
| Check Point CloudGuard WAF | 0.6% |
| Other | 95.0% |
| Company Size | Count |
|---|---|
| Small Business | 35 |
| Midsize Enterprise | 20 |
| Large Enterprise | 19 |
| Company Size | Count |
|---|---|
| Small Business | 69 |
| Midsize Enterprise | 45 |
| Large Enterprise | 114 |
Check Point WAF uses AI-driven threat prevention with seamless API integration, offering advanced DDoS protection. It auto-learns attack patterns, updates protection, and minimizes false positives. Its interface simplifies policy management for secure web applications across cloud environments.
Check Point WAF combines AI-driven threat detection with streamlined policy management to provide effective security for web applications and APIs. It offers zero-day protection, threat intelligence, and advanced DDoS protection. Users enjoy robust logging and compliance management across multi-cloud environments. Integration is smooth, with reduced reliance on signatures, facilitating multi-layer security. Despite its strengths, users note areas for improvement, such as latency and pricing, and call for enhancements in API security, real-time monitoring, and reporting. Challenges include integration complexity and limited technical support accessibility. Effective application security across dynamic environments is a key offering.
What are Check Point WAF's key features?Check Point WAF finds particular relevance in industries requiring robust cybersecurity measures such as finance, healthcare, and e-commerce. These sectors benefit from its advanced threat detection and adaptive security policy management, crucial for securing sensitive data across multi-cloud infrastructures. By managing API usage efficiently, it helps maintain regulatory compliance while ensuring optimal operation. Enhanced traffic logging and malware threat management add to its appeal for organizations focusing on securing transactions and sensitive information.
Veracode is a leading provider of application security solutions, offering tools to identify, mitigate, and prevent vulnerabilities across the software development lifecycle. Its cloud-based platform integrates security into DevOps workflows, helping organizations ensure that their code remains secure and compliant with industry standards.
Veracode supports multiple application security testing types, including static analysis (SAST), dynamic analysis (DAST), software composition analysis (SCA), and manual penetration testing. These tools are designed to help developers detect vulnerabilities early in development while maintaining speed in deployment. Veracode also emphasizes scalability, offering features for enterprises that manage a large number of applications across different teams. Its robust reporting and analytics capabilities allow organizations to continuously monitor their security posture and track progress toward remediation.
What are the key features of Veracode?
What benefits should users consider in Veracode reviews?
Veracode is widely adopted in industries like finance, healthcare, and government, where compliance and security are critical. It helps these organizations maintain strict security standards while enabling rapid development through its integration with Agile and DevOps methodologies.
Veracode helps businesses secure their applications efficiently, ensuring they can deliver safe and compliant software at scale.
We monitor all Application Security Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.