Buyer's Guide
CWPP (Cloud Workload Protection Platforms)
October 2022
Get our free report covering Microsoft, Palo Alto Networks, Amazon, and other competitors of Microsoft Defender for Cloud. Updated: October 2022.
654,218 professionals have used our research since 2012.

Read reviews of Microsoft Defender for Cloud alternatives and competitors

Mantu Shaw - PeerSpot reviewer
Sr. Technology Architect at Incedo Inc.
Real User
Top 5
Helpful technical support, with a seamless setup and good integration with the public cloud
Pros and Cons
  • "Auto remediation is a very effective feature that helps ensure less manual intervention."
  • "Almost all features are good, however, they still require improvements to the code security portion on which integration with the major source code repository is required."

What is our primary use case?

The product provides complete visibility of our cloud security posture. It supports servers and Cloud-Native Services. It provides a centralized solution for Cloud Security with risk and compliance management. 

We required it to manage various compliance requirements including live ISO, SOC, PCI and it supports everything. Our Organization is in a hybrid structure and in it, we are using various AWS and Azure accounts. Earlier, we managed everything individually, however, after the implementation of it, we now manage everything from a single solution. The single solution helps with the system, network, and security administration.

How has it helped my organization?

The solution provides the complete visibility of Cloud Security, as well as a number of baseline policies and rules. This helps us to manage cloud posture with less effort. After implementation, it reduced administrative effort in terms of managed security over the cloud. Now, we are not dependent on individual tools for each account as well as cloud service providers. 

After implementation, the team can generate reports from a single console for all compliance needs.

Auto Remediation is a very effective feature and it improves the need for manual intervention from the security and cloud administrator.

What is most valuable?

The baseline policy and the integration with the public cloud are very easy.

The number of compliance rulesets along with the baseline policy, support of cloud-native services, and license management are easy. Support of the CI/CD pipeline security (Code Security), Kubernetes, et cetera, is useful. 

There are very helpful and various types of reports. Reporting features are very good and anyone from the compliance team can view/generate a report according to compliance support.

Auto remediation is a very effective feature that helps ensure less manual intervention.

Support of AWS Lamda and Azure Functions helps for any potential breaches.

What needs improvement?

Almost all features are good, however, they still require improvements to the code security portion on which integration with the major source code repository is required.

Integration with CI/CD is an important aspect as it is needed to secure the environment. Having it will help a lot.

Integration with Docker is also a key feature that needs some improvements.

Integration with other third parties and with SIEM is an important aspect that should be addressed.

Currently, it provides integration with Tenable, but it would be good if it had support other VAPT software as well.

For how long have I used the solution?

We have been using Check Point CloudGuard Posture management for the last 8+ months.

What do I think about the stability of the solution?

The solution is very stable and we have not found any gaps. It provides seamless integration with the public cloud.

What do I think about the scalability of the solution?

It's a highly scalable solution and integration with the public cloud is very good. The way you can centralize the dashboard of entire cloud infra is a very impressive.

How are customer service and support?

Support has been good. We implement it with the help of OEM support and whenever we've required help we've received a good response.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Earlier, we tested other tools as well, however, the features which were available via Check Point are very good and the future roadmap is also very good in regards to cloud security.

How was the initial setup?

The setup is straightforward and seamless.

What about the implementation team?

We implemented it with help of Check Point support. The rest was managed by our internal team as it's easy to handle.

What was our ROI?

Security is very important and gives us ROI from security itself. We also get an ROI as we have less administrative effort. We can see an ROI with the compliance and risk management on offer too.

What's my experience with pricing, setup cost, and licensing?

The setup cost is very affordable and very easy. Integration with the public cloud is very easy. The licensing calculation is also very good and no manual effort is required.

Which other solutions did I evaluate?

We evaluated other tools like Rapid7, Qualys, and AWS native security tools, as well as Azure native security tools.

What other advice do I have?

It's a very strong solution for cloud security posture management and very effective for large and mid-size environments. Any organization moving towards the cloud would benefit from this.  

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: I am a real user, and this review is based on my own experience and opinions.
alvarado - PeerSpot reviewer
Cloud Support Leader at a tech company with 51-200 employees
User
Top 5Leaderboard
Easy to implement and manage with good security capabilities
Pros and Cons
  • "Phishing reports in addition to the policies can be applied to improve security in the company."
  • "It would also be very good if they improved the support management since sometimes they take a long time to respond, or offer help only during office hours, which is not the most convenient."

What is our primary use case?

Currently, our company uses mail with Microsoft 365, both Exchange, Teams, and One Drive, which always showcases phishing problems, or malware, sent by mail. This Check Point technology application has helped us with validation, revision, and improvements. In security, which shields our current resources in a better way, implementation is really easy to carry out and very useful for us, in terms of reviewing events. It provided us with improvements and records that have happened in our environment, which works perfectly. It allows us to be able to take improvement actions.

How has it helped my organization?

Of course, Check Point Harmony email and office has helped us. It's a simple implementation, and through Check Point, the Infinity portal offers a really centralized environment. Along with the other environments we have with Check Point, it is very influential.

Phishing reports in addition to the policies can be applied to improve security in the company.

It has also helped us a lot with the detection of malicious files sent to our users to avoid infiltrations that could affect us. It is really a pretty good security application.

What is most valuable?

In this security solution, there are several features that have caught our attention since they allowed us to greatly improve perimeter security, one of them is its quite precise reports to validate what is happening and how to cover existing problems and vulnerabilities.

The implementation or integration of Microsoft 365 with Check Point Harmony Email and Office was quite easy, which helped a lot to take more interest in this solution.

Finally, we love this solution as it doesn't require an administration server which is easier to manage.

What needs improvement?

Since this solution is administered through Check Point Infinity Portal, this would be the entry key for management. Sometimes the portal has performance problems, and sometimes it takes time to respond, which causes difficulty in managing the tool.

It would also be very good if they improved the support management since sometimes they take a long time to respond, or offer help only during office hours, which is not the most convenient. Sometimes you choose to investigate by your own means or using the Check Point documentation.

For how long have I used the solution?

We used this security application to validate. It was really easy to implement through Check Point Infinity, and the results were as expected by the IT department for the company.

How are customer service and support?

the support always resolves but is somewhat slow in its responses.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used Microsoft's anti-phishing and malware tools, however, we opted to try Check Point for evaluation and comparison.

What's my experience with pricing, setup cost, and licensing?

It is very important that companies that want to implement any product first carry out environment tests to later determine if they can be coupled with the company's requirements.

Which other solutions did I evaluate?

We validated the documentation of several manufacturers before finally taking Check Point as an option.

What other advice do I have?

I really recommend that you value several options, however, I recommend the use of Check Point Harmony.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
Cyber Security Analyst at a consultancy with 10,001+ employees
Real User
Easy to maintain with advanced protection and helpful support
Pros and Cons
  • "We can scale the product as needed."
  • "We'd like to see a few more integrations."

What is our primary use case?

We primarily use the solution for the XDR.

We have integrated this with all of our endpoints. Basically, we are using it for incident response. We have a SOC team here, so we are using it in a SOC and the Workload solution. For two or three months, we have been migrating to Workload Security. It is mainly for incident response.

What is most valuable?

We are able to observe attack techniques and targeted attack detection. 

We need to explore more on it since it is still a new product for us. 

It is quite advanced, and it can help us protect our organization against threats. The targeted threat detection is great.

My understanding is the initial setup is pretty straightforward. 

The solution has been stable. 

We can scale the product as needed. 

Technical support is helpful.

It is easy to maintain. 

What needs improvement?

We'd like to see a few more integrations. Specifically, we'd like to see more IOC integration tools. 

We haven't implemented the automation piece just yet; however, we will go through that soon. We just need more time to see how it all works. 

For how long have I used the solution?

I've been using the solution for six or seven months. 

What do I think about the stability of the solution?

This solution seems to be pretty stable so far. I haven't come across any issues. There are no bugs or glitches. It doesn't crash or freeze. 

What do I think about the scalability of the solution?

The product is scalable. When we started, we had a few agents and very few endpoints. At this point, we've integrated with most of them. We haven't seen any issues as we've scaled up.

How are customer service and support?

Support has been quite helpful overall. We've dealt with them multiple times, and they have always been helpful. We tend to get the help we need within two or three hours. They ask many questions and get down to solving the problem at hand. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I also work with Microsoft Defender. 

We were using OfficeScan and ApexOne as well. 

We decided to work with this product as it had a good reputation.

How was the initial setup?

While I wasn't directly involved with the setup, my understanding is it was straightforward. I do not recall hearing about any complexities coming up. The deployment itself took a few months.

In terms of maintenance, we do get hotfixes every once in a while. It's pretty simple to maintain. 

What about the implementation team?

Trend Micros assisted our team with the setup process. However, it was mostly handled in-house. 

What's my experience with pricing, setup cost, and licensing?

I can't speak to the exact cost.

What other advice do I have?

I'm an end-user. We are using the latest version of the solution. 

The support is pretty good. It is really straightforward. It is very easy to understand, and therefore, I highly recommend the solution.

I'd rate the solution nine out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
Buyer's Guide
CWPP (Cloud Workload Protection Platforms)
October 2022
Get our free report covering Microsoft, Palo Alto Networks, Amazon, and other competitors of Microsoft Defender for Cloud. Updated: October 2022.
654,218 professionals have used our research since 2012.