As per the solution's blade design, there are many options. For example, you have to buy a UTM blade and an advanced malware blade, etc. If the blade license is there, we can configure from the firewall GUI.
We find Check Point valuable because they are 100% focused on security. It totally closes the potential vulnerability channel. We can check our mail and our attachments and we can scan everything easily. We get an immediate report about the situation of the attachments. We can discover if the target's security attack was started from phishing, etc. We also enjoy using the additional features that protect our internal customer from targeted attacks.
Learn what your peers think about Check Point CloudGuard Network Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
Network and Security Manager at a financial services firm with 1,001-5,000 employees
Real User
2019-08-04T07:38:00Z
Aug 4, 2019
It's a high-performance device. The network performance is also really good. We check how much time it takes for the servers. Our network performance has increased since using this solution.
The most valuable feature is the monitoring. We can easily monitor what kind of stuff comes over to our network and we can then check the dashboard and work accordingly.
CloudGuard Network Security is a firewall solution that provides network security for cloud environments. It protects against cyber threats with multi-layered security for public, private, and hybrid clouds.
CloudGuard Network Security offers advanced threat prevention, firewall, VPN, and application security services, designed to secure cloud infrastructure, virtual networks, and cloud-based applications and workloads.
CloudGuard Network Security Features
CloudGuard Network Security...
The most valuable feature for us is the cluster support.
As per the solution's blade design, there are many options. For example, you have to buy a UTM blade and an advanced malware blade, etc. If the blade license is there, we can configure from the firewall GUI.
A unique architecture makes this product stand out from other solutions.
The IPS, application and URL filtering, as well as Identity Awareness, are all very valuable features.
We find Check Point valuable because they are 100% focused on security. It totally closes the potential vulnerability channel. We can check our mail and our attachments and we can scan everything easily. We get an immediate report about the situation of the attachments. We can discover if the target's security attack was started from phishing, etc. We also enjoy using the additional features that protect our internal customer from targeted attacks.
The program is very stable.
The most valuable feature of this solution is that you can start off with a simple firewall and expand it to UTM.
It's a high-performance device. The network performance is also really good. We check how much time it takes for the servers. Our network performance has increased since using this solution.
The most valuable feature is the monitoring. We can easily monitor what kind of stuff comes over to our network and we can then check the dashboard and work accordingly.