I will honestly say that we are just testing Check Point CloudGuard Cloud Intelligence and Threat Hunting in my company. It is just for testing, not production. It has not been experienced for configuration and resolution for a production infrastructure, just testing in my company. During testing, I mainly used Check Point CloudGuard Cloud Intelligence and Threat Hunting to improve visibility across cloud workload and proactively identify potential threats that traditional security alerts might miss. The goal was to correlate network, identity, and cloud activity logs into a single view for faster investigation. If I saw a suspicious IP in the login attempt, I could immediately search whether it also touched other assets such as VMs or storage buckets using Check Point CloudGuard Cloud Intelligence and Threat Hunting. I didn't need to normalize log format or correlate timestamp manually. The platform already presented the event in a consistent timeline. That cut out the time it usually takes me to stitch together a full picture of what happened. In practice, during testing, an investigation that might normally take me an hour across separate tools only took about 10 or 15 minutes in CloudGuard, because I could trace from the initial alert, related user or account associated network activity all in the same interface. Beyond just speeding things up, Check Point CloudGuard Cloud Intelligence and Threat Hunting gave me more context around the alert. For example, during testing, I could see not only that a login attempt was suspicious but also whether the IP address was already on a known malicious list in ThreatCloud and if that same identity interacted with other assets in my environment.
Check Point CloudGuard Cloud Intelligence and Threat Hunting is primarily designed to provide advanced threat detection and response capabilities for cloud environments. The primary use case of this solution is to detect threats, investigate incidents, hunt for threats, and automate responses.
Find out what your peers are saying about Check Point Software Technologies, Sysdig, Orca Security and others in Cloud Detection and Response (CDR). Updated: September 2025.
Cloud Detection and Response (CDR) offers a comprehensive approach to identifying and addressing threats in cloud environments, prioritizing rapid response and mitigation. Designed for expert users, CDR enhances security by providing visibility and actionable insights.As organizations increasingly rely on cloud-based infrastructure, detecting potential threats and effectively responding to them is essential. CDR solutions are crafted to offer real-time threat detection, equipping security...
I will honestly say that we are just testing Check Point CloudGuard Cloud Intelligence and Threat Hunting in my company. It is just for testing, not production. It has not been experienced for configuration and resolution for a production infrastructure, just testing in my company. During testing, I mainly used Check Point CloudGuard Cloud Intelligence and Threat Hunting to improve visibility across cloud workload and proactively identify potential threats that traditional security alerts might miss. The goal was to correlate network, identity, and cloud activity logs into a single view for faster investigation. If I saw a suspicious IP in the login attempt, I could immediately search whether it also touched other assets such as VMs or storage buckets using Check Point CloudGuard Cloud Intelligence and Threat Hunting. I didn't need to normalize log format or correlate timestamp manually. The platform already presented the event in a consistent timeline. That cut out the time it usually takes me to stitch together a full picture of what happened. In practice, during testing, an investigation that might normally take me an hour across separate tools only took about 10 or 15 minutes in CloudGuard, because I could trace from the initial alert, related user or account associated network activity all in the same interface. Beyond just speeding things up, Check Point CloudGuard Cloud Intelligence and Threat Hunting gave me more context around the alert. For example, during testing, I could see not only that a login attempt was suspicious but also whether the IP address was already on a known malicious list in ThreatCloud and if that same identity interacted with other assets in my environment.
Check Point CloudGuard Cloud Intelligence and Threat Hunting is primarily designed to provide advanced threat detection and response capabilities for cloud environments. The primary use case of this solution is to detect threats, investigate incidents, hunt for threats, and automate responses.