We performed a comparison between Check Point CloudGuard Posture Management and Lacework based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point CloudGuard Posture Management is known for its extensive data protection, incident identification, and detailed reporting. It includes IAM role control and compliance features. Lacework is highly regarded for its machine-learning anomaly detection and agent-based vulnerability management. It offers compliance reports and continuous monitoring. Check Point could enhance reporting options, vulnerability assessments, and integration with other tools. Lacework requires improvement in visibility and compliance-related metrics.
Service and Support: Some Check Point CloudGuard Posture Management customers expressed satisfaction, but others found technical support lacking at times. Lacework's support has garnered overwhelmingly positive reviews. Customers appreciate their promptness and proactive approach.
Ease of Deployment: The setup process for Check Point CloudGuard Posture Management is fast and straightforward, whereas Lacework's setup may take a few weeks to complete.
Pricing: Some users say Check Point CloudGuard Posture Management is reasonably priced and seamless to integrate with the public cloud. Others view it as costly. Lacework has a fixed annual fee and no extra charges. Users have generally had a positive and fair experience with Lacework's pricing and licensing.
ROI: Check Point CloudGuard Posture Management has been praised for its ability to help with compliance programs. Lacework has been commended for its positive ROI achieved through reducing monitoring efforts and automating ticket generation.
Comparison Results: Check Point CloudGuard Posture Management is preferred over Lacework. Users appreciate its comprehensive data security and protection. CloudGuard offers a complete 360 view of customers' entire cloud infrastructure. It is commended for its granular reporting, ruleset customization, IAM role control, and embedded machine learning for real-time attack prevention. The intuitive dashboard, powerful reporting, and ability to enhance security are also highly praised. Users say Lacework needs improvements in visibility, compliance metrics, and integration with other systems.
"The management console is the most valuable feature."
"Cloud Native Security has helped us with our risk posture and securing our agenda. It has been tremendous in terms of supporting growth."
"The offensive security where they do a fix is valuable. They go to a misconfiguration and provide detailed alerts on what could be there. They also provide a remediation feature where if we give the permission, they can also go and fix the issue."
"The management console is highly intuitive to comprehend and operate."
"PingSafe's integration is smooth. They are highly customer-oriented, and the integration went well for us."
"They're responsive to feature requests. If I suggest a feature for Prisma, I will need to wait until the next release on their roadmap. Cloud Native Security will add it right away."
"Cloud Native Security helps us discover vulnerabilities in a cloud environment like open ports that allow people to attack our environment. If someone unintentionally opens a port, we are exposed. Cloud Native Security alerts us so we can remediate the problem. We can also automate it so that Cloud Native Security will fix it."
"We've seen a reduction in resources devoted to vulnerability monitoring. Before PingSafe we spent a lot of time monitoring and fixing these issues. PingSafe enabled us to divert more resources to the production environment."
"This product provides a really nice visualization of the infrastructure, including network topology, firewalls, etc."
"The various CNAPP modules have granted more visibility of our cloud applications to our system engineers and developers."
"Cloud security posture management is the feature we've been using the longest."
"The product enables us to check the information that goes out of the company."
"Visibility is a key feature. It helps me to validate my overall network posture."
"The new scanning function is a valuable feature that wasn't available until recently."
"The most valuable feature is the ability to work with the APIs to integrate into our own backend systems."
"Dome9 has improved our organization; we have a centralized view of all of our assets, our visible assets our ECs, our inventories. And then all the policies are centralized, and it is easier to manage because everything is one component console."
"Polygraph compliance is a valuable feature. In our perspective, it delivers significant benefits. The clarity it offers, along with the ability to identify and address misconfigurations, is invaluable. When such issues arise, we promptly acknowledge and take action, effectively collaborating with our teams and the responsible parties for those assets. This enables us to promptly manage problems as soon as they arise."
"The most valuable aspects are identifying vulnerabilities—things that are out there that we aren't aware of—as well as finding what path of access attackers could use, and being able to see open SSL or S3 buckets and the like."
"The most valuable feature is Lacework's ability to distill all the security and audit logs. I recommend it to my customers. Normally, when I consult for other customers that are getting into the cloud, we use native security tools. It's more of a rule-based engine."
"Lacework is helping a lot in reducing the noise of the alerts. Usually, whenever you have a tool in place, you have a lot of noise in terms of alerts, but the time for an engineer to look into those alerts is limited. Lacework is helping us to consolidate the information that we are getting from the agents and other sources. We are able to focus only on the things that matter, which is the most valuable thing for us. It saves time, and for investigations, we have the right context to take action."
"The most valuable feature, from a compliance perspective, is the ability to use Lacework as a platform for multiple compliance standards. We have to meet multiple standards like PCI, SOC 2, CIS, and whatever else is out there. The ability to have reports generated, per security standard, is one of the best features for me."
"For the most part, out-of-the-box, it tells you right away about the things you need to work on. I like the fact that it prioritizes alerts based on severity, so that you can focus your efforts on anything that would be critical/high first, moderate second, and work your way down, trying to continue to improve your security posture."
"There are many valuable features that I use in my daily work. The first are alerts and the event dossier that it generates, based on the severity. That is very insightful and helps me to have a security cap in our infrastructure. The second thing I like is the agent-based vulnerability management, which is the most accurate information."
"The best feature, in my opinion, is the ease of use."
"They can work on policies based on different compliance standards."
"Cloud Native Security's reporting could be better. We are unable to see which images are impacted. Several thousand images have been deployed, so if we can see some application-specific information in the dashboard, we can directly send that report to the team that owns the application. We'd also like the option to download the report from the portal instead of waiting for the report to be sent to our email."
"We'd like to have better notifications. We'd like them to happen faster."
"In terms of ease of use, initially, it is a bit confusing to navigate around, but once you get used to it, it becomes easier."
"After closing an alert in Cloud Native Security, it still shows as unresolved."
"There's room for improvement in the graphic explorer."
"Scanning capabilities should be added for the dark web."
"They need more experienced support personnel."
"The software configurations theory is complicated, and without proper planning and a well-skilled technical team, it cannot perform its tasks properly."
"Down the road, we would like to see automation. That is probably a feature that most people want. If they can automate patching a vulnerability, it will be much easier."
"The technical support could be better, but I do not know of any other needed improvements."
"The tool has a lot of potential, but today, it lacks a lot of Scripts/Bots for Azure."
"The reporting has a lot of opportunities to continuously improve so that we can continue to show value."
"The Check Point Infinity admin portal sometimes freezes."
"The reporting dashboard responds slowly, which leads to late report compilation."
"I would like to see improvements in the vulnerability assessments in terms of how the solution discovers vulnerabilities or compromised workloads. Also, customizable reports would be nice."
"I would like to see a remote access assistance feature. And the threat-hunting platform could be better."
"Lacework lacks remediation features, but I believe they're working on that. They're focused on the reporting aspect, but other features need to improve. They're also adding some compliance features, so it's not worth saying they need to get better at it."
"Visibility is lacking, and both compliance-related metrics and IAM security control could be improved."
"The biggest thing I would like to see improved is for them to pursue and obtain a FedRAMP moderate authorization... I don't believe they have any immediate plans to get FedRAMP moderate authorized, which is a bit of a challenge for us because we can only use Lacework in our commercial environment."
"Lacework has not reduced the number of alerts we get. We've actually had to add resources as a result of using it because the application requires a lot of people to understand it to get the value out of it properly."
"A feature that I have requested from them is the ability to sort alerts and policies based on a security framework. Right now, when you go into alerts, you have hundreds and hundreds of them that you have to manually pick. It would be useful to have categories for CIS Benchmark or SOC 2 and be able to display all the alerts and policies for one security framework."
"The configuration and setup of alerts should be easier. They should make it easier to integrate with systems like Slack and Datadog. I didn't spend too much time on it, but to me, it wasn't as simple as the alerting that I've seen on other systems."
"Its integrations with third-party SIEMs can be better. That is one of the things that we discussed with them."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
Check Point CloudGuard CNAPP is ranked 6th in Vulnerability Management with 64 reviews while Lacework is ranked 10th in Vulnerability Management with 9 reviews. Check Point CloudGuard CNAPP is rated 8.6, while Lacework is rated 8.8. The top reviewer of Check Point CloudGuard CNAPP writes "Threat intel integration provides us visibility in case any workload is communicating with suspicious or blacklisted IPs". On the other hand, the top reviewer of Lacework writes "Makes us aware of vulnerabilities and provides a lot of data but it's not easily understood at first look". Check Point CloudGuard CNAPP is most compared with Prisma Cloud by Palo Alto Networks, Wiz, AWS GuardDuty, Microsoft Defender for Cloud and Qualys VMDR, whereas Lacework is most compared with Wiz, AWS GuardDuty, Prisma Cloud by Palo Alto Networks, Snyk and Microsoft Defender for Cloud. See our Check Point CloudGuard CNAPP vs. Lacework report.
See our list of best Vulnerability Management vendors, best Cloud Workload Protection Platforms (CWPP) vendors, and best Cloud Security Posture Management (CSPM) vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.