We performed a comparison between Check Point CloudGuard Posture Management and Aqua Security Platform based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point CloudGuard Posture Management provides a wide range of data security measures, including incident detection and detailed reporting. It also offers IAM role control and governance support. Aqua Security Platform excels in container security and on-demand patching. Users also liked its sandboxing features. Check Point CloudGuard could enhance its false positive rate and vulnerability assessments. Aqua Security Platform could reduce its resource consumption optimization while improving its log ingestion and integration with other tools.
Service and Support: Customers have generally expressed satisfaction with Check Point customer service, noting quick response times and positive support experiences, but some users say there is room for improvement. Aqua Security Platform's customer service has also been praised for being responsive and helpful, although a few users mentioned having to resolve issues on their own. Some said Aqua should provide more local support to customers in different regions.
Ease of Deployment: Check Point CloudGuard Posture Management's initial setup is straightforward and quick, while Aqua Security Platform's setup can be more complex and time-consuming, especially for larger environments.
Pricing: Some regard Check Point CloudGuard Posture Management as a budget-friendly option, but others perceive it as costly. Aqua Security Platform's licensing is moderate and not based on user count, but some say the price could be lower.
ROI: Check Point CloudGuard Posture Management provides a significant return on investment by effectively addressing compliance issues and minimizing administrative work. Users have not provided feedback on Aqua Security Platform's ROI so far.
Comparison Results: Check Point CloudGuard Posture Management is preferred over Aqua Security Platform. Users praise Check Point for its comprehensive data protection and 360 coverage of cloud infrastructure. Check Point offers granular reporting and customizable rulesets. Aqua Security Platform users complained about the complexity of its setup processes and suggested improvements in reporting, logging, and resource consumption.
"The real-time detection and response capabilities overall are great."
"The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features."
"It's helped free up staff time so that they can work on other projects."
"We like the platform and its response time. We also like that its console is user-friendly as well as modern and sleek."
"The solution helped free other staff to work on other projects or other tasks. We basically just had to do a bunch of upfront configuring. With it, we do not have to spend as much time in the console."
"Cloud Native Security has helped us with our risk posture and securing our agenda. It has been tremendous in terms of supporting growth."
"The cloud misconfiguration is the most valuable feature."
"The solution is a good alerting tool."
"The CSPM product is great at securing our cloud accounts and I really like the runtime protection for containers and functions too."
"The most valuable features are that it's easy to use and manage."
"The solution was very user-friendly."
"The most helpful feature of Aqua Security is Drift Prevention, which is a feature that allows images to be immutable. In addition, one of the main reasons we went with Aqua Security is because it provides strong protection when it comes to runtime security."
"The most valuable feature of Aqua Security is the scanner."
"From what I understand, the initial setup is simple."
"Aqua Security allowed us to gain visibility into the vulnerabilities that were present in the container images, that were being rolled out, the amount of risk that we were introducing to the platform, and provided us a look into the container environment by introducing access control mechanisms. In addition, when it came to runtime-level policies, we could restrict container access to resources in our environment, such as network-level or other application-level access."
"The DTA, which stands for Dynamic Threat Analysis, allows me to analyze Docker images in a sandbox environment before deployment, helping me anticipate risks."
"This platform has allowed us to collect data from multiple sources, centralizing everything under a single source."
"The posture management and remediation features are the most valuable. We use GSL Builder to build custom rules in alignment with our organization's policies. CloudGuard has canned rules using multiple standard frameworks, but we also have additional rules."
"This product provides a really nice visualization of the infrastructure, including network topology, firewalls, etc."
"It provides critical insights that enable the IT team to plan and launch smart investigations when there are security breaches."
"Helps identify and correct misconfigurations in cloud environments, ensuring that infrastructure and applications are secure and optimized."
"The way they offer container security is a big highlight that I have noticed. The solution is also agentless, so the scanning, runtime, really everything is offered directly by CloudGuard."
"It provides complete visibility of workload hosted on different cloud platforms including AWS and Azure, along with multiple tenants."
"The product enables us to check the information that goes out of the company."
"In terms of ease of use, initially, it is a bit confusing to navigate around, but once you get used to it, it becomes easier."
"I would like additional integrations."
"The Automation tab is an add-on that doesn’t work properly. They provide a list of scripts that don’t work and I have asked support to assist but they won’t help. When running on various endpoints the script doesn’t work and if it does, it’s only a couple. There are a lot of useful scripts that would be beneficial to run forensics, event logs, and process lists running on the endpoint."
"Customized queries should be made easier to improve PingSafe."
"The recommended actions aren't always specific, so it might suggest recommendations that don't apply to the particular infrastructure code I'm reviewing."
"Bugs need to be disclosed quickly."
"The categorization of the results from the vulnerability assessment could be improved."
"For vulnerabilities, they are showing CVE ID. The naming convention should be better so that it indicates the container where a vulnerability is present. Currently, they are only showing CVE ID, but the same CVE ID might be present in multiple containers. We would like to have the container name so that we can easily fix the issue."
"There's room for improvement, particularly in management capabilities as it may not be comprehensive enough for all customers, and it has been lacking in the realm of cloud security posture management."
"They want to release improvements to their product to work with other servers because now there are more focused on the Kubernetes environment. They need to improve the normal servers. I would like to have more options."
"We would like to see an improvement in the overview visibility that this solution offers."
"Aqua Security lacks a lot in reporting."
"The integrations on CICD could be improved. If Aqua had more plugins or container images to integrate and automate more easily on CICD, it would be better."
"Since we are working from home, we would like to have the proper training for Aqua."
"Aqua Security could improve the forwarding of logging into Splunk and into other tools, it should be easier."
"The solution could improve user-friendliness."
"The guidelines to implement or to link with the clouds are not complete."
"CloudGuard could be improved by including integration with vendors other than AWS, especially Azure, especially in permissions."
"Their service needs improvement."
"It should capture more information in metadata including communication detail. Also, Internal IP addresses should not be tracked as this might be having some compliance issues."
"The price of this solution should be reduced so that it is more affordable to scale."
"The reporting has a lot of opportunities to continuously improve so that we can continue to show value."
"The costs are high."
"Automatic remediation requires read/write access. When providing read/write access to third-party applications, this can add risk. It should have some options of triggering API calls to the cloud platform, which in turn, can make the required changes."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
Aqua Cloud Security Platform is ranked 11th in Cloud and Data Center Security with 16 reviews while Check Point CloudGuard CNAPP is ranked 8th in Cloud and Data Center Security with 64 reviews. Aqua Cloud Security Platform is rated 8.0, while Check Point CloudGuard CNAPP is rated 8.6. The top reviewer of Aqua Cloud Security Platform writes "Reliable with good container scanning and a straightforward setup". On the other hand, the top reviewer of Check Point CloudGuard CNAPP writes "Threat intel integration provides us visibility in case any workload is communicating with suspicious or blacklisted IPs". Aqua Cloud Security Platform is most compared with Prisma Cloud by Palo Alto Networks, Wiz, Snyk, Red Hat Advanced Cluster Security for Kubernetes and SUSE NeuVector, whereas Check Point CloudGuard CNAPP is most compared with Prisma Cloud by Palo Alto Networks, Wiz, AWS GuardDuty, Microsoft Defender for Cloud and Qualys VMDR. See our Aqua Cloud Security Platform vs. Check Point CloudGuard CNAPP report.
See our list of best Cloud and Data Center Security vendors, best Cloud Workload Protection Platforms (CWPP) vendors, and best Cloud-Native Application Protection Platforms (CNAPP) vendors.
We monitor all Cloud and Data Center Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.