Director of Security EngineerIng at a financial services firm with 5,001-10,000 employees
Real User
Top 20
2024-03-15T13:43:00Z
Mar 15, 2024
We have had a number of real events where developers accidentally made commits of API keys, and we were able to detect and begin response actions in minutes. We had the API key revoked in less than five minutes in such events.
Knowing what measures we must take allows us to reduce costs associated with security in the cloud by providing early identification of a risk or a possible security breach.
Learn what your peers think about Check Point CloudGuard Code Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2024.
Cloud Support at a tech company with 51-200 employees
User
Top 5
2022-06-19T01:36:00Z
Jun 19, 2022
Being able to check different languages in different data centers or public clouds generates great confidence in the environment that can be checked, which has been very useful for the company.
CloudGuard Code Security’s automated tools integrate with developers’ tools to detect code vulnerabilities and to identify secrets and misconfigurations in the code before deployment, preventing unauthorized use to nefarious ends. With CloudGuard Code Security, organizations can prevent exposing API keys, tokens and credentials, in addition to remediating security misconfigurations. With a super-fast platform, CloudGuard Code Security ensures security without compromising productivity.
We have had a number of real events where developers accidentally made commits of API keys, and we were able to detect and begin response actions in minutes. We had the API key revoked in less than five minutes in such events.
We have a strong sense of security assurance when utilizing CloudGuard, as it consistently delivers outstanding protection capabilities.
Having a cloud detection response helps to very quickly identify security threats in our environment.
Compared to what we used before, it's helping us to be more efficient in managing our traffic.
Knowing what measures we must take allows us to reduce costs associated with security in the cloud by providing early identification of a risk or a possible security breach.
Its fastest and most outstanding characteristic is ensuring a development line that will not lead to applying applications or code development.
It maintains very effective monitoring since it has a very fast and updated database, resulting in new vulnerabilities being caught quickly.
The data center security system has provided real-time analytics on performance and data configuration processes.
You can maintain a legal framework structure at all times.
The implementation of this tool for security management and control is very simple.
Being able to check different languages in different data centers or public clouds generates great confidence in the environment that can be checked, which has been very useful for the company.