We performed a comparison between Check Point CloudGuard CNAPP, Cisco Sourcefire SNORT, and KerioControl based on real PeerSpot user reviews.
Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management."Alerts of cloud activity happening across all accounts is helpful."
"The visibility in our cloud environment is the most valuable feature."
"The audit feature is the most valuable for compliance reasons. It gives you a full view of the whole environment, no matter how many accounts you have in AWS or Azure. You have it all under one umbrella."
"It provides critical insights that enable the IT team to plan and launch smart investigations when there are security breaches."
"Its monitoring and alerts are triggered by a failure or non-compliance with policies. It helps us to be able to act effectively and quickly."
"The two most valuable features for us are the central firewall administrator and the real-time cloud compliance monitoring."
"Cloud security posture management is the feature we've been using the longest."
"The comprehensive security for IaaS and PaaS cloud assets provides efficient security awareness to all the teams."
"Cisco Sourcefire SNORT is easy to configure and the reporting is great. It's also very user-friendly."
"The most valuable feature of this solution is the filtering."
"It has a huge rate of protection. It's has a low level of positives and a huge rate of threat protection. It's easy to deploy and easy to implement. It has an incredible price rate compared to similar solutions."
"The product is inexpensive compared to leading brands such as Palo Alto or Fortinet."
"Solid intrusion detection and prevention that scales easily in very large environments."
"The solution is stable."
"It simplifies the configuration process by offering pre-defined base configurations, including security and connectivity settings."
"The URL filtering is very good and you can create a group for customized URLs."
"It is very comprehensive and simple. It has all the active protections. It's updated. We love that you can set how often it is updated so you can work what is right for you. A large company with a lot of bandwidth can update the virus definitions and security definitions hourly, if they want. A smaller site that's remote, where maybe updating the definitions will eat into the bandwidth, we can schedule those more to go later at night. It's very flexible and works for us in all types of situations. This is great because then we don't have to learn seven different products to be able to work with seven different scenarios."
"The statistic feature enables us to better use bandwidth management. We monitored the use by mobile, type of application, department, and by users. The bandwidth was solid. Our internet speed is optimized for our research."
"All of the features of Kerio Control are equally good. Most valuable to us are the firewall rules, the intrusion detection system, and IP address features."
"The solution is user-friendly."
"The user interface and the ease of use are pretty good. Everything fits together so nicely."
"In terms of the comprehensiveness of the security features, it does a great job of laying out what it does. It's fairly easy to edit and research. Some of the features were turned on by our IT company and I was able to easily find other features on my own by searching for videos on the internet. I've been able to block certain websites, and content filter, as well as manage some of our bandwidth because we live stream on Sunday. I'm able to dedicate bandwidth for the encoder that goes to the internet. It always has enough bandwidth, no matter how many people are on the network. That's really helpful."
"The reporting needs to be improved. It is hard to get a domain."
"The firewall and intrusion detection features are good. It has blocked certain things. We have a lot of blocked sites that the staff or anyone using it, the public, etc., can't go on. It works for that. I get quite a few messages every now and again, saying that a virus has been detected and I can go in and block the user who's causing the problem."
"Check Point tools need to improve the latency in the portal since they take a long time to load."
"The reporting has a lot of opportunities to continuously improve so that we can continue to show value."
"The license cost is expensive and has room for improvement."
"Check Point must provide a multi-cloud facility where AWS, Azure, and GCP can seamlessly work together and display posture in an integrated manner."
"The accuracy of its remediation is a 7.5 out of 10. Before, I would have given it a ten but now, to handle remediation for fully qualified domain names, it's not working as it did in the past. We're finding some difficulties there."
"The costs are high."
"The user interface could be improved. Sometimes, the visibility is not immediately available for the environment. We have the native servers that come with the solutions, but we cannot see them in the Check Point log. Another issue is with the integrated file monitoring. It would make sense to have stuff like file integrity monitoring and malware scanning available within this module because we don't want to integrate another product."
"No improvements are needed."
"The main dashboard of Cisco Sourcefire SNORT could improve."
"The implementation could be a bit easier."
"The initial setup is a little difficult compared to other products in the market. It depends on the environment. If we are doing any migration, it might take months in a brown-field environment."
"With the next release, I would like to see some PBR, so that you can do the configuration with the features."
"The customization of the rules can be simplified."
"There are problems setting up VPNs for some regions."
"We are unhappy with technical support for this solution, and it is not as professional as what we typically expect from Cisco."
"Integration with other components — even Cisco's own products — can be enhanced to improve administrative experience."
"They don't provide content filtering when it comes to search engine results. We had an incident on the network where a blocked site was showing up in search results. We are in a school environment, so we have blocked a site with some of the explicit content so that kids wouldn't see it. When one of them did a search, the results came on the search engine part. When you try to drill down to the website, it blocks, but when you search by image, it brings up all the images. That's one of the reasons why we are looking at Juniper."
"If you have to dive deeper into the firewall or any other features, then you really have to read up a bit about how to set it up properly. Some of my colleagues, in the beginning, jumped in and made a bunch of rules but then it got really messy. If Kerio had a template or guidelines for best practices, at the beginning, that would really help. With Kerio Control it's basically 'find out for yourself.'"
"I would like the customer statistics to be more user-friendly. It should explain more what users have been doing throughout the day. Sometimes, it'll just say they downloaded a big file. Meanwhile, they were connected through a VPN."
"The one thing that did put me off of the solution was that, after they were taken over by GFI, the licensing and a few other items have gotten very complicated."
"Support responses need improvement."
"Their support is getting better but still needs improvement."
"One of the problems we do have causes problems with the VPN. The software slows the throughput down too much. You could have a one-gigabit connection from the internet, and it slows it down to the area of upload and download is extremely slow. There's too much content filtering at that point."
"The solution can be improved to create the capability for larger bandwidths that support our business needs."