Anonymous UserNetwork, Systems and Security Engineer at SOLTEL Group
Maurizio TestaSecurity Engineer/Architect at Telecom Italia
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"It's a high-performance device. The network performance is also really good. We check how much time it takes for the servers. Our network performance has increased since using this solution."
"The most valuable feature of this solution is that you can start off with a simple firewall and expand it to UTM."
"The program is very stable."
"We find Check Point valuable because they are 100% focused on security. It totally closes the potential vulnerability channel. We can check our mail and our attachments and we can scan everything easily. We get an immediate report about the situation of the attachments. We can discover if the target's security attack was started from phishing, etc. We also enjoy using the additional features that protect our internal customer from targeted attacks."
"The IPS, application and URL filtering, as well as Identity Awareness, are all very valuable features."
"A unique architecture makes this product stand out from other solutions."
"As per the solution's blade design, there are many options. For example, you have to buy a UTM blade and an advanced malware blade, etc. If the blade license is there, we can configure from the firewall GUI."
"The most valuable feature for us is the cluster support."
"The vulnerability scanning reduces false positives by quite a bit."
"The most valuable feature is the virtual patching."
"In terms of valuable features, I would say its intrusion prevention. Each and every IP connecting to the server gets scanned so we know everyone who is accessing our server and we can block whichever IP's do not belong to us at the firewall."
"The initial setup was straightforward and we didn't have any problem with it."
"This product offers good protection against many types of malware."
"Automated virtual patching is a good feature."
"It integrates well with the cloud; for example, AWS, and Google Cloud Provider."
"The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it."
"The initial setup is difficult. It took me three tries to get it right. The setup took two or three hours."
"The management console can be simplified because at the moment, it is a bit of a challenge to use."
"It is a very expensive program and there are additional costs despite the standard licensing fees."
"The stability of the solution could be improved, but this is the problem of all the solutions in the market. This isn't just a problem specific to Check Point."
"Sometimes, if you aren't familiar with the solution, it can be a bit complex, but it does become easier to use with time. However, every time they launch a new version, it becomes more complex and you need to take time to get familiar with all the changes. For every version that they upgrade, you need to upskill yourself."
"It can be difficult to install properly without prior training"
"If you compare the GUI with the Palo Alto and Forcepoint in the Cisco, they're very easy. Check Point, due to its design, is a little bit complex. They should make the GUI easy to use so that anyone can understand it easily, like Fortinet's GUI. Many companies end up using Fortinet because the GUI is very easy, and there's no need for training. They just deploy the box and do the configuration."
"Our biggest complaint concerns the high resource usage for IDP/IPS, as we cannot turn on all of the features even with new hardware."
"The client can show as offline sometimes, and that becomes a bit difficult for troubleshooting. We end up basically redeploying the client. This is something that could be improved in the future."
"When implementing this solution, sometimes we have challenges with SQL migration."
"As for what could be improved, I think it should come with an XDR facility without any extra cost. They're always releasing new features, but we need to pay extra for them."
"The situation with the currency in Turkey makes this solution a little bit on the expensive side, and if it were lowered then it would be more competitive."
"They need to build in a central console because central integration is not very good right now."
"Requires simplification, a fair amount of trouble shooting required."
"The problem with this solution is that if you go on large sites you have to have an external database, which would increase the cost."
"I would like to see an EDR function for the servers, as that would be useful for us."
"On average, it is normally on the lower end, being less expensive than Palo Alto or Cisco."
"It is more expensive than other solutions and would be more competetive in the market if it came down in price."
"We pay approximately €150,000 ($166,000 USD) per year."
"Licensing is simply by the number of hosts that you are looking to protect within your environment. It makes it much easier to ensure that you are covering your environment."
"There is flexibility in the different licensing models that are offered."
"The pricing is pretty high, not just for your capital, for what you have to pay upfront, but for what you pay for your annual software renewals as well, compared to a lot of other vendors. Check Point is near the top, as far as how much it's going to cost you."
"Pricing of CloudGuard is pretty fair when you have a single account. It's comparable with other cloud providers. But for our use case, it got really pricey when we had to deploy multiple CloudGuards on multiple accounts in different regions, because you can't have CloudGuard protecting multiple regions. That's the big thing."
"The pricing and licensing have been good. We just had to do a license increase for our portion of it. We had that done within a couple of days. Given the fact that it's purely a software-based license, it ends up being even quicker than doing it for an on-prem firewall."
"Some of our customers complain about the cost of this solution."
"It's more expensive than other solutions, such as Sophos and Kaspersky, as an endpoint solution."
"The solution is considerably cheaper than other similar solutions."
"There is a license for this solution and there are extra features you can purchase."
Check Point CloudGuard provides unified cloud native security for all your assets and workloads, giving you the confidence to automate security, prevent threats, and manage posture – everywhere – across your multi-cloud environment.
The Trend Micro Cloud and Data Center Security solution protects applications and data and prevents business disruptions, while helping meet regulatory compliance. Whether you are focused on securing physical virtual, cloud, or hybrid environments, Trend Micro provides the advanced server security you need with the Trend Micro™ Deep Security™ platform.
Check Point CloudGuard Network Security is ranked 1st in Cloud and Data Center Security with 30 reviews while Trend Micro Deep Security is ranked 2nd in Cloud and Data Center Security with 12 reviews. Check Point CloudGuard Network Security is rated 8.4, while Trend Micro Deep Security is rated 8.6. The top reviewer of Check Point CloudGuard Network Security writes "Unified Security Management has enabled us to combine our on-prem appliances and cloud environments". On the other hand, the top reviewer of Trend Micro Deep Security writes "Each and every IP connecting to the server gets scanned so we can block whichever IPs do not belong to us at the firewall". Check Point CloudGuard Network Security is most compared with Fortinet FortiGate, Cisco Firepower NGFW Firewall, Palo Alto Networks NG Firewalls, Cisco ASA Firewall and Juniper SRX, whereas Trend Micro Deep Security is most compared with Trend Micro Apex One, CrowdStrike Falcon, Symantec End-User Endpoint Security, Carbon Black CB Defense and Microsoft Defender for Endpoint. See our Check Point CloudGuard Network Security vs. Trend Micro Deep Security report.
See our list of best Cloud and Data Center Security vendors.
We monitor all Cloud and Data Center Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.