We performed a comparison between Check Point CloudGuard Posture Management and Trend Micro Cloud One based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point CloudGuard Posture Management offers robust data security, advanced incident detection, and the ability to customize rulesets. It also provides IAM role control, training capabilities, and detailed reporting. Trend Micro Cloud One focuses on vulnerability protection, login inspection, and event tracking. Users like Trend Micro's bug bounty program and lightweight scanning engine. Check Point CloudGuard Posture Management has room for improvement in reporting, false positive rate, integration, and customizability. Trend Micro Cloud One could benefit from enhancements in automation, logging, alerts, and flexibility.
Service and Support: Customers have had generally positive experiences with Check Point CloudGuard Posture Management's customer service, reporting quick response times and decent services. However, a few customers have mentioned that the technical support could be improved. Trend Micro Cloud One's customer service is highly praised for its excellent and knowledgeable support team, which is available 24/7.
Ease of Deployment: Check Point CloudGuard Posture Management has a straightforward and quick initial setup process, while Trend Micro Cloud One's setup can be more complex and may be difficult depending on the user's IT background.
Pricing: Some Check Point CloudGuard Posture Management users find it affordable, but others deem it costly and recommend considering cheaper alternatives. Trend Micro Cloud One is considered somewhat expensive, but users say the price is fair, given the value it offers.
ROI: Check Point CloudGuard Posture Management is praised for its impressive ROI. It effectively addresses compliance issues and significantly reduces administrative workload. Trend Micro Cloud One offers seamless integration.
Comparison Results: Check Point CloudGuard Posture Management is the preferred choice due to its comprehensive data security and protection. It offers a 360 view of customers' entire cloud infrastructure, with granular reporting, customizable rulesets, and embedded machine learning for real-time attack prevention. Trend Micro Cloud One is criticized for its complicated initial setup and has room to improve in areas such as pricing, cloud support, and documentation.
"The automation roles are essential because we ultimately want to do less work and automate more. The dashboards are easy to read and visually pleasing. You can understand things quickly, which makes it easy for our other teams. The network and infrastructure teams don't know as much about security as we do, so it helps to have a tool that's accessible and nice to look at."
"The first thing that stood out was the ease of installation and the quick value we got out of the solution."
"The solution is very user-friendly."
"With Wiz, we get timely alerts for leaked data or any vulnerabilities already existing in our environment."
"Our most important features are those around entitlement, external exposure, vulnerabilities, and container security."
"The security baseline and vulnerability assessments is the valuable feature."
"Out of all the features, the one item that has been most valuable is the fact that Wiz puts into context all the pieces that create an issue, and applies a particular risk evaluation that helps us prioritize when we need to address a misconfiguration, vulnerability, or any issue that would put our environment into risk."
"The vulnerability management modules and the discovery and inventory are the most valuable features. Before using Wiz, it was a very manual process for both. After implementing it, we're able to get all of the analytics into a single platform that gives us visibility across all the systems in our cloud. We're able to correspond and understand what the vulnerability landscape looks like a lot faster."
"We know the vulnerability in advance, so we can take some action for that vulnerability."
"This solution has saved the company from unnecessary data loss that occurs due to cyber attacks."
"It presents a real-time database that is always updated."
"The most valuable feature is the ability to apply common tools across all accounts."
"We like the GSL Builder feature. When you're running a security operations center, you spend a lot of time monitoring endpoint activity to ensure there is no malicious traffic or anonymous access in the environment. The GSL Builder is helpful for deep investigations of a particular reason for an incident. You can use it to get more information."
"This solution provides threat prevention and detection of anomalies automatically and investigates the activity of each one of them."
"The most valuable feature is the separate environment."
"We can monitor each activity from our mobile devices, so there is complete visibility of our cloud traffic flows, with threat intelligence provided by Check Point."
"The storage and computing features are valuable."
"I really like Trend Vision One - Cloud Security's dashboard."
"I like the conformity and workload security modules. Workload security is all about intrusion detection and prevention. Trend Vision One - Cloud Security has behavioral rules that are auto-populated based on organizational structure. That's one aspect that we liked most."
"The perfect package for all security platforms, providing more than any other endpoint solution."
"The most valuable features are intrusion prevention and anti-malware capabilities."
"The the most valuable feature is the scanning engine. It does not impact server performance. It's very lightweight."
"Trend Vision One - Cloud Security's best features are security analysis, remote access security, and driver security."
"Virtual patching is one of the key features, which is executed with their IPS."
"One significant issue is that the searches are case-sensitive, so finding a misconfigured resource can become very challenging."
"Wiz's reporting capabilities could be refined a bit. They are making headway on that, but more executive-style dashboards would be nice. They just implemented a community aspect where you can share documents and feedback. This was something users had been requesting for a while. They are listening to customer feedback and making changes."
"Given the level of visibility into all the cloud environments Wiz provides, it would be nice if they could integrate some kind of mechanism to better manage tenants on multiple platforms. For example, let's say that some servers don't have an application they need, such as an antivirus. Wiz could include an API or something to push those applications out to the servers. It would be great if you could remedy these issues directly from the Wiz platform."
"We're looking at some of the data compliance stuff that they've got Jon offer. I know they're looking at container security, which we gonna be looking at next."
"The only thing that needs to be improved is the number of scans per day."
"The remediation workflow within the Wiz could be improved."
"We wish there were a way, beyond providing visibility and automated remediation, to wait on a given remediation, due to a critical aspect, such as the cost associated with a particular upgrade... We would like to see preventive controls that can be applied through Wiz to protect against vulnerabilities that we're not going to be able to remediate immediately."
"We would like to see improvements to executive-level reporting and data reporting in general, which we understand is being rolled out to the platform."
"Streamlining the user interface would greatly improve the user experience."
"Reporting should have more options."
"The guidelines to implement or to link with the clouds are not complete."
"The user interface could be improved. Sometimes, the visibility is not immediately available for the environment. We have the native servers that come with the solutions, but we cannot see them in the Check Point log. Another issue is with the integrated file monitoring. It would make sense to have stuff like file integrity monitoring and malware scanning available within this module because we don't want to integrate another product."
"Especially with cloud security, there's too much clutter on the screen and too many things going on."
"I'd like to see more advanced encryption for local features, which is not present right now."
"Down the road, we would like to see automation. That is probably a feature that most people want. If they can automate patching a vulnerability, it will be much easier."
"I would like to see improvements in the vulnerability assessments in terms of how the solution discovers vulnerabilities or compromised workloads. Also, customizable reports would be nice."
"The initial setup is easy for someone who operates container platforms on a daily basis. However, it could be difficult for those coming purely from informational security or another field of an IT."
"There are also some loopholes because it's a new product that they have recently migrated to the cloud. We do see some issues with the policies we have assigned when it comes to a particular account. There are some issues with system support, such as a particular server kernel version that is not supported."
"The product could use a little bit of automation."
"Trend Vision One - Cloud Security should address threats automatically without having user input."
"The firewall configuration should have been automated based on the understanding of the application, utilities, and protocols."
"Trend Vision One - Cloud Security seems to have a preference for AWS Cloud over Azure and would be improved by focusing equally on both."
"Securing S3 using Trend Vision One - Cloud Security can cost too much. Trend Vision One - Cloud Security has a tool that requires lots of privileges. From my understanding, it's only for static application testing, so they need to add dynamic application testing, and there should be more collaboration with the application testing tools on the market. We have not used this product, and I don't know if they plan to decommission it or something. They should focus on application security because this tool's unique feature is multi-cloud support. However, they should improve integration with tools for these kinds of use cases, especially application security and dynamic scanning. For example, I would like it to support Dell SecureOps. I'd also like to see some enhancements to API gateway security."
"The initial setup can be complex for the inexperienced."
More Trend Vision One - Cloud Security Pricing and Cost Advice →
Check Point CloudGuard CNAPP is ranked 5th in Cloud Workload Protection Platforms (CWPP) with 58 reviews while Trend Vision One - Cloud Security is ranked 6th in Cloud Workload Protection Platforms (CWPP) with 17 reviews. Check Point CloudGuard CNAPP is rated 8.4, while Trend Vision One - Cloud Security is rated 8.6. The top reviewer of Check Point CloudGuard CNAPP writes "Threat intel integration provides us visibility in case any workload is communicating with suspicious or blacklisted IPs". On the other hand, the top reviewer of Trend Vision One - Cloud Security writes "We can quickly deploy cloud conformity, provides good visibility, and control". Check Point CloudGuard CNAPP is most compared with Prisma Cloud by Palo Alto Networks, AWS GuardDuty, Microsoft Defender for Cloud, Qualys VMDR and Tenable Cloud Security, whereas Trend Vision One - Cloud Security is most compared with Microsoft Defender for Cloud, AWS GuardDuty, Check Point Harmony Email & Collaboration, Prisma Cloud by Palo Alto Networks and Tenable Security Center. See our Check Point CloudGuard CNAPP vs. Trend Vision One - Cloud Security report.
See our list of best Cloud Workload Protection Platforms (CWPP) vendors, best Cloud Security Posture Management (CSPM) vendors, and best Cloud-Native Application Protection Platforms (CNAPP) vendors.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.