Most Helpful Review
Daily phishing attacks are no longer negatively impacting us, and we no longer have data exfiltration
Researched Check Point CloudGuard SaaS but chose Cisco Tetration: A secure and stable solution for our on-premises network analytics
Find out what your peers are saying about Check Point CloudGuard SaaS vs. Cisco Tetration and other solutions. Updated: September 2020.
442,283 professionals have used our research since 2012.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The automated rule cleanups and automated policy installs have improved my customers' organizations."
"The API is its most valuable feature. On the API side, relative to the rest of the market, Check Point is decades ahead of its competitors."
"The main benefit is that hackers can't steal information."
"Check Point adds value with east-west protection in the data center."
"It seems quite scalable. We don't anticipate any scaling issues. We have it deployed in the cloud."
"The most valuable features would be its ability to intercept phishing emails and emails laden with malware, viruses, false links, etc."
"The program has a nice interface and it is easy to use."
"The feature I find to be most valuable is very much the zero-touch provisioning. I was able to be up, operational, and 100 percent functional in less than a half an hour."
"By using Tetration insight, we are able to get the latency on our level accounts and we can determine whatever the issue is with the application latency itself."
"Scalability is its most valuable feature."
"Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations. It saves an enormous, enormous amount of time."
"A complete and powerful micro-segmentation solution."
"The most valuable feature of the solution is that we don't have to do packet captures on the network."
"The product offers great visibility into the network so we can enforce security measures."
"The most valuable feature of this solution is security."
"The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network."
"I have learned enough to make the product stable. However, the stability has some challenges."
"I would love it if they would do some work on the Postgres definition on the back-end."
"We have used technical support, but their response time is very slow. It needs to be improved."
"There is always room for improvement and growth."
"Stability has been a pain point. I was going back and forth with my product engineer and project manager for a couple of months. I had the product in a demonstration mode and wasn't satisfied with the results initially. After a few alterations and a few revisions later, it is fine."
"At this time, the two-factor authentication does not work for Active Directory."
"if a phishing email were to get through and bypass the product — which very few do — it would be nice if, when a user clicked on that phishing email, they got a second-chance opportunity, a chance to double-check that they really wanted to proceed to that website."
"We still get some false positives. There are times when legitimate stuff gets flagged and it could be that somebody is expecting a very important email but they don't end up getting it. On the flip side, when we alert Check Point about stuff like this, it is corrected, so they are improving. That's a plus."
"It is highly scalable, but there is a limitation that it is only available on Cisco devices."
"It is not so easy to use and configure. It needs a bunch of further resources to work, which is mainly the biggest downside of it. The deployment is huge."
"They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes."
"It has an uninviting interface."
"I'd like to see better documentation for advanced features. The documentation is fairly basic. I would also like to see better integration with other applications."
"The emailed notifications are either hard to find or they are not available. Search capabilities can be improved."
"The interface is really helpful for technical people, but it is not user-friendly."
"The multi-tenancy, redundancy, backup and restore functionalities, as well as the monitoring aspects of the solution, need improvement. The solution offers virtually no enterprise-grade possibility for monitoring."
Pricing and Cost Advice
"Having information stolen by a hacker would be more expensive than purchasing a license."
"Being able to keep the phishing campaigns out of my company has been ROI for me."
"Do a full feature evaluation (interactive) with a support person. That is what I did."
"The price is very good, based on what they deliver."
"One of the nice features is that the licensing model is elastic, so if you go over your license count, you can add users during your billing cycle and true-up later."
"There are absolutely no additional costs to the standard licensing fees. One of the wonderful pieces is that CloudGuard SaaS is all-inclusive in its licensing. There's no a-la-carte functionality. You're getting 100 percent of the product for the licensing that you're paying."
"The difference between [Check Point and its competitors] boiled down to money. Price-wise, Check Point was very good, it was very competitive."
"The pricing is a bit higher than we anticipated."
"The price is outrageous. If you have money to throw at the product, then do it."
"Pricing depends on the scope of the application and the features. Larger installations save more."
"It is not cheap and pricing may limit scalability."
"The price is based on how many computers you're going to install it on."
Questions from the Community
Top Answer: The feature I find to be most valuable is very much the zero-touch provisioning. I was able to be up, operational, and 100 percent functional in less than a half an hour.
Top Answer: It's hard to advise people on pricing and licensing. It's priced per user, although I do not remember what the list-price per user is and I don't even remember what we pay per user. But Check Point… more »
Top Answer: One of the areas that I would like to see them develop into the product would be in the user feedback arena. Today, if a phishing email were to get through and bypass the product — which very few do —… more »
Top Answer: The most valuable feature is micro-segmentation, which is the most important with respect to visibility.
Top Answer: The price is based on how many installation of software sensors you're going to install it on.
out of 23 in Cloud Workload Security
Average Words per Review
out of 23 in Cloud Workload Security
Average Words per Review
Compared 50% of the time.
Compared 39% of the time.
Compared 4% of the time.
Compared 2% of the time.
Compared 30% of the time.
Compared 24% of the time.
Compared 19% of the time.
Compared 9% of the time.
Compared 1% of the time.
Also Known As
|Check Point CloudGuard|
From private cloud datacenters to public clouds and SaaS applications, CloudGuard provides comprehensive cloud security solutions to keep enterprise data, assets and apps free from even the most sophisticated attacks.
Cisco Tetration offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement and reduce your attack surface. Its infrastructure-agnostic approach supports both on-premises and public cloud workloads.
Learn more about Check Point CloudGuard SaaS
Learn more about Cisco Tetration
|Helvetia, Denham Capital, Daymark Solutions, Neopharm Group||ADP, University of North Carolina Charlotte (UNCC)|
Financial Services Firm18%
Computer Software Company40%
Comms Service Provider19%
Comms Service Provider37%
Computer Software Company27%
See our list of best Cloud Workload Security vendors.