Check Point CloudGuard vs. Cisco Tetration

As of June 2019, Check Point CloudGuard is ranked 4th in Cloud Workload Security with 8 reviews vs Cisco Tetration which is ranked 7th in Cloud Workload Security with 4 reviews. The top reviewer of Check Point CloudGuard writes "Intercepts phishing emails and emails laden with malware, viruses, and false links". The top reviewer of Cisco Tetration writes "Saves time, resists attacks, and allocates resources properly". Check Point CloudGuard is most compared with Dome9, Evident and Palo Alto Networks Prisma Public Cloud. Cisco Tetration is most compared with VMware NSX, Illumio Adaptive Security Platform and GuardiCore. See our Check Point CloudGuard vs. Cisco Tetration report.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Check Point CloudGuard vs. Cisco Tetration and other solutions. Updated: May 2019.
345,805 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
Check Point adds value with east-west protection in the data center.It is scalable. It's a cloud solution, so it's easy to implement and manage.I like how straightforward it is and simple it is to implement in the cloud.The stability is very good. It is easy to use, which makes it easy for the end user.The main benefit is that hackers can't steal information.It seems quite scalable. We don't anticipate any scaling issues. We have it deployed in the cloud.The most valuable features would be its ability to intercept phishing emails and emails laden with malware, viruses, false links, etc.Moving into the cloud without having to change a lot of our internal processes and retrain staff is one of the biggest benefits of this solution.

Read more »

A complete and powerful micro-segmentation solution.Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations. It saves an enormous, enormous amount of time.Scalability is its most valuable feature.By using Tetration insight, we are able to get the latency on our level accounts and we can determine whatever the issue is with the application latency itself.

Read more »

Cons
There is always room for improvement and growth.The product can still grow.I would like for them to develop the ability to add additional users within a pod, where it is round robin.We have used technical support, but their response time is very slow. It needs to be improved.Stability has been a pain point. I was going back and forth with my product engineer and project manager for a couple of months. I had the product in a demonstration mode and wasn't satisfied with the results initially. After a few alterations and a few revisions later, it is fine.I would like to see more focus on east-west traffic inspection and AWS.I have learned enough to make the product stable. However, the stability has some challenges.I would love it if they would do some work on the Postgres definition on the back-end.

Read more »

It has an uninviting interface.They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes.It is not so easy to use and configure. It needs a bunch of further resources to work, which is mainly the biggest downside of it. The deployment is huge.It is highly scalable, but there is a limitation that it is only available on Cisco devices.

Read more »

Pricing and Cost Advice
Having information stolen by a hacker would be more expensive than purchasing a license.Being able to keep the phishing campaigns out of my company has been ROI for me.Do a full feature evaluation (interactive) with a support person. That is what I did.

Read more »

Pricing depends on the scope of the application and the features. Larger installations save more.The price is outrageous. If you have money to throw at the product, then do it.The pricing is a bit higher than we anticipated.

Read more »

report
Use our free recommendation engine to learn which Cloud Workload Security solutions are best for your needs.
345,805 professionals have used our research since 2012.
Ranking
4th
Views
834
Comparisons
512
Reviews
7
Average Words per Review
366
Avg. Rating
7.9
7th
Views
2,766
Comparisons
2,066
Reviews
2
Average Words per Review
491
Avg. Rating
8.0
Top Comparisons
Compared 78% of the time.
Compared 13% of the time.
Compared 35% of the time.
Compared 22% of the time.
Learn
Check Point
Cisco
Overview

Check Point CloudGuard, powered by the Infinity Architecture, is a comprehensive suite of products that deliver proactive protections for cloud data, workloads, networks and applications.

The comprehensive portfolio seamlessly integrates with the largest number of cloud infrastructures and applications to instantly and easily keep all your cloud services protected against even the most sophisticated Gen V (5th generation) cyberattacks. CloudGuard supports a single-click and agile deployment model aligned with the dynamic nature of cloud services, making expanding your cloud services a breeze.

Cisco Tetration offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement and reduce your attack surface. Its infrastructure-agnostic approach supports both on-premises and public cloud workloads.

Offer
Learn more about Check Point CloudGuard
Learn more about Cisco Tetration
Sample Customers
Helvetia, Denham Capital, Daymark Solutions, Neopharm GroupADP, University of North Carolina Charlotte (UNCC)
Find out what your peers are saying about Check Point CloudGuard vs. Cisco Tetration and other solutions. Updated: May 2019.
345,805 professionals have used our research since 2012.
We monitor all Cloud Workload Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email