Compare Check Point CloudGuard vs. Cisco Tetration

Check Point CloudGuard is ranked 4th in Cloud Workload Security with 8 reviews while Cisco Tetration is ranked 3rd in Cloud Workload Security with 8 reviews. Check Point CloudGuard is rated 7.8, while Cisco Tetration is rated 8.6. The top reviewer of Check Point CloudGuard writes "Intercepts phishing emails and emails laden with malware, viruses, and false links". On the other hand, the top reviewer of Cisco Tetration writes "Saves time, resists attacks, and allocates resources properly". Check Point CloudGuard is most compared with Dome9, Palo Alto Networks Prisma Public Cloud and Evident, whereas Cisco Tetration is most compared with VMware NSX, Illumio Adaptive Security Platform and GuardiCore. See our Check Point CloudGuard vs. Cisco Tetration report.
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Check Point CloudGuard vs. Cisco Tetration and other solutions. Updated: September 2019.
372,124 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

It seems quite scalable. We don't anticipate any scaling issues. We have it deployed in the cloud.The most valuable features would be its ability to intercept phishing emails and emails laden with malware, viruses, false links, etc.Check Point adds value with east-west protection in the data center.It is scalable. It's a cloud solution, so it's easy to implement and manage.I like how straightforward it is and simple it is to implement in the cloud.The stability is very good. It is easy to use, which makes it easy for the end user.The main benefit is that hackers can't steal information.Moving into the cloud without having to change a lot of our internal processes and retrain staff is one of the biggest benefits of this solution.

Read more »

The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network.The most valuable feature of this solution is security.The product offers great visibility into the network so we can enforce security measures.The most valuable feature of the solution is that we don't have to do packet captures on the network.A complete and powerful micro-segmentation solution.Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations. It saves an enormous, enormous amount of time.Scalability is its most valuable feature.By using Tetration insight, we are able to get the latency on our level accounts and we can determine whatever the issue is with the application latency itself.

Read more »

Stability has been a pain point. I was going back and forth with my product engineer and project manager for a couple of months. I had the product in a demonstration mode and wasn't satisfied with the results initially. After a few alterations and a few revisions later, it is fine.There is always room for improvement and growth.The product can still grow.I would like for them to develop the ability to add additional users within a pod, where it is round robin.We have used technical support, but their response time is very slow. It needs to be improved.I would like to see more focus on east-west traffic inspection and AWS.I have learned enough to make the product stable. However, the stability has some challenges.I would love it if they would do some work on the Postgres definition on the back-end.

Read more »

The multi-tenancy, redundancy, backup and restore functionalities, as well as the monitoring aspects of the solution, need improvement. The solution offers virtually no enterprise-grade possibility for monitoring.The interface is really helpful for technical people, but it is not user-friendly.The emailed notifications are either hard to find or they are not available. Search capabilities can be improved.I'd like to see better documentation for advanced features. The documentation is fairly basic. I would also like to see better integration with other applications.It has an uninviting interface.They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes.It is not so easy to use and configure. It needs a bunch of further resources to work, which is mainly the biggest downside of it. The deployment is huge.It is highly scalable, but there is a limitation that it is only available on Cisco devices.

Read more »

Pricing and Cost Advice
Being able to keep the phishing campaigns out of my company has been ROI for me.Do a full feature evaluation (interactive) with a support person. That is what I did.Having information stolen by a hacker would be more expensive than purchasing a license.

Read more »

It is not cheap and pricing may limit scalability.Pricing depends on the scope of the application and the features. Larger installations save more.The price is outrageous. If you have money to throw at the product, then do it.The pricing is a bit higher than we anticipated.

Read more »

Use our free recommendation engine to learn which Cloud Workload Security solutions are best for your needs.
372,124 professionals have used our research since 2012.
Average Words per Review
Avg. Rating
Average Words per Review
Avg. Rating
Top Comparisons
Compared 71% of the time.
Compared 8% of the time.
Compared 34% of the time.
Compared 24% of the time.
Check Point

Check Point CloudGuard, powered by the Infinity Architecture, is a comprehensive suite of products that deliver proactive protections for cloud data, workloads, networks and applications.

The comprehensive portfolio seamlessly integrates with the largest number of cloud infrastructures and applications to instantly and easily keep all your cloud services protected against even the most sophisticated Gen V (5th generation) cyberattacks. CloudGuard supports a single-click and agile deployment model aligned with the dynamic nature of cloud services, making expanding your cloud services a breeze.

Cisco Tetration offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement and reduce your attack surface. Its infrastructure-agnostic approach supports both on-premises and public cloud workloads.

Learn more about Check Point CloudGuard
Learn more about Cisco Tetration
Sample Customers
Helvetia, Denham Capital, Daymark Solutions, Neopharm GroupADP, University of North Carolina Charlotte (UNCC)
Top Industries
No Data Available
Software R&D Company28%
Comms Service Provider19%
Financial Services Firm6%
Find out what your peers are saying about Check Point CloudGuard vs. Cisco Tetration and other solutions. Updated: September 2019.
372,124 professionals have used our research since 2012.
We monitor all Cloud Workload Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email