We performed a comparison between Check Point CloudGuard Network Security and Trellix Network Detection and Response based on real PeerSpot user reviews.
Find out what your peers are saying about Netgate, Fortinet, OPNsense and others in Firewalls."The initial installation is very straightforward."
"It has improved our security capabilities."
"It blocks the vulnerabilities that can negatively impact us."
"The solution is very, very easy to use."
"Good performance, stability, and virtual domain ability."
"The security fabric is excellent."
"Good load balancing feature."
"In terms of security, we have not experienced any security flaws or loopholes, and it has proven to be quite stable."
"It was very easy to install the solution, and the architecture meant we didn't have to worry about exceeding the solution's capacity."
"We primarily secure our network using CloudGuard Network Security's next-generation firewall features, including anti-spam, IPS, and URL filtering. Our chosen package for the go-to-market strategy is NGTP. For customers seeking more features, we provide options to upgrade to the tool's advanced packages."
"Auto-scaling and zero touch are valuable features."
"It improves the availability of engineers to carry out projects."
"Customers appreciate the CME plugin for automatically understanding assets within the cloud. This information appears in the manager, allowing users to tag the assets and adjust policies and rules accordingly."
"The scalability is very good; again, very user-friendly. I wouldn't even say "user-friendly" because, as long as you deploy it properly, you can kill an EC2 and it will spin up another one right away, within about a minute and a half. And it will be ready for production right away."
"The most valuable features are the ease of administration with the cloud management extension and the cloud licensing model."
"I like the tool's ability to manage cloud traffic locally without routing it through our data centers."
"Support is very helpful and responsive."
"If we are receiving spam emails, or other types of malicious email coming from a particular email ID, then we are able to block them using this solution."
"The product is very easy to configure."
"Over the thirteen years of using the product, we have not experienced a single compromise in our environment. During the COVID period, we faced numerous DDoS attacks, and the tool proved highly effective in mitigating these threats."
"Very functional and good for detecting malicious traffic."
"It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities."
"The installation phase was easy."
"Its ability to find zero-day threats, malware and anything malicious has greatly improved my customer's organization, especially for protecting the users' browser."
"The stability could be a bit better."
"I would like to see improvements in the product's application rules."
"We had a minor problem where there was a major system upgrade on the hardware platfrom and the Mac client was not available as soon as it might have been. The PC client was available immediately, but we had to wait a month or so, before there was a mac client. I was slightly irritated that it was not ready on time, but it was eventually resolved."
"The solution needs to improve its integration with cybersecurity."
"The logging details need to be improved."
"Technical support is good but the response time could be faster."
"The scalability could be better."
"The support structure needs to be improved because every time we contact them, there is a delay in the response."
"Micro-Segmentation functionality for EAST-WEST traffic is not native and requires integration with a third-party OEM."
"The cost needs improvement as it is currently quite expensive."
"I would like to see a step-by-step initial installation of the firewall. That would be really helpful. Like in Oracle appliances, when you start it asks you, what's your current IP address? An initial setup should be a step by step and intuitive process. You click on "begin," it asks you some simple questions. You fill in the blanks - your current IP address, what you want to do, you want to set up a site to site VPN, for example, that kind of thing. That would be the smartest thing to have."
"We miss full blade support for all blades that are compatible with the cluster. Especially notable is the lack of support for Identity Awareness in active standby environments for customers. In our setup, transitioning to Connective clusters would be preferable for maintaining connections during failover situations."
"The deployment phase takes too much time."
"Improvements needed include better integration with Azure features to match on-premises capabilities."
"The stability of the solution could be improved, but this is the problem of all the solutions in the market. This isn't just a problem specific to Check Point."
"There are some usability issues we'd like to see improved."
"The product's integration capabilities are an area of concern where improvements are required."
"The world is currently shifting to AI, but FIreEye is not following suit."
"They can maybe consider supporting some compliance standards. When we are configuring rules and policies, it can guide whether they are compliant with a particular compliance authority. In addition, if I have configured some rules that have not been used, it should give a report saying that these rules have not been used in the last three months or six months so that I disable or delete those rules."
"It is an expensive solution."
"I would love to see better reporting. Because you can't export some of the reports in proper formats, it is hard to extract the data from reports."
"Certain features in Trellix Network Detection and Response, such as using AL-type commands, may initially pose a challenge for those unfamiliar with such commands. However, once users become accustomed to the system, it becomes easier to use."
"FireEye Network Security should have better integration with other vendors' firewalls or proxies, such as Palo Alto and Fortinet. Files that are being submitted should happen through the API or automatically."
"Its documentation can be improved. The main problem that I see with FireEye is the documentation. We are an official distributor and partner of FireEye, and we have access to complete documentation about how to configure or implement this technology, but for customers, very limited documentation is available openly. This is the area in which FireEye should evolve. All documents should be easily available for everyone."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
More Trellix Network Detection and Response Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 8th in Firewalls with 119 reviews while Trellix Network Detection and Response is ranked 9th in Advanced Threat Protection (ATP) with 35 reviews. Check Point CloudGuard Network Security is rated 8.6, while Trellix Network Detection and Response is rated 8.6. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Trellix Network Detection and Response writes "Blocks traffic and DDoS attacks ". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Trellix Network Detection and Response is most compared with Fortinet FortiSandbox, Palo Alto Networks WildFire, Zscaler Internet Access, Vectra AI and Check Point SandBlast Network.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.