Introducing G2.ai, the future of software buying.Try now

Check Point CloudGuard Network Security Features

What are the features of Check Point CloudGuard Network Security?

Management

  • Dashboards and Reports

Operations

  • API / Integrations

Security

  • Compliance Monitoring

Administration

  • Policy Enforcement
  • Auditing
  • Data Discovery
  • Access Control

Data Protection

  • Data Masking
  • Data Encryption/Security
  • Data loss Prevention
  • Anomoly Detection
  • Sensitive Data Compliance

Analysis

  • Cloud Gap Analytics
  • Compliance Monitoring
  • User Analytics

Top Rated Check Point CloudGuard Network Security Alternatives

Cisco Duo
(410)
4.5 out of 5
Wiz
(702)
4.7 out of 5

Filter for Features

Management

Dashboards and Reports

Access pre-built and custom reports and dashboards. 34 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
92%
(Based on 34 reviews)

Workflow Management

As reported in 26 Check Point CloudGuard Network Security reviews. Creates new or streamlines existing workflows to better handle IT support tickets and service.
90%
(Based on 26 reviews)

Administration Console

As reported in 30 Check Point CloudGuard Network Security reviews. Provides Administration tools/console that are easy to use and learn for routine maintenance tasks
89%
(Based on 30 reviews)

Operations

Governance

As reported in 29 Check Point CloudGuard Network Security reviews. Allows users to create, edit, and relinquish user access privileges.
86%
(Based on 29 reviews)

Logging and Reporting

As reported in 32 Check Point CloudGuard Network Security reviews. Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
91%
(Based on 32 reviews)

API / Integrations

As reported in 33 Check Point CloudGuard Network Security reviews. Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
87%
(Based on 33 reviews)

Security Controls

Anomaly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. This feature was mentioned in 32 Check Point CloudGuard Network Security reviews.
90%
(Based on 32 reviews)

Data Loss Prevention

Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. 28 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
79%
(Based on 28 reviews)

Security Auditing

Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices. 28 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
88%
(Based on 28 reviews)

Cloud Gap Analytics

As reported in 27 Check Point CloudGuard Network Security reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
84%
(Based on 27 reviews)

Network Management

Network Segmentation

Allows administrative control over network components, mapping, and segmentation.

Not enough data

Network Mapping

Allows visual display of networks segmented components and their connected resources.

Not enough data

Security Analytics

Utilizes behavioral analysis to improve security procedures and documentation.

Not enough data

API/Integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Network Mapping

Based on 17 Check Point CloudGuard Network Security reviews. Provides visual displays network connections, services, and endpoints.
94%
(Based on 17 reviews)

Compliance

Based on 17 Check Point CloudGuard Network Security reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
88%
(Based on 17 reviews)

Reporting

Documents suspicious activity within a network and provide analysis of potential threats or vulnerabilities. This feature was mentioned in 14 Check Point CloudGuard Network Security reviews.
89%
(Based on 14 reviews)

Console

Based on 15 Check Point CloudGuard Network Security reviews. Provides a centralized console for administration tasks and unified control.
92%
(Based on 15 reviews)

Security

Security Automation

Allows administrative control over automated security tasks.

Not enough data

Application Security

Protects application access and data. Prompts additional authentication for suspicious users.

Not enough data

Workload Protection

Protects computing resources across a network. Prompts additional authentication for suspicious users.

Not enough data

Data Protection

Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users.

Not enough data

Compliance Monitoring

Based on 33 Check Point CloudGuard Network Security reviews. Monitors data quality and sends alerts based on violations or misuse.
86%
(Based on 33 reviews)

Anomoly Detection

As reported in 31 Check Point CloudGuard Network Security reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
87%
(Based on 31 reviews)

Data Loss Prevention

As reported in 28 Check Point CloudGuard Network Security reviews. Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
85%
(Based on 28 reviews)

Cloud Gap Analytics

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. This feature was mentioned in 30 Check Point CloudGuard Network Security reviews.
84%
(Based on 30 reviews)

Identity Management

Adaptive Access Control

Provides a risk-based approcach to determining trust within the network.

Not enough data

Identity Scoring

Calculates risk based on user behavior, permissions, and requests.

Not enough data

User Monitoring

Monitors users attempting unauthorized access to databases, applicaitons, and othe network components.

Not enough data

Network Maintenance

Policy Optimization

Identifies redundent processes and policies, automates changes to reduce unnecessary policy enforcement. This feature was mentioned in 17 Check Point CloudGuard Network Security reviews.
89%
(Based on 17 reviews)

Risk Analysis

Identifies potential network security risks, vulnerabilities, and compliance impacts. This feature was mentioned in 17 Check Point CloudGuard Network Security reviews.
90%
(Based on 17 reviews)

Auditing

As reported in 14 Check Point CloudGuard Network Security reviews. Allows for deep examination into network-connected devices, policies, and protocols.
90%
(Based on 14 reviews)

Network Monitoring

Network Monitoring

Based on 13 Check Point CloudGuard Network Security reviews. Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
96%
(Based on 13 reviews)

Configuration Monitoring

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. 13 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
90%
(Based on 13 reviews)

Change Management

Based on 13 Check Point CloudGuard Network Security reviews. Tools to track and implement required network policy changes.
76%
(Based on 13 reviews)

Compliance

Governance

Allows users to create, edit, and relinquish user access privileges. 30 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
87%
(Based on 30 reviews)

Data Governance

Based on 29 Check Point CloudGuard Network Security reviews. Ensures user access management, data lineage, and data encryption.
86%
(Based on 29 reviews)

Sensitive Data Compliance

Based on 29 Check Point CloudGuard Network Security reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
88%
(Based on 29 reviews)

Administration

Policy Enforcement

Allows administrators to set policies for security and data governance. 33 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
88%
(Based on 33 reviews)

Auditing

Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices. 31 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
88%
(Based on 31 reviews)

Workflow Management

As reported in 28 Check Point CloudGuard Network Security reviews. Creates new or streamlines existing workflows to better handle IT support tickets and service.
84%
(Based on 28 reviews)

Auditing

Documents access and alterations of the database for analytics and reporting. This feature was mentioned in 38 Check Point CloudGuard Network Security reviews.
81%
(Based on 38 reviews)

Data Discovery

Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems. This feature was mentioned in 38 Check Point CloudGuard Network Security reviews.
81%
(Based on 38 reviews)

Access Control

Supports LDAP Protocol to enable access control and governance. 40 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
86%
(Based on 40 reviews)

Policy Management

Provides network security features to customize network access rules, workflows, and compliance requirements.

Not enough data

Logging and Reporting

Captures logs for all firewall functions, storing information, incidents, and activity for user reference and analysis.

Not enough data

Application Gateway

Application-level proxy that applies security mechanisms to connect clients to applications while concealing client network and computers. 10 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
80%
(Based on 10 reviews)

Concurrent Sessions

Determines the number of connections a firewall is able to track and facilitate securely.

Not enough data

Policy Enforcement

Allows administrators to set policies for security and governance.

Not enough data

Dependency Mapping

Facilitates the discovery, allocation, and mapping of application dependencies across servers, networks, and cloud environments.

Not enough data

Network Mapping

Allows visual display of networks segmented components and their connected resources.

Not enough data

Data Protection

Data Masking

Based on 35 Check Point CloudGuard Network Security reviews. Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.
81%
(Based on 35 reviews)

Data Encryption/Security

Manages policies for user data access and data encryption. 36 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
87%
(Based on 36 reviews)

Data loss Prevention

Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. 36 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
82%
(Based on 36 reviews)

Anomoly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. This feature was mentioned in 35 Check Point CloudGuard Network Security reviews.
87%
(Based on 35 reviews)

Sensitive Data Compliance

Based on 36 Check Point CloudGuard Network Security reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
84%
(Based on 36 reviews)

Analysis

Cloud Gap Analytics

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. 37 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
82%
(Based on 37 reviews)

Compliance Monitoring

Monitors data quality and send alerts based on violations or misuse. This feature was mentioned in 37 Check Point CloudGuard Network Security reviews.
84%
(Based on 37 reviews)

User Analytics

Allows for reporting and documentation of individual user behavior and privileges. This feature was mentioned in 37 Check Point CloudGuard Network Security reviews.
84%
(Based on 37 reviews)

Monitoring

Load Balancing

Monitors traffic and distribute resources and scales infrastructure workloads to match traffic.

Not enough data

Continuous Analysis

Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Intrusion Prevention

Enforces security paramaters to prevent unauthorized access.

Not enough data

Intrusion Detection

Detects unauthorized access and use of privileged systems.

Not enough data

Functionality

Virtual Private Network (VPN)

Provides a virtualized network for client network to mask identity, location, and other sensitive information.

Not enough data

Antivirus

Provides malware protection capabilities in addition to traditional firewall barrier technology.

Not enough data

URL Filtering

Provides access control tools to categorize and block traffic and match traffic to firewall policies.

Not enough data

Availability

Deploys firewall(s) configured in sync to prevent network failure and provide business continuity. This feature was mentioned in 10 Check Point CloudGuard Network Security reviews.
93%
(Based on 10 reviews)

Enforcement

Identity-Based Policy Management

Accelerates policy change workflows using identity attributes to manage microsegmentation policies.

Not enough data

Workflow Automation

Completely automates end-to-end policy enforcement workflows across hybrid- and multi-cloud environments.

Not enough data

Network Segmentation

Allows administrative control over network components, mapping, and segmentation.

Not enough data

Intelligent Segmentation

Automates segmentation and provides AI-based improvement suggestions.

Not enough data

Workload Protection

Protects computing resources across a network. Prompts additional authentication for suspicious users.

Not enough data

Visibility

Breach Detection

Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks.

Not enough data

Observability

Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.

Not enough data

Application Discovery

Detect new assets and applications as they enter a cloud environments and networks to add to asset inventory.

Not enough data

Generative AI

AI Text Summarization

Condenses long documents or text into a brief summary.

Not enough data

AI Text Summarization

Condenses long documents or text into a brief summary.

Not enough data

AI Text Generation

Allows users to generate text based on a text prompt.

Not enough data

Artificial Intelligence - Firewall

AI Firewall

Utilizes AI to monitor network traffic, identify anomalies, and block attacks.

Not enough data

Agentic AI - Firewall Software

Autonomous Task Execution

Capability to perform complex tasks without constant human input

Not enough data

Adaptive Learning

Improves performance based on feedback and experience

Not enough data

Agentic AI - AWS Marketplace

Autonomous Task Execution

Capability to perform complex tasks without constant human input

Not enough data

Multi-step Planning

Ability to break down and plan multi-step processes

Not enough data

Cross-system Integration

Works across multiple software systems or databases

Not enough data