Check Point CloudGuard Network Security Features
What are the features of Check Point CloudGuard Network Security?
Management
- Dashboards and Reports
Operations
- API / Integrations
Security
- Compliance Monitoring
Administration
- Policy Enforcement
- Auditing
- Data Discovery
- Access Control
Data Protection
- Data Masking
- Data Encryption/Security
- Data loss Prevention
- Anomoly Detection
- Sensitive Data Compliance
Analysis
- Cloud Gap Analytics
- Compliance Monitoring
- User Analytics
Check Point CloudGuard Network Security Categories on G2
Filter for Features
Management
Dashboards and Reports | Access pre-built and custom reports and dashboards. 34 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature. | 92% (Based on 34 reviews) | |
Workflow Management | As reported in 26 Check Point CloudGuard Network Security reviews. Creates new or streamlines existing workflows to better handle IT support tickets and service. | 90% (Based on 26 reviews) | |
Administration Console | As reported in 30 Check Point CloudGuard Network Security reviews. Provides Administration tools/console that are easy to use and learn for routine maintenance tasks | 89% (Based on 30 reviews) |
Operations
Governance | As reported in 29 Check Point CloudGuard Network Security reviews. Allows users to create, edit, and relinquish user access privileges. | 86% (Based on 29 reviews) | |
Logging and Reporting | As reported in 32 Check Point CloudGuard Network Security reviews. Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing. | 91% (Based on 32 reviews) | |
API / Integrations | As reported in 33 Check Point CloudGuard Network Security reviews. Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | 87% (Based on 33 reviews) |
Security Controls
Anomaly Detection | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. This feature was mentioned in 32 Check Point CloudGuard Network Security reviews. | 90% (Based on 32 reviews) | |
Data Loss Prevention | Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. 28 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature. | 79% (Based on 28 reviews) | |
Security Auditing | Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices. 28 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature. | 88% (Based on 28 reviews) | |
Cloud Gap Analytics | As reported in 27 Check Point CloudGuard Network Security reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | 84% (Based on 27 reviews) |
Network Management
Network Segmentation | Allows administrative control over network components, mapping, and segmentation. | Not enough data | |
Network Mapping | Allows visual display of networks segmented components and their connected resources. | Not enough data | |
Security Analytics | Utilizes behavioral analysis to improve security procedures and documentation. | Not enough data | |
API/Integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data | |
Network Mapping | Based on 17 Check Point CloudGuard Network Security reviews. Provides visual displays network connections, services, and endpoints. | 94% (Based on 17 reviews) | |
Compliance | Based on 17 Check Point CloudGuard Network Security reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | 88% (Based on 17 reviews) | |
Reporting | Documents suspicious activity within a network and provide analysis of potential threats or vulnerabilities. This feature was mentioned in 14 Check Point CloudGuard Network Security reviews. | 89% (Based on 14 reviews) | |
Console | Based on 15 Check Point CloudGuard Network Security reviews. Provides a centralized console for administration tasks and unified control. | 92% (Based on 15 reviews) |
Security
Security Automation | Allows administrative control over automated security tasks. | Not enough data | |
Application Security | Protects application access and data. Prompts additional authentication for suspicious users. | Not enough data | |
Workload Protection | Protects computing resources across a network. Prompts additional authentication for suspicious users. | Not enough data | |
Data Protection | Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users. | Not enough data | |
Compliance Monitoring | Based on 33 Check Point CloudGuard Network Security reviews. Monitors data quality and sends alerts based on violations or misuse. | 86% (Based on 33 reviews) | |
Anomoly Detection | As reported in 31 Check Point CloudGuard Network Security reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. | 87% (Based on 31 reviews) | |
Data Loss Prevention | As reported in 28 Check Point CloudGuard Network Security reviews. Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. | 85% (Based on 28 reviews) | |
Cloud Gap Analytics | Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. This feature was mentioned in 30 Check Point CloudGuard Network Security reviews. | 84% (Based on 30 reviews) |
Identity Management
Adaptive Access Control | Provides a risk-based approcach to determining trust within the network. | Not enough data | |
Identity Scoring | Calculates risk based on user behavior, permissions, and requests. | Not enough data | |
User Monitoring | Monitors users attempting unauthorized access to databases, applicaitons, and othe network components. | Not enough data |
Network Maintenance
Policy Optimization | Identifies redundent processes and policies, automates changes to reduce unnecessary policy enforcement. This feature was mentioned in 17 Check Point CloudGuard Network Security reviews. | 89% (Based on 17 reviews) | |
Risk Analysis | Identifies potential network security risks, vulnerabilities, and compliance impacts. This feature was mentioned in 17 Check Point CloudGuard Network Security reviews. | 90% (Based on 17 reviews) | |
Auditing | As reported in 14 Check Point CloudGuard Network Security reviews. Allows for deep examination into network-connected devices, policies, and protocols. | 90% (Based on 14 reviews) |
Network Monitoring
Network Monitoring | Based on 13 Check Point CloudGuard Network Security reviews. Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point. | 96% (Based on 13 reviews) | |
Configuration Monitoring | Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. 13 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature. | 90% (Based on 13 reviews) | |
Change Management | Based on 13 Check Point CloudGuard Network Security reviews. Tools to track and implement required network policy changes. | 76% (Based on 13 reviews) |
Compliance
Governance | Allows users to create, edit, and relinquish user access privileges. 30 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature. | 87% (Based on 30 reviews) | |
Data Governance | Based on 29 Check Point CloudGuard Network Security reviews. Ensures user access management, data lineage, and data encryption. | 86% (Based on 29 reviews) | |
Sensitive Data Compliance | Based on 29 Check Point CloudGuard Network Security reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | 88% (Based on 29 reviews) |
Administration
Policy Enforcement | Allows administrators to set policies for security and data governance. 33 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature. | 88% (Based on 33 reviews) | |
Auditing | Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices. 31 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature. | 88% (Based on 31 reviews) | |
Workflow Management | As reported in 28 Check Point CloudGuard Network Security reviews. Creates new or streamlines existing workflows to better handle IT support tickets and service. | 84% (Based on 28 reviews) | |
Auditing | Documents access and alterations of the database for analytics and reporting. This feature was mentioned in 38 Check Point CloudGuard Network Security reviews. | 81% (Based on 38 reviews) | |
Data Discovery | Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems. This feature was mentioned in 38 Check Point CloudGuard Network Security reviews. | 81% (Based on 38 reviews) | |
Access Control | Supports LDAP Protocol to enable access control and governance. 40 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature. | 86% (Based on 40 reviews) | |
Policy Management | Provides network security features to customize network access rules, workflows, and compliance requirements. | Not enough data | |
Logging and Reporting | Captures logs for all firewall functions, storing information, incidents, and activity for user reference and analysis. | Not enough data | |
Application Gateway | Application-level proxy that applies security mechanisms to connect clients to applications while concealing client network and computers. 10 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature. | 80% (Based on 10 reviews) | |
Concurrent Sessions | Determines the number of connections a firewall is able to track and facilitate securely. | Not enough data | |
Policy Enforcement | Allows administrators to set policies for security and governance. | Not enough data | |
Dependency Mapping | Facilitates the discovery, allocation, and mapping of application dependencies across servers, networks, and cloud environments. | Not enough data | |
Network Mapping | Allows visual display of networks segmented components and their connected resources. | Not enough data |
Data Protection
Data Masking | Based on 35 Check Point CloudGuard Network Security reviews. Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties. | 81% (Based on 35 reviews) | |
Data Encryption/Security | Manages policies for user data access and data encryption. 36 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature. | 87% (Based on 36 reviews) | |
Data loss Prevention | Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. 36 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature. | 82% (Based on 36 reviews) | |
Anomoly Detection | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. This feature was mentioned in 35 Check Point CloudGuard Network Security reviews. | 87% (Based on 35 reviews) | |
Sensitive Data Compliance | Based on 36 Check Point CloudGuard Network Security reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | 84% (Based on 36 reviews) |
Analysis
Cloud Gap Analytics | Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. 37 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature. | 82% (Based on 37 reviews) | |
Compliance Monitoring | Monitors data quality and send alerts based on violations or misuse. This feature was mentioned in 37 Check Point CloudGuard Network Security reviews. | 84% (Based on 37 reviews) | |
User Analytics | Allows for reporting and documentation of individual user behavior and privileges. This feature was mentioned in 37 Check Point CloudGuard Network Security reviews. | 84% (Based on 37 reviews) |
Monitoring
Load Balancing | Monitors traffic and distribute resources and scales infrastructure workloads to match traffic. | Not enough data | |
Continuous Analysis | Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | Not enough data | |
Intrusion Prevention | Enforces security paramaters to prevent unauthorized access. | Not enough data | |
Intrusion Detection | Detects unauthorized access and use of privileged systems. | Not enough data |
Functionality
Virtual Private Network (VPN) | Provides a virtualized network for client network to mask identity, location, and other sensitive information. | Not enough data | |
Antivirus | Provides malware protection capabilities in addition to traditional firewall barrier technology. | Not enough data | |
URL Filtering | Provides access control tools to categorize and block traffic and match traffic to firewall policies. | Not enough data | |
Availability | Deploys firewall(s) configured in sync to prevent network failure and provide business continuity. This feature was mentioned in 10 Check Point CloudGuard Network Security reviews. | 93% (Based on 10 reviews) |
Enforcement
Identity-Based Policy Management | Accelerates policy change workflows using identity attributes to manage microsegmentation policies. | Not enough data | |
Workflow Automation | Completely automates end-to-end policy enforcement workflows across hybrid- and multi-cloud environments. | Not enough data | |
Network Segmentation | Allows administrative control over network components, mapping, and segmentation. | Not enough data | |
Intelligent Segmentation | Automates segmentation and provides AI-based improvement suggestions. | Not enough data | |
Workload Protection | Protects computing resources across a network. Prompts additional authentication for suspicious users. | Not enough data |
Visibility
Breach Detection | Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks. | Not enough data | |
Observability | Generate insights across IT systems utilizing event metrics, logging, traces, and metadata. | Not enough data | |
Application Discovery | Detect new assets and applications as they enter a cloud environments and networks to add to asset inventory. | Not enough data |
Generative AI
AI Text Summarization | Condenses long documents or text into a brief summary. | Not enough data | |
AI Text Summarization | Condenses long documents or text into a brief summary. | Not enough data | |
AI Text Generation | Allows users to generate text based on a text prompt. | Not enough data |
Artificial Intelligence - Firewall
AI Firewall | Utilizes AI to monitor network traffic, identify anomalies, and block attacks. | Not enough data |
Agentic AI - Firewall Software
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Adaptive Learning | Improves performance based on feedback and experience | Not enough data |
Agentic AI - AWS Marketplace
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Multi-step Planning | Ability to break down and plan multi-step processes | Not enough data | |
Cross-system Integration | Works across multiple software systems or databases | Not enough data |