125 Check Point CloudGuard Network Security Reviews

We can able to track the changes of network security group rules and we can able to visualise the vpc route traffics detailly and can manage the configured IP address and it's CIDR. Review collected by and hosted on G2.com.
The change tracking of network security group rules is available only in AWS. Review collected by and hosted on G2.com.

Ofcourse all great features related to the Network Security and the the best of I could point out here or of you ask me best thing about it then I must say the support from the product team. And about features it Cloud deployment and network security mapping. Review collected by and hosted on G2.com.
Nothing Least or dislikes as such but as usual there is always room for improvement what I feel. Review collected by and hosted on G2.com.
I like this software because easy to use and can easy to control policy on the firewalls
And this product can protect our server on the public cloud. I think that cloud guard functions just like any other firewall. It works very well. Review collected by and hosted on G2.com.
I dislike a lot of bug software.I think that the cloud guard console is hard to monitor , such as IPS protection and antivirus protection.
I mean, the log looks hard to understand. I want it to be easy to investigate the case. Review collected by and hosted on G2.com.
I am able to migrate our client cloud infrastructure in very smooth and secure manner.
Helping and able to automate our clients cloud infrastructure network securities.
Amazing thing is that I can secure and integrate it with any cloud service platforms like gcp,aws and azur. Review collected by and hosted on G2.com.
Can be challenging for the new bies to integrate. Review collected by and hosted on G2.com.
first and most impoertant advantage of cloud gaurd network security is that it is a cross platform tool and can greatly help us to keep a track of the security standards by filtering the malicious traffic
it comes with a very clean and neat user Interface.
the threat engine works so good.
it comes with sufficient built in filters to search for specific kind of traffic
traffic explorer helps in easier understanding of the network .
custom notification can be set
easy to integrate
easy to implement Review collected by and hosted on G2.com.
one can only get cloud trail and VPC logs.
using terraform to manage security policies can be tricky at times and might need to be reviewed to ensure objecte are created as per the expectation, these are not logged to ensure terraform state and the checkpoint databases are in sync with eachother. Review collected by and hosted on G2.com.
the first important advantage is that you can link multiple cloud accounts from multiple providers and works absolutely fine detecting the maliciuos traffic from open internet to VPCs and vice versa, it can also inspect the traffic between the VPCs from on prem to the cloud services basically it monitors all the traffic to ensure high security
it is easy to use and implement
UI is very clean and understandable
supports custom rulesets
traffic explorer comes handy to provide easy understanding on the network traffic
customer support is satisfactory Review collected by and hosted on G2.com.
only VPC and Cloud trails can be processed
despitee the traffic graph being a great feature it lacks the clear end to end details Review collected by and hosted on G2.com.

It has the capabilities to check and observe if any unusual behaviour happened on our network. It has the feature we can have the custom use case's to observe the traffics. Review collected by and hosted on G2.com.
It only supported on cloudtrail and vpc logs. Review collected by and hosted on G2.com.
It will monitor all our network and user level traffies and event. it provide a various feature such as content filtering and web application etc.one of the most excellent feature is it will provide a the real time monitoring.another one is easy to implementation in any environment without any issues. Review collected by and hosted on G2.com.
the main one is cost of the license and its maintance could be drawback for smaller environment and the limitation of the network security is supported only in VPC. Review collected by and hosted on G2.com.
Using CloudGuard network security allows for a familiar implementation with all the features of an onprem appliance. The deployment can be completely codified using Terrafrom, allowing for reapeatable deployments for each region. Using the AWS GWLB and endpoint service, inspecition can be extended to any / all member accounts for ingress / egress inspection. The GWLB deployment also allows for right sizing of EC2s that can increase/decrease with autoscaling. The policy can also be codified using Terraform, allowing for teams to inner-source access requests, but ensuring the proper security teams can still approve the access before it is rolled out. Review collected by and hosted on G2.com.
When using Terraform to manage the security policy, the object creation layout needs to be well thought through to ensure objects are created as disired. Also, publishing changes needs to be accounted for on Terraform apply success and failures so Terraform state and the Check Point database stay in sync. Review collected by and hosted on G2.com.
It having the anomaly Threat Intelligence Engine to detect our network inbound and outbound traffics effectively.
The engine having some predefined rulesets to address the runtime protection of our cloud environments.
It has supported the cluster pod to pod network communication as well. Review collected by and hosted on G2.com.
The module will be supported on Network VPC and user activity logs.
The engine will not supported to run the specific rulesets to assess. Review collected by and hosted on G2.com.