No more typing reviews! Try our Samantha, our new voice AI agent.

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

Check Point CloudGuard Code Security improves overall code security through rapid and comprehensive assessments for enhancement decisions.
It automates the identification and execution of policies and rules using machine learning, aiding efficiency.
The platform provides real-time analytics on data center performance and configurations, enhancing performance oversight.
Cloud detection response facilitates quick identification of security threats in the environment, bolstering security.
Early risk identification reduces cloud security-associated costs, providing cost-effective security measures.

CONS

Costs associated with Check Point CloudGuard Code Security are not transparent.
Documentation is difficult to find and relatively limited.
Check Point CloudGuard Code Security is highly technical and requires specialized knowledge for proper configuration.
There are management challenges when deploying on cloud platforms compared to alternatives like FortiGate.
Security improvements are needed around API integration and false positives.
 

Check Point CloudGuard Code Security Pros review quotes

Mamadou Fallou Diagne - PeerSpot reviewer
IT security and network analyst at Revenu Québec
May 30, 2025
I can recommend Check Point CloudGuard Code Security to other organizations as it is a good platform to protect our organization.
Nagendra Nekkala. - PeerSpot reviewer
Senior Manager ICT & at Bangalore International Airport Limited
Dec 1, 2023
Having a cloud detection response helps to very quickly identify security threats in our environment.
reviewer2379477 - PeerSpot reviewer
Director of Security EngineerIng at a financial services firm with 5,001-10,000 employees
Mar 15, 2024
We have had a number of real events where developers accidentally made commits of API keys, and we were able to detect and begin response actions in minutes. We had the API key revoked in less than five minutes in such events.
Learn what your peers think about Check Point CloudGuard Code Security. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,221 professionals have used our research since 2012.
William Cambronero - PeerSpot reviewer
Consultant at ITQS
Jun 23, 2025
Automation has helped a lot to identify and automatically execute policies, rules, and blocks due to its machine learning.
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Feb 24, 2023
Knowing what measures we must take allows us to reduce costs associated with security in the cloud by providing early identification of a risk or a possible security breach.
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Feb 2, 2023
Its fastest and most outstanding characteristic is ensuring a development line that will not lead to applying applications or code development.
reviewer2008410 - PeerSpot reviewer
Software Engineer at Doddle
Jan 5, 2023
The data center security system has provided real-time analytics on performance and data configuration processes.
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Sep 21, 2022
You can maintain a legal framework structure at all times.
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack
Jul 25, 2024
It helped us to reduce vulnerabilities.
it_user2351736 - PeerSpot reviewer
Testing Eng at a consultancy with 1-10 employees
Feb 28, 2024
We have a strong sense of security assurance when utilizing CloudGuard, as it consistently delivers outstanding protection capabilities.
 

Check Point CloudGuard Code Security Cons review quotes

Mamadou Fallou Diagne - PeerSpot reviewer
IT security and network analyst at Revenu Québec
May 30, 2025
Some challenges with Check Point CloudGuard Code Security include that we noticed FortiGate is much more efficient on AWS, and our team prefers to deploy FortiGate there instead of CloudGuard due to the management challenges on the cloud.
Nagendra Nekkala. - PeerSpot reviewer
Senior Manager ICT & at Bangalore International Airport Limited
Dec 1, 2023
There needs to be better security around API integration.
reviewer2379477 - PeerSpot reviewer
Director of Security EngineerIng at a financial services firm with 5,001-10,000 employees
Mar 15, 2024
There are a lot of opportunities for how they can use their technology to do more. That would be more like sensitive data discovery and other things besides Git Repos, but then you are expanding the scope of what necessarily their product is.
Learn what your peers think about Check Point CloudGuard Code Security. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,221 professionals have used our research since 2012.
William Cambronero - PeerSpot reviewer
Consultant at ITQS
Jun 23, 2025
They could include web functionalities such as sandboxing.
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Feb 24, 2023
This is a highly technical solution for users who do not have security experience. It requires specialized knowledge of configurations to use it correctly.
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Feb 2, 2023
We need to have many of the baselines or development guides providing less complex writing or development.
reviewer2008410 - PeerSpot reviewer
Software Engineer at Doddle
Jan 5, 2023
I am satisfied with the performance and results enhanced by this product since we deployed it.
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Sep 21, 2022
I would like this solution to be extended to cellular devices or tablets.
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack
Jul 25, 2024
The solution should improve false-positives.
it_user2351736 - PeerSpot reviewer
Testing Eng at a consultancy with 1-10 employees
Feb 28, 2024
The enhancements are needed in the logging system and log management processes.