Our primary use cases include enhancing security for web applications and APIs, optimizing resource utilization to reduce costs, and maximizing efficiency in log management for better insights and savings.
CISO at Paschoalotto
Simplifies our security management and enhances our ability to monitor and analyze logs effectively
Pros and Cons
- "The most valuable feature we have found in Check Point CloudGuard WAF is its rich logging capabilities."
- "I feel like I need more clarity in understanding pricing for DDoS protection."
What is our primary use case?
How has it helped my organization?
CloudGuard WAF has improved our organization by simplifying security management and enhancing our ability to monitor and analyze logs effectively.
What is most valuable?
The most valuable feature we have found in Check Point CloudGuard WAF is its rich logging capabilities.
What needs improvement?
In terms of improvement, I feel like I need more clarity in understanding pricing for DDoS protection.
Buyer's Guide
Check Point CloudGuard WAF
June 2025

Learn what your peers think about Check Point CloudGuard WAF. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
For how long have I used the solution?
I have been working with CloudGuard WAF for a month.
What do I think about the stability of the solution?
CloudGuard WAF impressed us with its stability; it is a powerful tool providing great visibility.
What do I think about the scalability of the solution?
CloudGuard WAF's scalability is excellent, especially as a SaaS, offering significant improvements over on-premises environments and providing consolidated scalability.
How are customer service and support?
The technical support is amazing.
Which solution did I use previously and why did I switch?
We previously used Cloudflare. Now, we are testing WAF to enhance our log insights.
How was the initial setup?
The initial deployment was straightforward. We transitioned from an on-premises solution to a SaaS model, which was simpler and more useful. Our implementation strategy involved redirecting the site to the new solution and creating policies to ensure smooth operation.
What was our ROI?
We haven't seen ROI metrics yet, but we expect long-term benefits, especially in budget management and risk reduction.
Which other solutions did I evaluate?
Before choosing CloudGuard, we evaluated options like Azure and AWS. The main differences lie in policy customization, market size, and preset features. Each has its pros and cons, but CloudGuard stood out for its robust policy options and wide market presence.
What other advice do I have?
By implementing Check Point CloudGuard WAF we aimed to address challenges related to enhancing security for web applications while leveraging powerful logging capabilities.
We check false positives in CloudGuard WAF using logs and the interface, and we have had very few issues, which helps our business.
Using preset policies, the solution preemptively blocks zero-day attacks and detects hidden anomalies without requiring full data.
The solution has cut our web application firewall costs because it is adaptable to our environment.
My advice to new users would be to focus on the benefits of software as a service and ensure clarity in understanding pricing, particularly for DDoS protection.
Overall, I would rate Check Point CloudGuard WAF as a ten out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

ISO at Bank-Fund Staff Federal Credit Union
Protects our applications against threats without relying on signatures
Pros and Cons
- "We have not had any incidents. We could realize its benefits immediately. We watched and monitored the traffic, and it was amazing to see the results."
- "In terms of features, I do not have any negatives. Their integration is extremely quick. It is better than others I have been involved with in the past. Their pricing model, however, can be better."
What is our primary use case?
We have multiple cloud tenants, such as AWS and Azure, and we wanted to make sure we are secure.
By implementing CloudGuard WAF, we wanted to avoid using the built-in WAF. We wanted to avoid using the WAFs built into our Azure or AWS products. We wanted to make sure that we were using something proven and secure.
How has it helped my organization?
It is extremely important to us that CloudGuard WAF protects our applications against threats without relying on signatures. We are a financial institution, and we want to make sure that we do not have any type of traffic that infiltrates our cloud environment. We have 90,000 members around the world.
CloudGuard WAF is very good in terms of false positives. I do not see a lot of static noise, which we used to see with other apps that were in place. It is fantastic.
CloudGuard WAF has been fantastic for preemptively blocking Zero Day attacks and detecting hidden anomalies. I would rate it a ten out of ten for that. As soon as we see a Zero Day, we get the alerts right away, and we are able to do the patching. This guarantees the use of our services. It is immediate and in real-time.
CloudGuard WAF has reduced the total cost of ownership for our web application firewall. It has reduced the overhead of not having people manually look at or review the alerts. It has been more automated.
What is most valuable?
It is mainly for egress and ingress, just making sure that we are keeping the proper traffic. The integration with Azure ExpressRoute was also key for us.
We have not had any incidents. We could realize its benefits immediately. We watched and monitored the traffic, and it was amazing to see the results.
What needs improvement?
In terms of features, I do not have any negatives. Their integration is extremely quick. It is better than others I have been involved with in the past. Their pricing model, however, can be better.
For how long have I used the solution?
I have been using CloudGuard WAF for two years.
What do I think about the stability of the solution?
We have had zero issues. Being a financial organization, just like others, our big issue is having any kind of downtime. Any downtime affects our members, and if our members are affected, they will withdraw the money. It has been fantastic. We have had zero events.
What do I think about the scalability of the solution?
There are no real ends. We are a smaller environment compared to what they are used to working with. I have no concerns with being able to scale with them.
It is being used across cross-functional teams for different applications that are involved. We have 335 employees, and at least 300 employees touch this environment at any given time.
We definitely have plans to increase its usage. There are some plans in-house to expand the cloud environment.
How are customer service and support?
They are fantastic. We never had an issue. Whenever we need something, we get a response.
We also have a managed service provider. We have engineers from the Teneo group, and they are always great if we need any help.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We were using the built-in WAF, but that was before my time, and I knew better.
We did not go with our cloud vendor's web application firewall because it is against the best practices. From everything I have read and studied, I would rather go with something that is proven. There are a lot more vulnerabilities that have been exploited with native WAFs.
How was the initial setup?
It is a public cloud. We have AWS and Azure.
I was involved in the initial deployment only from a high level. I was able to support the team to grab the necessary resources. Outside of that, it was just more of approvals.
Its deployment was straightforward. The deployment was outlined very well. We use one of the resellers and managed service providers for Check Point called Teneo. They explained everything. They told us exactly how it was going to go. They had their folks in place, and it was just very straightforward. It was very easy.
What about the implementation team?
We had the help of Teneo. They were brilliant, and then I was able to help the team with the right pieces to get it accomplished.
We recently did an integration with Azure ExpressRoute. We are bringing it in so that we have a safer way for the egress and ingress with our vendors. I wanted to make sure that we involved the infrastructure team. We had a cloud architect and our cybersecurity team involved. We also ran it through our change advisory board and the architectural review board. We wanted to cover all bases to make sure that all aspects are covered.
What was our ROI?
We have definitely seen an ROI. There has been a consolidation with not just the cloud stack, but Check Point in general. It has been nice to eliminate products. We have already eliminated close to $250,000 annually in different tools by consolidation.
What's my experience with pricing, setup cost, and licensing?
This is where I have a different opinion. If the pricing for the Infinity platform covers everything, it would be more straightforward. I had a hard time selling it to our CEO as a former CFO because of the differentials. There are different deltas year to year over a five-year period. It is very difficult to explain. It would be easier to digest for our executives if there was a flatter scale.
Which other solutions did I evaluate?
We did not evaluate other solutions only because we have Check Point in-house, and I was able to talk to our rep. We were able to get a nice solution from them, so we did not have to evaluate any other solution.
What other advice do I have?
To those evaluating CloudGuard WAF, I would advise that for integration, make sure they have a trusted partner that is going to help them with the integration plan or they have the in-house skills to develop that plan.
I would rate CloudGuard WAF a ten out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point CloudGuard WAF
June 2025

Learn what your peers think about Check Point CloudGuard WAF. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Security Architect/Staff Engineer at a consultancy with 10,001+ employees
Addresses the security of APIs and define objectives like throttling to control API usage
What is our primary use case?
We were focused on mitigating malicious activity at the application level. We were searching for technology to help manage frequent traffic issues, which is why we decided to implement a WAF. Our main use case was to also address the security of APIs. Since we were using many APIs in our environment, we wanted a solution that could manage restrictions and throttling for these APIs effectively.
The WAF allowed us to define objectives like throttling to control API usage. Additionally, we utilized the WAF to handle OWASP Top Ten vulnerabilities by creating rules to inspect incoming traffic from the internet to our internal infrastructure. Suspicious activities would be flagged and alerted as necessary. These features were key to our decision to implement the WAF in our last organization.
How has it helped my organization?
Check Point CloudGuard WAF provides a range of built-in features. It includes default policies based on the OWASP Top Ten vulnerabilities, which help detect and mitigate common threats. However, for vulnerabilities beyond the OWASP Top Ten, the WAF also offers the flexibility to create custom rules.
You can create and implement custom rules if you need to address other common vulnerabilities in the external environment. There are various options for implementing these custom rules, including using Terraform. For organizations that prefer to use only default policies, those are also effective at handling traffic and identifying application-specific vulnerabilities.
What is most valuable?
WAF solutions offer a wide range of features, and many cloud vendors integrate WAF capabilities directly into their platforms. For instance, Azure CloudGuard includes built-in WAF features fully integrated with the Azure environment.
Within this platform, you can easily define API restrictions, set web application vulnerability policies, and manage security headers like content security policies and HSTS policies. This integration streamlines the process of configuring and managing these security features, making it more efficient than using separate tools for each task.
What needs improvement?
When I was working with the WAF platform, there were limitations, particularly concerning compliance and reporting. Managing multiple tools for different functions like WAF, firewall, CDN solutions, and antivirus—could be cumbersome for organizations. They often prefer a more centralized platform to manage various features efficiently.
While having separate tools can enhance visibility and support a defense-in-depth strategy, the WAF platform's reporting capabilities could have been improved.
What other advice do I have?
Security headers, such as content security policies and HSTS policies, protect applications from web vulnerabilities like cross-site scripting attacks and cookie theft. These parameters can be defined at the CloudFront level or within a WAF.
WAFs operate in two main modes. Initially, they may be set to detection mode, monitoring activity without blocking traffic. This is useful for assessing the impact and tuning the rules. Once your implementation and team are ready, you can switch to the blocking mode, where the WAF actively blocks suspicious traffic. It’s important to carefully configure this mode to avoid blocking legitimate traffic, which can cause disruptions.
Additionally, you might see cost savings if you don’t use an API management platform and instead rely on WAF to manage API-related features. However, the decision depends on your specific architecture and implementation needs.
Overall, I rate the solution an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cyber Security Engineer at a computer software company with 51-200 employees
Reliable, feature-rich, and value for money
Pros and Cons
- "Whenever there was a new CVE, Check Point CloudGuard WAF used to block them."
- "It was costlier than other solutions."
What is our primary use case?
We did a PoC with Check Point CloudGuard WAF for a month. We had acquired it for a month for testing purposes to see how it would help us with our setup.
It was placed at the starting point of our network infrastructure wherein all the traffic was monitored. We created security policies on Check Point CloudGuard WAF. Whenever an IP used to come to us, it would basically go through a set of policies, and then Check Point CloudGuard WAF would search for malware and other things in the traffic.
How has it helped my organization?
During the PoC, we did not face any issues related to false positives. I am in the network security team, and we have a security operations team as well. The security operations team has an SIEM tool. Whenever an alert got updated in the SIEM tool, they used to pass it on to us. We could easily find the logs for a particular alert generated on Check Point CloudGuard WAF. It was always correct. We did not observe any false positives with them.
Check Point CloudGuard WAF protects your applications against threats without relying on signatures. It works fine without signatures, but it cannot detect all the malicious traffic that might enter the setup.
What is most valuable?
Check Point has its own threat intelligence database. It is global. All the malicious samples are added to that. Whenever there was a new CVE, Check Point CloudGuard WAF used to block them. That was a good feature of Check Point CloudGuard WAF.
We had scheduled a time for the database update, so every day at 3 pm, the CVE database used to get updated.
What needs improvement?
It was costlier than other solutions. We brought it into our setup for PoC purposes. It was there for one month. We liked all the features, but compared to its competitors, such as Fortinet and Palo Alto, it was a little bit costly. However, considering the cost, it was good and efficient. Other than the price, I did not see any room for improvement.
For how long have I used the solution?
I used Check Point CloudGuard WAF for a month. It was in the month of January 2024.
What do I think about the stability of the solution?
We never faced any issues with Check Point CloudGuard WAF. However, in the case of Check Point Firewall, we experienced crashing issues with the SmartConsole application.
How are customer service and support?
I have not contacted Check Point support for Check Point CloudGuard WAF. It was with us only during the PoC. During the one-month period, we did not face any issues, but for other products, we generally raise a TAC case with the Check Point team. We have a Check Point Firewall in our setup, and whenever we face issues with it, we raise a case with Check Point TAC. Technical support of Check Point is good. They respond on time. They analyze the logs properly and give a proper workaround.
How was the initial setup?
I was not involved in its deployment. We have a company named Softcell in India. They are the first point of contact, and Check Point is the second point of contact in our setup. Whenever we have to implement any new Check Point devices in our setup, we raise a service request with the Softcell team, and they provide an engineer for the implementation. However, I was a part of the deployment team of the Check Point Firewall 16000 series, and we did not face any issues.
What's my experience with pricing, setup cost, and licensing?
I work for an Indian banking client. In India, companies are on a budget. The company liked Check Point very much, but it was a little bit costly compared to FortiWeb. However, it had more features compared to FortiWeb.
Which other solutions did I evaluate?
Check Point CloudGuard WAF was quite good compared to FortiWeb. We have FortiWeb now due to budget constraints, but feature-wise, Check Point CloudGuard WAF was quite durable and reliable.
What other advice do I have?
I am not very aware of how Check Point CloudGuard WAF works at preemptively blocking Zero Day attacks and detecting hidden anomalies. If it is updated in the global database, Check Point CloudGuard WAF could prevent Zero Day attacks from getting triggered.
Overall, I would rate Check Point CloudGuard WAF a nine out of ten.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Network Enigner at a transportation company with 1-10 employees
Robust protection against web application threats with easy deployment, comprehensive feature set and excellent catch rate compared to competitors
Pros and Cons
- "On the endpoint side, the most valuable feature is undoubtedly the cloud-based management capability, along with the ransomware protection, despite not encountering any instances so far."
- "Improving the process for handling licensing renewals would be a welcome enhancement."
What is our primary use case?
We utilize Check Point CloudGuard to protect our Office 365 email system from phishing attempts, which were becoming increasingly common. Additionally, we rely on it to secure our usage of Microsoft Teams for collaboration, as well as for our SharePoint platform. Furthermore, we leverage CloudGuard Endpoint to safeguard our machines, particularly because many of our end users frequently travel abroad. This ensures that we have visibility into their activities and locations, allowing us to restrict access if necessary or provide remote assistance when needed.
How has it helped my organization?
We were facing several challenges that prompted us to implement CloudGuard Application Security. Previously, we used another vendor for email security, but we found that many emails were slipping through, requiring us to manually review each one. This became a significant overhead, as we had to ensure that every email was properly tagged. With Check Point's email security solution, this overhead was practically eliminated.
Now, the number of emails slipping through is minimal, perhaps only once or twice a month. Additionally, Check Point's solution streamlines the process by notifying users of potentially legitimate emails that were flagged as suspicious. This feature has been particularly helpful since our company relies heavily on email for contract-related communications. On the endpoint security front, we were impressed by Check Point's ransomware protection feature, including its anti-ransomware rollback capability. Having experienced the importance of such features in previous roles, it was a straightforward decision for us to switch from our previous vendor to Check Point.
The benefits we've observed are significant. On the email front, my workload has been drastically reduced, practically eliminating overhead. As for Check Point, it provides peace of mind knowing that in the event of a ransomware attack, the system has a rollback feature. This reassures me that I'll have the opportunity to investigate and diagnose any issues that may arise.
In terms of email, Check Point's solution effectively blocked numerous phishing emails that were previously slipping through, which is a significant advantage. Regarding Check Point in general, the cloud-based management capability is highly beneficial as it eliminates the need for on-premise appliances or servers. Additionally, it ensures that I can still manage the security of devices even when they're outside the corporate network.
It's very important that CloudGuard Application Security defends our applications against threats without solely relying on signatures. Relying solely on signature-based detection is limited, as it's only as effective as the signatures themselves. With the ever-evolving nature of threats, especially in environments like conferences where new threats emerge frequently, relying solely on signatures may not be sufficient. I've taken the initiative to test various security solutions by experimenting with different malware downloads and observing how they perform. This hands-on approach underscores the importance of having a robust behavioral engine, like the one provided by Check Point, which adds an additional layer of security beyond traditional signature-based detection.
Regarding false positives with CloudGuard Application Security, particularly in emails, I've encountered very few instances.
The solution has effectively lowered our total cost of ownership for our web application firewall, particularly in the context of email security.
We opted not to go with our CloudGuard vendor's web application firewall because, in the case of Microsoft, we decided to try their email security system. However, it didn't perform as expected, with many threats slipping through. Consequently, Check Point's solution proved to be more effective in this scenario.
What is most valuable?
On the endpoint side, the most valuable feature is undoubtedly the cloud-based management capability, along with the ransomware protection, despite not encountering any instances so far. Regarding email security, the standout feature is the minimal overhead, essentially reducing the task to routine maintenance.
What needs improvement?
One area for potential improvement is the management interface. Occasionally, when there are major updates, the layout of the menus changes, which can be somewhat disruptive as I need to search for familiar options. Consistency in menu structure would be beneficial, as it allows users to develop muscle memory and navigate the interface more efficiently over time. Improving the process for handling licensing renewals would be a welcome enhancement.
For how long have I used the solution?
I have been using it for five years.
What do I think about the stability of the solution?
In terms of stability, I find it generally reliable. However, there have been a few issues, particularly with license renewal, where the system would unexpectedly go offline without notifying me. This would sometimes take a couple of days to resolve, requiring support intervention to address licensing issues.
How are customer service and support?
Tech support is prompt, knowledgeable, and efficient. On a scale from zero to ten, I would rate them a solid ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, our email security solution was provided by Barracuda, and our endpoint security was handled by ESET.
How was the initial setup?
The initial setup was straightforward, primarily because it involved mainly APIs, which simplified the process.
What about the implementation team?
I was in charge for the deployment.
What was our ROI?
We've observed ROI primarily in terms of cost reduction. This is mainly because there are fewer servers to manage now compared to other solutions, where on-premise servers were necessary.
What's my experience with pricing, setup cost, and licensing?
I find the pricing to be reasonable.
Which other solutions did I evaluate?
I also evaluated SentinelOne, CrowdStrike, Mimecast, and CheckPoint. Ultimately, I chose Check Point because of its comprehensive IT toolset, which allows me to manage all aspects from a single dashboard. I appreciated the convenience of not having to switch between different units for different functionalities, thus avoiding the creation of multiple interfaces.
What other advice do I have?
The advice I would offer to others regarding Check Point products revolves around their robust features, particularly the rollback feature. I appreciate how Check Point handles this compared to some competitors who use their own driver on the DriveSpace, whereas others leverage Microsoft VSS. Regarding email security, it's straightforward to deploy and has a high catch rate compared to competitors. Overall, I would rate it ten out of ten.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cloud computing at ITQS
Helps with compliance, mitigates security risk, and helps reduce costs
Pros and Cons
- "With the solution, we managed to obtain complete comprehensive visibility of the entire environment in the cloud, thus having better control of each of the resources."
- "They should improve in the delivery of more detailed reports with more information."
What is our primary use case?
Currently, we have our applications and devices in the Microsoft cloud in Azure. We have been modernizing our platform, and some services we have been converting to a platform as a service for which many app services have been implemented, among other workloads, and we needed to expose them to the outside. Therefore, a tool was needed that could do this security filtering and that also provided a set of native tools and functionalities for the cloud and checkpoint to meet the needs that we were presenting.
How has it helped my organization?
Since we were able to implement this new tool, we have been able to put into production all the applications that we have modernized for the use of our clients and officials, thus resulting in a more continuous and faster improvement of our services and achieving better scalability, stability and we have managed to reduce the costs and labor in IT, thus ensuring that our developers dedicate themselves to other projects and not be making patches for the applications as we were doing due to our obsolete technology, in addition, it provided us with regulatory compliance, monitoring, and analysis of all applications.
What is most valuable?
The tool has many valuable features that help us in our day-to-day life with all the applications. With the solution, we managed to obtain complete comprehensive visibility of the entire environment in the cloud, thus having better control of each of the resources.
In addition to that, we managed to have security policies that allow us to reward compliance in each of the applications. We've been able to provide better regulatory compliance, thus being able to mitigate security risks in our environment and achieve a better standard in the security of the company.
What needs improvement?
The tool is currently one of the best on the market. It has a series of more innovative features in the security market. That said, there are improvements necessary.
They should improve in the delivery of more detailed reports with more information.
They should improve in the support they provide since they have lost a lot of strength here. Quality has dropped; they do not comply with the SLA.
They should have a centralized library of each of the manual technologies, guides, and errors where everything can be found in one place so that we do not waste time searching all over the web for a solution or guide.
For how long have I used the solution?
This solution is new; I have been using it for one year,
What do I think about the stability of the solution?
To this day, the stability of the tool is very good and has not presented any problems.
What do I think about the scalability of the solution?
The scalability of the tool is very good; it is multi-cloud.
How are customer service and support?
The support must be improved. The performance and quality it offers have decreased.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
It is one of the first tools that implements application security.
How was the initial setup?
The installation was simple since we have experience with these tools, however, it does have a medium learning curve.
What about the implementation team?
The implementation was carried out by the IT department with the help and supervision of the vendor's engineer.
What was our ROI?
The investment was quite relevant; we did it to protect our information and power the applications in production.
What's my experience with pricing, setup cost, and licensing?
The price and licenses are very competitive in the market and should go down a little.
Which other solutions did I evaluate?
We did look into Microsoft tools, such as the WAF, which were evaluated. They did not meet the organization's needs.
What other advice do I have?
It is an excellent multicloud tool with good security features.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Tech Support Engineer at Sybyl
Predictive analytics optimize resource allocation and save time while user interface challenges new users
Pros and Cons
- "Check Point CloudGuard WAF offers comprehensive monitoring and alerting for my entire VMware virtual environment."
- "Check Point CloudGuard WAF could benefit from an enhanced user interface as it can be a bit complex and overwhelming for new users."
What is our primary use case?
I am a systems administrator currently using Check Point CloudGuard WAF.
What is most valuable?
Check Point CloudGuard WAF offers comprehensive monitoring and alerting for my entire VMware virtual environment. It allows me to get a clear picture of resource utilization, performance bottlenecks, and potential issues before they impact my business. The predictive analytics are excellent, providing a way to anticipate hardware needs, optimize resource allocation, and prevent downtime. Its automation capabilities are strong, enabling task automation such as workload balancing and resource allocation, saving me valuable time and resources.
What needs improvement?
Check Point CloudGuard WAF could benefit from an enhanced user interface as it can be a bit complex and overwhelming for new users. Its integration with non-VMware products could be improved to offer a more holistic view of my IT infrastructure. Lastly, the pricing could be made more competitive.
For how long have I used the solution?
I have been using Check Point CloudGuard WAF for seven to eight years.
Which other solutions did I evaluate?
Before choosing Check Point CloudGuard WAF, I considered several other products, including Microsoft System Center Operations Manager, SolarWinds Server & Application Monitor, and Dynatrace. Ultimately, I chose Check Point CloudGuard WAF due to its strong integration with my VMware virtual environment.
What other advice do I have?
I would advise someone considering Check Point CloudGuard WAF to invest in proper training. The platform's advanced features can be challenging to grasp initially. So, take the time to learn how to use the product effectively. It is well worth the investment.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Apr 30, 2025
Flag as inappropriateAccount Manager at a tech vendor with 11-50 employees
Integrates well with existing cloud security tools and management systems and provides comprehensive security coverage
Pros and Cons
- "The most effective CloudGuard feature for threat prevention is its web app protection."
- "CloudGuard could improve in areas such as ease of integration with Fortinet and reducing costs associated with deployment in cloud environments like Azure."
What is our primary use case?
Check Point CloudGuard WAF can be used in various scenarios, including on-premises and cloud deployments. It integrates well with other platforms like Fortinet and can be managed through a centralized console. It is suitable for multi-cloud environments, including Google Cloud Platform and Azure. Additionally, Check Point AppSec can be used alongside CloudGuard WAF for comprehensive application security.
What is most valuable?
The most effective CloudGuard feature for threat prevention is its web app protection.
What needs improvement?
CloudGuard could improve in areas such as ease of integration with Fortinet and reducing costs associated with deployment in cloud environments like Azure. Simplifying the implementation process and offering more cost-effective solutions could make it more competitive and easier for clients to adopt.
For how long have I used the solution?
I have been working with Check Point CloudGuard WAF for two years.
What do I think about the stability of the solution?
CloudGuard is stable, with minimal interruptions to service. In the event of interruptions, there is a data center alternative within CloudGuard. On a scale of one to ten, I would rate its stability as a solid nine out of ten.
What do I think about the scalability of the solution?
It is easy to scale up CloudGuard as needed, and the licensing is based on traffic rather than the number of URLs. This means that clients only need to license the solution based on their traffic requirements, regardless of the number of applications they have deployed. I would rate the scalability as an eight out of ten.
How are customer service and support?
Check Point offers strong customer service and technical support. While I interact with account managers for negotiations and collaborate with Check Point engineers during projects, the dedicated customer service team ensures a positive experience. Overall, I would rate the support as an eight out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup of CloudGuard is somewhat straightforward, but it involves creating virtual machines, which can add complexity and cost, especially in cloud environments like Azure. Clients should carefully consider recommendations and costs associated with CloudGuard and compare them with alternatives like Fortinet to make informed decisions.
Deployment of Check Point CloudGuard typically requires a small team, often consisting of around two to three staff members from cybersecurity departments or Check Point Harmony solution teams.
For maintenance of Check Point CloudGuard, typically one or two people are required to ensure the solution functions properly, including updating applications and managing access.
What other advice do I have?
The auto-generation of WAF rules has positively impacted our security posture by efficiently identifying and mitigating threats. In cloud security, it may reduce delays in detecting and responding to security incidents. By checking the security posture of clients' websites, we can assess cybersecurity risks, such as those specific to certain industries, improving overall security awareness and readiness.
The deep API protection provided by CloudGuard has several benefits, such as comparing API calls to updates in cybersecurity groups and enhancing security for web applications and APIs. An example of CloudGuard's effectiveness is when protecting cloud-based RP systems or electronic invoice applications. In these cases, CloudGuard secures the cloud environment, including databases, against malware, encrypts applications, and provides overall application protection.
CloudGuard integrates well with existing cloud security tools and management systems, making it easy to implement and manage.
I would recommend CloudGuard to others, especially for organizations heavily reliant on cloud infrastructure and applications. It provides comprehensive security coverage, including WAF, which is essential for safeguarding applications in the cloud. I often suggest CloudGuard to clients to enhance their cybersecurity posture and mitigate risks effectively.
Overall, I would rate Check Point CloudGuard WAF as an eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner

Buyer's Guide
Download our free Check Point CloudGuard WAF Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Popular Comparisons
SonarQube Server (formerly SonarQube)
Checkmarx One
Microsoft Azure Application Gateway
Azure Front Door
F5 Advanced WAF
Fortinet FortiWeb
Cloudflare Web Application Firewall
Imperva Web Application Firewall
Radware Alteon
Barracuda Web Application Firewall
Radware Cloud WAF Service
open-appsec
Buyer's Guide
Download our free Check Point CloudGuard WAF Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- If you had to both encrypt and compress data during transmission, which would you do first and why?
- When evaluating Application Security, what aspect do you think is the most important to look for?
- What are the Top 5 cybersecurity trends in 2022?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- We're evaluating Tripwire, what else should we consider?
- Which application security solutions include both vulnerability scans and quality checks?
- Is SonarQube the best tool for static analysis?
- Why Do I Need Application Security Software?
- Which Email Security enterprise solution would you choose: Cisco Secure Email vs Forcepoint Email Security vs Barracuda Email Security Gateway?
- SAST vs. DAST: Which is better for application security testing?