What is our primary use case?
This solution safeguards applications that are hosted in the organization's cloud servers.
It monitors the performance of applications from the deployment stage to the implementation of assigned tasks.
Check Point CloudGuard Application Security blocks any cyber attacks channeled to destroy confidential data.
Configuration of this platform with other tools took place efficiently without any challenge. The set security features alert the IT team when there are external threats that can affect workflows. the organization's networking infrastructure is ever secure since we deployed this product.
How has it helped my organization?
The solution has comprehensive security cover for the cloud applications, which has been a great achievement in the organization since we deployed this platform.
It provides advanced analytics that gives each team time to prepare for any threat that might occur in the future.
Enhanced data intelligence helps us to plan and turn provides analytics into actionable insights.
Safeguarding applications has enabled members to focus on more productive activities without fear of being attacked. The set of security tools enables each app to perform its role without external interference.
What is most valuable?
Sensitive data exposure has enabled us to plan and make reliable decisions based on the work environment.
The product has confirmed to each department that the injection of new data into the systems is highly secured to enhance transparency.
Security misconfigurations enable the IT team to rearrange application codes and take full control.
Insecure deserialization provides a comprehensive report of applications that enables the IT team to identify malicious coding and execute it in advance before it affects workflows.
What needs improvement?
The coding configurations can be simplified to save time for IT teams and developers.
Insufficient logging among applications breaches security, and this may lead to undetected malware attacks contributing to data compromise.
The set security tools target known vulnerabilities, and when there is an outbreak of new viruses, it may not be noticed, easily exposing data to cyber attackers.
Broken access control enables members to gain unauthorized access to saved files allowing them to edit accounts to enable other users to gain access. The software has great capability of preventing data with the set organization policies.
For how long have I used the solution?
I've used the solution for nine months.
What do I think about the stability of the solution?
This platform is stable, and the performance is excellent.
What do I think about the scalability of the solution?
I am impressed by the scalability.
How are customer service and support?
There is great support and cooperation from the customer service team.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I have not worked with a similar solution.
How was the initial setup?
The initial setup was straightforward.
What about the implementation team?
The vendor team was responsible for the full deployment.
What was our ROI?
There is increased ROI from improved application security.
What's my experience with pricing, setup cost, and licensing?
The cost and setup are good, depending on the company size.
Which other solutions did I evaluate?
I have no experience with other security products on the market.
What other advice do I have?
This platform is good for safeguarding cloud applications.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.