Director of Security EngineerIng at a financial services firm with 5,001-10,000 employees
Real User
Top 10
2024-03-15T13:43:00Z
Mar 15, 2024
We have had a number of real events where developers accidentally made commits of API keys, and we were able to detect and begin response actions in minutes. We had the API key revoked in less than five minutes in such events.
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
2023-02-24T18:43:00Z
Feb 24, 2023
Knowing what measures we must take allows us to reduce costs associated with security in the cloud by providing early identification of a risk or a possible security breach.
Learn what your peers think about Check Point CloudGuard Code Security. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
Cloud Support at a tech company with 51-200 employees
User
2022-06-19T01:36:00Z
Jun 19, 2022
Being able to check different languages in different data centers or public clouds generates great confidence in the environment that can be checked, which has been very useful for the company.
Check Point CloudGuard Code Security provides real-time protection and compliance enhancement across diverse infrastructures, streamlining security management with automated processes and accurate threat detection.Designed to support multiple code languages and cloud environments, Check Point CloudGuard Code Security offers seamless integration with existing workflows. By implementing intuitive dashboards and role-based access control, it enhances operational efficiency while minimizing human...
We have had a number of real events where developers accidentally made commits of API keys, and we were able to detect and begin response actions in minutes. We had the API key revoked in less than five minutes in such events.
We have a strong sense of security assurance when utilizing CloudGuard, as it consistently delivers outstanding protection capabilities.
Having a cloud detection response helps to very quickly identify security threats in our environment.
Compared to what we used before, it's helping us to be more efficient in managing our traffic.
Knowing what measures we must take allows us to reduce costs associated with security in the cloud by providing early identification of a risk or a possible security breach.
Its fastest and most outstanding characteristic is ensuring a development line that will not lead to applying applications or code development.
It maintains very effective monitoring since it has a very fast and updated database, resulting in new vulnerabilities being caught quickly.
The data center security system has provided real-time analytics on performance and data configuration processes.
You can maintain a legal framework structure at all times.
The implementation of this tool for security management and control is very simple.
Being able to check different languages in different data centers or public clouds generates great confidence in the environment that can be checked, which has been very useful for the company.