Introducing G2.ai, the future of software buying.Try now

Compare Check Point CloudGuard Network Security and CrowdStrike Falcon Cloud Security

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Check Point CloudGuard Network Security
Check Point CloudGuard Network Security
Star Rating
(153)4.5 out of 5
Market Segments
Enterprise (49.6% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Check Point CloudGuard Network Security
CrowdStrike Falcon Cloud Security
CrowdStrike Falcon Cloud Security
Star Rating
(80)4.6 out of 5
Market Segments
Mid-Market (43.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us 1 Workloads
Free Trial is available
Browse all 3 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Check Point CloudGuard Network Security excels in Network Segmentation with a score of 9.7, allowing for robust isolation of network resources, while CrowdStrike Falcon Cloud Security offers a solid performance in Network Mapping with a score of 9.4, providing users with clear visibility of their cloud infrastructure.
  • Reviewers mention that Check Point's Security Automation feature scores 9.0, streamlining security processes effectively, whereas CrowdStrike's Anomaly Detection shines with a score of 9.5, indicating a strong capability in identifying unusual patterns that could signify threats.
  • G2 users highlight Check Point's Quality of Support with a score of 9.0, suggesting that users find their customer service responsive and helpful, while CrowdStrike's support is rated slightly lower at 8.8, indicating room for improvement in user assistance.
  • Users on G2 report that Check Point's Compliance Monitoring is rated at 8.6, ensuring that users can maintain regulatory standards effectively, while CrowdStrike matches this score but is noted for its comprehensive Data Loss Prevention features, which received an 8.8 rating.
  • Reviewers mention that Check Point's Policy Management is robust with a score of 9.0, allowing for effective governance of security policies, while CrowdStrike's Workflow Management is rated at 9.2, indicating a user-friendly approach to managing security tasks.
  • Users say that Check Point's Auditing capabilities score 8.8, providing thorough insights into security events, while CrowdStrike's auditing features are rated higher at 9.0, suggesting a more comprehensive approach to tracking and reporting security incidents.
Pricing
Entry-Level Pricing
Check Point CloudGuard Network Security
No pricing available
CrowdStrike Falcon Cloud Security
Cloud-Native Application Security (CNAPP)
Contact Us
1 Workloads
Browse all 3 pricing plans
Free Trial
Check Point CloudGuard Network Security
Free Trial is available
CrowdStrike Falcon Cloud Security
Free Trial is available
Ratings
Meets Requirements
9.1
109
9.2
71
Ease of Use
8.8
112
8.7
72
Ease of Setup
8.7
99
8.9
65
Ease of Admin
8.8
65
8.9
53
Quality of Support
9.0
108
8.7
65
Has the product been a good partner in doing business?
8.8
63
9.1
53
Product Direction (% positive)
9.0
106
9.5
73
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
8.8
45
9.2
17
Management
9.2
39
9.1
16
9.0
31
9.2
13
8.9
35
8.9
15
Operations
8.6
34
9.0
14
9.0
37
9.2
14
8.7
38
9.1
13
Security Controls
9.0
37
9.6
13
8.0
33
8.6
13
8.7
33
9.2
14
8.4
32
9.1
13
8.6
8
Not enough data
Network Management
9.8
8
Not enough data
8.8
8
Not enough data
8.1
8
Not enough data
8.3
8
Not enough data
Security
9.4
8
Not enough data
9.0
8
Not enough data
9.6
8
Not enough data
9.0
8
Not enough data
Identity Management
8.8
8
Not enough data
8.5
8
Not enough data
9.0
8
Not enough data
Generative AI
7.1
7
Not enough data
6.2
7
Not enough data
Network Security Policy Management (NSPM)Hide 10 FeaturesShow 10 Features
8.8
23
Not enough data
Network Maintenance
9.0
23
Not enough data
8.9
22
Not enough data
9.0
20
Not enough data
Network Management
9.3
23
Not enough data
8.9
23
Not enough data
8.7
20
Not enough data
9.0
21
Not enough data
Network Monitoring
9.4
19
Not enough data
8.8
19
Not enough data
7.8
19
Not enough data
8.7
48
8.6
26
Security
8.7
40
8.7
26
8.7
38
8.6
23
8.7
36
8.1
24
8.4
38
8.5
23
Compliance
8.6
38
8.6
23
8.5
37
8.5
23
8.8
37
8.3
22
Administration
8.9
41
8.6
21
8.8
39
9.0
21
8.6
36
8.6
21
8.4
60
Not enough data
Data Protection
8.3
42
Not enough data
8.7
43
Not enough data
8.4
42
Not enough data
8.6
42
Not enough data
8.4
43
Not enough data
Analysis
8.2
43
Not enough data
8.4
43
Not enough data
8.3
43
Not enough data
Administration
8.2
46
Not enough data
8.1
46
Not enough data
8.7
47
Not enough data
8.6
33
Not enough data
Administration
9.2
28
Not enough data
9.0
27
Not enough data
8.3
30
Not enough data
8.9
29
Not enough data
Agentic AI - Firewall Software
8.1
17
Not enough data
8.2
17
Not enough data
Functionality
8.4
27
Not enough data
9.0
25
Not enough data
8.5
25
Not enough data
9.0
28
Not enough data
Monitoring
8.2
28
Not enough data
8.8
28
Not enough data
9.4
27
Not enough data
9.1
26
Not enough data
Generative AI
7.7
20
Not enough data
Artificial Intelligence - Firewall
8.3
19
Not enough data
Cloud Security Monitoring and AnalyticsHide 13 FeaturesShow 13 Features
Not enough data
8.4
44
Activity Monitoring
Not enough data
8.5
39
Not enough data
8.4
38
Not enough data
8.4
40
Not enough data
8.6
43
Security
Not enough data
8.3
40
Not enough data
8.3
40
Not enough data
8.6
40
Administration
Not enough data
8.5
40
Not enough data
8.6
40
Not enough data
8.2
37
Agentic AI - Cloud Security Monitoring and Analytics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
Not enough data
8.8
27
Configuration
Not enough data
8.0
22
Not enough data
8.8
23
Not enough data
9.1
22
Not enough data
9.0
21
Not enough data
8.7
23
Visibility
Not enough data
8.9
21
Not enough data
8.8
23
Vulnerability Management
Not enough data
9.1
22
Not enough data
8.7
23
Not enough data
9.1
22
Not enough data
9.0
23
8.9
16
Not enough data
Administration
9.4
12
Not enough data
8.1
12
Not enough data
8.6
12
Not enough data
Enforcement
9.0
12
Not enough data
9.1
13
Not enough data
9.0
13
Not enough data
9.2
12
Not enough data
9.5
13
Not enough data
Visibility
9.1
13
Not enough data
8.1
13
Not enough data
8.3
11
Not enough data
Cloud Infrastructure Entitlement Management (CIEM)Hide 8 FeaturesShow 8 Features
Not enough data
9.2
8
Access control - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
9.6
8
Not enough data
9.0
8
Not enough data
9.0
8
Not enough data
9.2
8
Monitoring - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
9.2
8
Not enough data
9.2
8
Auditing - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
9.2
8
Not enough data
9.0
8
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Security - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Check Point CloudGuard Network Security
Check Point CloudGuard Network Security
CrowdStrike Falcon Cloud Security
CrowdStrike Falcon Cloud Security
Check Point CloudGuard Network Security and CrowdStrike Falcon Cloud Security are categorized as Cloud Compliance and Cloud Workload Protection Platforms
Reviews
Reviewers' Company Size
Check Point CloudGuard Network Security
Check Point CloudGuard Network Security
Small-Business(50 or fewer emp.)
22.2%
Mid-Market(51-1000 emp.)
28.1%
Enterprise(> 1000 emp.)
49.6%
CrowdStrike Falcon Cloud Security
CrowdStrike Falcon Cloud Security
Small-Business(50 or fewer emp.)
13.9%
Mid-Market(51-1000 emp.)
43.0%
Enterprise(> 1000 emp.)
43.0%
Reviewers' Industry
Check Point CloudGuard Network Security
Check Point CloudGuard Network Security
Computer & Network Security
23.0%
Financial Services
21.5%
Information Technology and Services
20.7%
Computer Software
3.0%
Telecommunications
2.2%
Other
29.6%
CrowdStrike Falcon Cloud Security
CrowdStrike Falcon Cloud Security
Information Technology and Services
27.8%
Computer & Network Security
12.7%
Banking
7.6%
Logistics and Supply Chain
5.1%
Computer Software
5.1%
Other
41.8%
Alternatives
Check Point CloudGuard Network Security
Check Point CloudGuard Network Security Alternatives
Cisco Duo
Cisco Duo
Add Cisco Duo
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Wiz
Wiz
Add Wiz
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Add Acronis Cyber Protect Cloud
CrowdStrike Falcon Cloud Security
CrowdStrike Falcon Cloud Security Alternatives
Wiz
Wiz
Add Wiz
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Add Microsoft Defender for Cloud
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Cortex Cloud
Cortex Cloud
Add Cortex Cloud
Discussions
Check Point CloudGuard Network Security
Check Point CloudGuard Network Security Discussions
What is CloudGuard Network Security for Gateway Load Balancer used for?
1 Comment
Viral M.
VM
It is used as a web application filter to block unwanted traffic at load balancer end so it will secure end application server from malicious virus.Read more
Monty the Mongoose crying
Check Point CloudGuard Network Security has no more discussions with answers
CrowdStrike Falcon Cloud Security
CrowdStrike Falcon Cloud Security Discussions
Monty the Mongoose crying
CrowdStrike Falcon Cloud Security has no discussions with answers