Compare Check Point CloudGuard Network Security and Okta

At a Glance
Check Point CloudGuard Network Security
Check Point CloudGuard Network Security
Star Rating
(177)4.5 out of 5
Market Segments
Enterprise (45.1% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Check Point CloudGuard Network Security
Okta
Okta
Star Rating
(1,179)4.5 out of 5
Market Segments
Mid-Market (52.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$6.00 1 User per month
Browse all 2 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Okta excels in user experience, particularly with its intuitive interface and seamless Single Sign-On feature. Users appreciate how all applications are easily accessible after a single login, which significantly reduces the hassle of remembering multiple passwords.
  • Users say that Check Point CloudGuard Network Security provides a clear advantage in managing cloud network traffic. Reviewers highlight its ability to simplify security management from a single platform, making it easier to control and monitor network activities.
  • According to verified reviews, Okta's implementation process is praised for its quick setup and user-friendly onboarding. Users mention that the platform integrates smoothly with existing systems, allowing for efficient rollout of security features like Multi-Factor Authentication and user lifecycle management.
  • Reviewers mention that Check Point CloudGuard Network Security stands out for its automated security capabilities, which are essential for managing threats in hybrid and multicloud environments. Users appreciate the consistent protection it offers, making it a reliable choice for complex security needs.
  • G2 reviewers highlight that while both products have similar star ratings, Okta's overall satisfaction is bolstered by a significantly higher volume of recent reviews, indicating a more robust user experience and ongoing support. Users frequently commend Okta for its reliability and strong security foundation.
  • Users express that Check Point CloudGuard Network Security's ease of setup is a major plus, with many noting that it requires minimal configuration. This accessibility makes it a great option for users who may not have extensive technical expertise, allowing them to implement effective security measures quickly.
Pricing
Entry-Level Pricing
Check Point CloudGuard Network Security
No pricing available
Okta
Starter
$6.00
1 User per month
Browse all 2 pricing plans
Free Trial
Check Point CloudGuard Network Security
Free Trial is available
Okta
No trial information available
Ratings
Meets Requirements
9.0
124
9.3
867
Ease of Use
8.6
128
9.3
890
Ease of Setup
8.6
115
8.9
398
Ease of Admin
8.8
71
9.1
197
Quality of Support
8.9
123
8.9
651
Has the product been a good partner in doing business?
8.8
70
8.9
192
Product Direction (% positive)
9.1
123
8.7
843
Features by Category
Not enough data
9.1
501
Authentication Options
Not enough data
9.3
463
Not enough data
9.3
56
Not enough data
9.2
442
Not enough data
9.3
50
Not enough data
9.2
297
Not enough data
9.2
286
Access Control Types
Not enough data
9.2
322
Not enough data
9.2
346
Not enough data
9.2
356
Not enough data
9.0
258
Not enough data
9.0
272
Administration
Not enough data
9.1
285
Not enough data
9.2
322
Not enough data
9.1
277
Not enough data
9.1
346
Not enough data
9.2
321
Platform
Not enough data
9.2
324
Not enough data
9.2
288
Not enough data
9.2
322
Not enough data
9.0
262
Not enough data
8.9
256
Not enough data
8.9
252
Not enough data
9.0
269
User Provisioning and Governance ToolsHide 15 FeaturesShow 15 Features
Not enough data
9.1
129
User on/off Boarding
Not enough data
9.1
96
|
Verified
Not enough data
9.2
95
|
Verified
Not enough data
9.3
97
|
Verified
Not enough data
9.1
98
|
Verified
Not enough data
9.4
93
|
Verified
Not enough data
8.9
87
|
Verified
User Maintenance
Not enough data
9.3
107
|
Verified
Not enough data
8.9
89
|
Verified
Not enough data
9.0
81
|
Verified
Governance
Not enough data
8.9
84
|
Verified
Not enough data
9.2
84
|
Verified
Administration
Not enough data
8.9
88
|
Verified
Not enough data
8.9
100
|
Verified
Not enough data
9.0
93
|
Verified
Not enough data
9.1
87
|
Verified
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
8.8
49
Not enough data
Management
9.3
43
Not enough data
9.0
34
Not enough data
8.9
38
Not enough data
Operations
8.7
35
Not enough data
9.1
39
Not enough data
8.8
40
Not enough data
Security Controls
9.0
38
Not enough data
8.1
35
Not enough data
8.7
34
Not enough data
8.5
33
Not enough data
8.6
9
8.9
42
Network Management
9.8
8
Feature Not Available
8.8
8
Feature Not Available
8.1
8
9.0
35
8.3
8
9.1
34
Security
9.4
8
9.3
36
9.0
8
9.3
38
9.6
8
9.1
33
9.0
8
9.2
38
Identity Management
8.8
8
9.2
33
8.5
8
9.2
32
9.0
8
9.2
37
Generative AI
7.1
7
6.6
15
6.2
7
Feature Not Available
Network Security Policy Management (NSPM)Hide 10 FeaturesShow 10 Features
8.9
26
Not enough data
Network Maintenance
9.0
26
Not enough data
9.0
24
Not enough data
8.9
22
Not enough data
Network Management
9.3
25
Not enough data
9.0
25
Not enough data
8.6
22
Not enough data
9.1
23
Not enough data
Network Monitoring
9.4
21
Not enough data
8.8
20
Not enough data
7.9
20
Not enough data
8.7
49
Not enough data
Security
8.7
40
Not enough data
8.7
38
Not enough data
8.7
36
Not enough data
8.4
38
Not enough data
Compliance
8.6
38
Not enough data
8.5
37
Not enough data
8.8
38
Not enough data
Administration
8.9
41
Not enough data
8.8
39
Not enough data
8.6
36
Not enough data
8.4
61
Not enough data
Data Protection
8.3
42
Not enough data
8.7
43
Not enough data
8.4
43
Not enough data
8.6
43
Not enough data
8.4
43
Not enough data
Analysis
8.2
43
Not enough data
8.4
43
Not enough data
8.3
43
Not enough data
Administration
8.2
46
Not enough data
8.1
46
Not enough data
8.7
47
Not enough data
Cloud Directory ServicesHide 11 FeaturesShow 11 Features
Not enough data
9.5
87
Access Control
Not enough data
9.3
60
Not enough data
9.4
63
Not enough data
9.4
65
Not enough data
9.3
55
Administration
Not enough data
9.5
60
Not enough data
9.5
59
Not enough data
9.4
54
Not enough data
9.4
69
Functionality
Not enough data
9.5
76
Not enough data
9.6
77
Not enough data
9.4
66
8.6
48
Not enough data
Administration
9.2
40
Not enough data
8.8
32
Not enough data
8.3
33
Not enough data
8.9
32
Not enough data
Agentic AI - Firewall Software
8.1
20
Not enough data
8.3
20
Not enough data
Functionality
8.4
30
Not enough data
9.0
29
Not enough data
8.5
28
Not enough data
8.9
32
Not enough data
Monitoring
8.1
33
Not enough data
8.8
37
Not enough data
9.4
39
Not enough data
8.9
31
Not enough data
Generative AI
7.7
23
Not enough data
Artificial Intelligence - Firewall
8.4
24
Not enough data
Customer Identity and Access Management (CIAM)Hide 15 FeaturesShow 15 Features
Not enough data
9.3
116
Functionality
Not enough data
9.4
100
|
Verified
Not enough data
9.5
108
|
Verified
Not enough data
9.3
104
|
Verified
Not enough data
9.5
58
Not enough data
9.1
56
Not enough data
9.2
99
|
Verified
AI Authentication Risk Management - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Biometric & Behavioral Analysis - Customer Identity and Access Management (CIAM)
Not enough data
Feature Not Available
Not enough data
Not enough data
AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM)
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
Not enough data
9.2
286
Functionality
Not enough data
9.3
184
Not enough data
9.2
187
Not enough data
9.5
248
Not enough data
9.4
183
Not enough data
9.5
240
Not enough data
9.3
218
Type
Not enough data
9.1
144
Not enough data
9.3
175
Reporting
Not enough data
9.1
159
Not enough data
9.2
157
Not enough data
9.0
46
Not enough data
9.2
46
Authentication & Authorization - Identity and Access Management (IAM)
Not enough data
9.1
49
Administration & Governance - Identity and Access Management (IAM)
Not enough data
9.3
53
Not enough data
9.1
46
Generative AI - Identity and Access Management (IAM)
Not enough data
8.7
46
Not enough data
8.9
46
Not enough data
Feature Not Available
8.9
16
Not enough data
Administration
9.4
12
Not enough data
8.1
12
Not enough data
8.6
12
Not enough data
Enforcement
9.0
12
Not enough data
9.1
13
Not enough data
9.0
13
Not enough data
9.2
12
Not enough data
9.5
13
Not enough data
Visibility
9.1
13
Not enough data
8.1
13
Not enough data
8.3
11
Not enough data
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Non-Human Identity Management (NHIM) SolutionsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Lifecycle & Provisioning - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access, Authentication & Authorization - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility, Governance & Compliance - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
Check Point CloudGuard Network Security
Check Point CloudGuard Network Security
Small-Business(50 or fewer emp.)
26.8%
Mid-Market(51-1000 emp.)
28.1%
Enterprise(> 1000 emp.)
45.1%
Okta
Okta
Small-Business(50 or fewer emp.)
7.6%
Mid-Market(51-1000 emp.)
52.7%
Enterprise(> 1000 emp.)
39.8%
Reviewers' Industry
Check Point CloudGuard Network Security
Check Point CloudGuard Network Security
Computer & Network Security
25.7%
Financial Services
19.1%
Information Technology and Services
18.4%
Accounting
2.6%
Computer Software
2.6%
Other
31.6%
Okta
Okta
Computer Software
18.4%
Information Technology and Services
15.3%
Financial Services
6.2%
Internet
4.5%
Marketing and Advertising
4.1%
Other
51.4%
Alternatives
Check Point CloudGuard Network Security
Check Point CloudGuard Network Security Alternatives
Cisco Duo
Cisco Duo
Add Cisco Duo
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Wiz
Wiz
Add Wiz
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Add Acronis Cyber Protect Cloud
Okta
Okta Alternatives
CyberArk Workforce Identity
CyberArk Workforce Identity
Add CyberArk Workforce Identity
OneLogin
OneLogin
Add OneLogin
JumpCloud
JumpCloud
Add JumpCloud
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
Discussions
Check Point CloudGuard Network Security
Check Point CloudGuard Network Security Discussions
What is CloudGuard Network Security for Gateway Load Balancer used for?
1 Comment
Viral M.
VM
It is used as a web application filter to block unwanted traffic at load balancer end so it will secure end application server from malicious virus.Read more
What is CloudGuard Network Security for Gateway Load Balancer used for?
1 Comment
Dewesh P.
DP
CloudGuard Network Security for Gateway Load Balancer, offered by Check Point Software Technologies, is used to deliver scalable, inline network security in...Read more
How has CloudGuard Network Security supported your cybersecurity efforts, and what features do you rely on most?
1 Comment
Dewesh P.
DP
CloudGuard Network Security by Check Point Software Technologies has significantly strengthened our cloud security posture by providing consistent,...Read more
Okta
Okta Discussions
Is there a way to access your applications on a mobile device?
5 Comments
Erin C.
EC
There is an Okta Mobile app from which you can access your work applications, but it requires a little extra setup and not all organization use it....Read more
How many applications?
2 Comments
Graham P.
GP
Doesn’t it always, though? ;-) Key factors to consider aside from number of applications you’d want to streamline access to via SSO for would be: -How...Read more
Does Okta have a plugin for integration with Spring Boot and Spring Security?
2 Comments
Uday Pratap S.
US
Spring security plugin is available to do user management, take a look at it https://bintray.com/grails/plugins/spring-security-core/viewRead more