Introducing G2.ai, the future of software buying.Try now

Compare Check Point CloudGuard Network Security and Orca Security

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Check Point CloudGuard Network Security
Check Point CloudGuard Network Security
Star Rating
(153)4.5 out of 5
Market Segments
Enterprise (49.6% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Check Point CloudGuard Network Security
Orca Security
Orca Security
Star Rating
(223)4.6 out of 5
Market Segments
Mid-Market (50.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us
Learn more about Orca Security
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Check Point CloudGuard Network Security excels in Network Segmentation with a score of 9.7, which reviewers mention provides robust isolation of workloads, enhancing security across the network. In contrast, Orca Security's score of 7.7 in this area indicates it may not offer the same level of segmentation capabilities.
  • Reviewers mention that Orca Security shines in Ease of Setup with a score of 9.3, making it user-friendly for new adopters. Users on G2 highlight that the straightforward installation process significantly reduces the time to deployment compared to Check Point CloudGuard, which scored 8.8.
  • G2 users note that Check Point CloudGuard Network Security has a superior Quality of Support rating of 9.0, with many reviewers praising the responsiveness and expertise of the support team. Orca Security, while still strong at 9.2, does not match the level of satisfaction reported by users of Check Point.
  • Users say that Check Point's Policy Management features, scoring 9.0, are comprehensive and allow for detailed customization, which is essential for enterprise environments. In contrast, Orca Security's score of 8.3 suggests that its policy management may not be as flexible or detailed, leading to potential limitations in complex scenarios.
  • Reviewers mention that Orca Security's Compliance Monitoring capabilities are rated at 8.9, which users find effective for maintaining regulatory standards. However, Check Point's score of 8.6 indicates it may not provide the same level of compliance assurance, which could be a deciding factor for businesses in heavily regulated industries.
  • Users report that Check Point CloudGuard's Auditing features, with a score of 8.8, are robust and provide detailed insights into security events, which is crucial for incident response. Orca Security's score of 8.6 suggests it may not offer the same depth of auditing capabilities, potentially impacting users' ability to track and respond to security incidents effectively.
Pricing
Entry-Level Pricing
Check Point CloudGuard Network Security
No pricing available
Orca Security
By Compute Asset
Contact Us
Learn more about Orca Security
Free Trial
Check Point CloudGuard Network Security
Free Trial is available
Orca Security
Free Trial is available
Ratings
Meets Requirements
9.1
109
9.1
190
Ease of Use
8.8
112
9.0
195
Ease of Setup
8.7
99
9.3
171
Ease of Admin
8.8
65
9.0
151
Quality of Support
9.0
108
9.2
185
Has the product been a good partner in doing business?
8.8
63
9.4
150
Product Direction (% positive)
9.0
106
9.8
179
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
8.8
45
8.5
61
Management
9.2
39
8.5
56
9.0
31
8.0
51
8.9
35
9.0
54
Operations
8.6
34
8.5
51
9.0
37
8.5
55
8.7
38
8.7
55
Security Controls
9.0
37
8.7
56
8.0
33
7.7
53
8.7
33
8.9
59
8.4
32
8.7
57
Not enough data
8.2
60
Administration
Not enough data
8.6
59
Not enough data
8.0
51
Not enough data
8.9
58
Not enough data
8.6
56
Monitoring
Not enough data
8.4
50
Not enough data
7.8
48
Not enough data
8.5
52
Protection
Not enough data
8.1
52
Not enough data
7.5
48
Not enough data
7.8
51
Not enough data
7.7
47
8.6
8
Not enough data
Network Management
9.8
8
Not enough data
8.8
8
Not enough data
8.1
8
Not enough data
8.3
8
Not enough data
Security
9.4
8
Not enough data
9.0
8
Not enough data
9.6
8
Not enough data
9.0
8
Not enough data
Identity Management
8.8
8
Not enough data
8.5
8
Not enough data
9.0
8
Not enough data
Generative AI
7.1
7
Not enough data
6.2
7
Not enough data
Network Security Policy Management (NSPM)Hide 10 FeaturesShow 10 Features
8.8
23
Not enough data
Network Maintenance
9.0
23
Not enough data
8.9
22
Not enough data
9.0
20
Not enough data
Network Management
9.3
23
Not enough data
8.9
23
Not enough data
8.7
20
Not enough data
9.0
21
Not enough data
Network Monitoring
9.4
19
Not enough data
8.8
19
Not enough data
7.8
19
Not enough data
8.7
48
8.4
118
Security
8.7
40
8.9
114
8.7
38
8.0
110
8.7
36
7.7
101
8.4
38
8.5
108
Compliance
8.6
38
8.8
106
8.5
37
8.3
100
8.8
37
8.5
105
Administration
8.9
41
8.3
105
8.8
39
8.6
109
8.6
36
7.9
102
8.4
60
Not enough data
Data Protection
8.3
42
Not enough data
8.7
43
Not enough data
8.4
42
Not enough data
8.6
42
Not enough data
8.4
43
Not enough data
Analysis
8.2
43
Not enough data
8.4
43
Not enough data
8.3
43
Not enough data
Administration
8.2
46
Not enough data
8.1
46
Not enough data
8.7
47
Not enough data
8.6
33
Not enough data
Administration
9.2
28
Not enough data
9.0
27
Not enough data
8.3
30
Not enough data
8.9
29
Not enough data
Agentic AI - Firewall Software
8.1
17
Not enough data
8.2
17
Not enough data
Functionality
8.4
27
Not enough data
9.0
25
Not enough data
8.5
25
Not enough data
9.0
28
Not enough data
Monitoring
8.2
28
Not enough data
8.8
28
Not enough data
9.4
27
Not enough data
9.1
26
Not enough data
Generative AI
7.7
20
Not enough data
Artificial Intelligence - Firewall
8.3
19
Not enough data
Not enough data
7.9
122
Performance
Not enough data
8.6
109
Not enough data
8.8
116
Not enough data
7.5
117
Not enough data
9.2
119
Network
Not enough data
8.5
111
Not enough data
8.6
106
Not enough data
8.8
111
Application
Not enough data
6.2
87
Not enough data
6.5
84
Not enough data
6.3
83
Agentic AI - Vulnerability Scanner
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.1
33
API Management
Not enough data
8.6
33
Not enough data
8.5
31
Not enough data
8.4
33
Not enough data
8.1
30
Security Testing
Not enough data
8.8
30
Not enough data
7.9
29
Not enough data
7.5
29
Security Management
Not enough data
8.5
29
Not enough data
8.2
31
Not enough data
6.0
29
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
Not enough data
8.5
98
Configuration
Not enough data
6.8
81
Not enough data
8.5
92
Not enough data
8.1
81
Not enough data
7.6
83
Not enough data
8.4
87
Visibility
Not enough data
9.1
92
Not enough data
9.3
94
Vulnerability Management
Not enough data
8.3
89
Not enough data
9.1
96
Not enough data
8.9
94
Not enough data
8.9
95
8.9
16
Not enough data
Administration
9.4
12
Not enough data
8.1
12
Not enough data
8.6
12
Not enough data
Enforcement
9.0
12
Not enough data
9.1
13
Not enough data
9.0
13
Not enough data
9.2
12
Not enough data
9.5
13
Not enough data
Visibility
9.1
13
Not enough data
8.1
13
Not enough data
8.3
11
Not enough data
Cloud Infrastructure Entitlement Management (CIEM)Hide 8 FeaturesShow 8 Features
Not enough data
8.4
31
Access control - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
8.9
31
Not enough data
8.4
30
Not enough data
8.3
30
Not enough data
7.6
30
Monitoring - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
8.4
31
Not enough data
7.5
30
Auditing - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
9.2
31
Not enough data
8.8
31
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Security - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Detection and Response (CDR)Hide 4 FeaturesShow 4 Features
Not enough data
Not enough data
Agentic AI - Cloud Detection and Response (CDR)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Cloud Detection and Response (CDR)
Not enough data
Not enough data
Categories
Categories
Shared Categories
Check Point CloudGuard Network Security
Check Point CloudGuard Network Security
Orca Security
Orca Security
Check Point CloudGuard Network Security and Orca Security are categorized as Cloud Compliance and Cloud Workload Protection Platforms
Reviews
Reviewers' Company Size
Check Point CloudGuard Network Security
Check Point CloudGuard Network Security
Small-Business(50 or fewer emp.)
22.2%
Mid-Market(51-1000 emp.)
28.1%
Enterprise(> 1000 emp.)
49.6%
Orca Security
Orca Security
Small-Business(50 or fewer emp.)
11.7%
Mid-Market(51-1000 emp.)
50.5%
Enterprise(> 1000 emp.)
37.8%
Reviewers' Industry
Check Point CloudGuard Network Security
Check Point CloudGuard Network Security
Computer & Network Security
23.0%
Financial Services
21.5%
Information Technology and Services
20.7%
Computer Software
3.0%
Telecommunications
2.2%
Other
29.6%
Orca Security
Orca Security
Computer Software
14.9%
Information Technology and Services
13.1%
Financial Services
9.5%
Computer & Network Security
6.8%
Hospital & Health Care
5.4%
Other
50.5%
Alternatives
Check Point CloudGuard Network Security
Check Point CloudGuard Network Security Alternatives
Cisco Duo
Cisco Duo
Add Cisco Duo
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Wiz
Wiz
Add Wiz
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Add Acronis Cyber Protect Cloud
Orca Security
Orca Security Alternatives
Wiz
Wiz
Add Wiz
Cortex Cloud
Cortex Cloud
Add Cortex Cloud
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Add Microsoft Defender for Cloud
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Discussions
Check Point CloudGuard Network Security
Check Point CloudGuard Network Security Discussions
What is CloudGuard Network Security for Gateway Load Balancer used for?
1 Comment
Viral M.
VM
It is used as a web application filter to block unwanted traffic at load balancer end so it will secure end application server from malicious virus.Read more
Monty the Mongoose crying
Check Point CloudGuard Network Security has no more discussions with answers
Orca Security
Orca Security Discussions
What is ORCA platform?
1 Comment
Yevhen R.
YR
SIEM tool for hunting threats, outdated oackages, overpowerful permissions, expired certificates. Mainly for AWS servicesRead more
What does Orca Security do?
1 Comment
Official Response from Orca Security
Orca Security is a leader in CNAPP innovation (Cloud Native Application Protection Platform) for workload and data protection, cloud security posture...Read more
How much does Orca security cost?
1 Comment
MS
$6500 per 50 workloads per yearRead more