Introducing G2.ai, the future of software buying.Try now

Compare Check Point Security Compliance and Cortex Cloud

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Check Point Security Compliance
Check Point Security Compliance
Star Rating
(11)4.7 out of 5
Market Segments
Enterprise (80.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Check Point Security Compliance
Cortex Cloud
Cortex Cloud
Star Rating
(111)4.1 out of 5
Market Segments
Enterprise (38.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Cortex Cloud
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Prisma Cloud excels in Policy Enforcement with a score of 8.7, indicating a robust ability to enforce security policies across cloud environments. In contrast, Check Point Security Compliance also performs well in this area with a score of 9.0, but users mention that its auditing capabilities are particularly strong, scoring 9.7.
  • Reviewers mention that Prisma Cloud's Compliance Monitoring is rated at 8.8, which is impressive, but Check Point Security Compliance outshines it with a score of 9.7, highlighting its superior ability to ensure compliance across various regulations.
  • G2 users indicate that while both products offer Data Loss Prevention, Prisma Cloud scores 8.6, which is commendable, users report that Check Point Security Compliance's score of 9.0 reflects a more comprehensive approach to protecting sensitive data.
  • Users on G2 highlight that Prisma Cloud's Cloud Gap Analytics feature is rated at 8.6, providing valuable insights into security gaps, whereas Check Point Security Compliance's score of 8.0 suggests it may not be as effective in this specific area.
  • Reviewers say that Prisma Cloud's Unified Visibility is rated at 7.4, which some users find lacking compared to Check Point Security Compliance, which offers a more integrated view of security across networks, contributing to its higher overall ratings.
  • Users report that the Ease of Use for Prisma Cloud is rated at 7.7, which some find challenging, while Check Point Security Compliance scores 8.3, indicating a more user-friendly interface that simplifies security management tasks.
Pricing
Entry-Level Pricing
Check Point Security Compliance
No pricing available
Cortex Cloud
No pricing available
Free Trial
Check Point Security Compliance
No trial information available
Cortex Cloud
Free Trial is available
Ratings
Meets Requirements
9.7
6
8.3
98
Ease of Use
8.3
6
7.7
100
Ease of Setup
Not enough data
7.6
89
Ease of Admin
Not enough data
7.9
52
Quality of Support
8.3
5
7.9
94
Has the product been a good partner in doing business?
Not enough data
8.0
48
Product Direction (% positive)
8.1
6
8.8
95
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
Not enough data
8.7
10
Management
Not enough data
7.9
7
Not enough data
8.3
7
Not enough data
8.1
7
Operations
Not enough data
8.6
7
Not enough data
8.8
7
Not enough data
9.4
6
Security Controls
Not enough data
8.9
6
Not enough data
8.5
8
Not enough data
9.0
7
Not enough data
9.2
6
Not enough data
8.0
16
Administration
Not enough data
8.1
14
Not enough data
7.7
14
Not enough data
8.3
14
Not enough data
8.1
14
Monitoring
Not enough data
8.1
14
Not enough data
8.1
14
Not enough data
7.9
14
Protection
Not enough data
7.9
14
Not enough data
8.3
14
Not enough data
7.7
14
Not enough data
7.7
14
9.7
5
8.4
39
Security
9.7
5
8.5
37
Not enough data
8.2
36
Not enough data
8.0
34
Not enough data
8.1
36
Compliance
Not enough data
8.5
37
Not enough data
8.3
36
9.7
5
8.3
36
Administration
Not enough data
8.7
36
9.7
5
8.6
35
Not enough data
8.5
36
Not enough data
8.7
41
Data Protection
Not enough data
8.8
36
Not enough data
9.0
39
Not enough data
8.9
37
Not enough data
8.8
38
Not enough data
9.0
36
Analysis
Not enough data
8.8
39
Not enough data
8.9
38
Not enough data
8.6
38
Administration
Not enough data
8.3
39
Not enough data
8.4
37
Not enough data
8.2
37
Software Composition AnalysisHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Functionality - Software Composition Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Effectiveness - Software Composition Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk-Based Vulnerability ManagementHide 11 FeaturesShow 11 Features
Not enough data
7.8
6
Risk Analysis
Not enough data
8.3
5
Not enough data
7.8
6
Not enough data
8.1
6
Vulnerability Assesment
Not enough data
8.3
5
Not enough data
7.5
6
Not enough data
8.0
5
Not enough data
7.0
5
Automation
Not enough data
7.3
5
Not enough data
7.0
5
Not enough data
8.3
5
Not enough data
8.3
5
Not enough data
7.7
8
API Management
Not enough data
8.3
8
Not enough data
7.7
8
Not enough data
7.9
8
Not enough data
6.7
8
Security Testing
Not enough data
7.9
8
Not enough data
7.7
8
Not enough data
6.3
5
Security Management
Not enough data
8.1
7
Not enough data
7.6
7
Not enough data
8.3
7
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
Not enough data
7.7
24
Configuration
Not enough data
7.7
20
Not enough data
7.6
21
Not enough data
7.7
21
Not enough data
7.8
18
Not enough data
7.1
20
Visibility
Not enough data
8.2
22
Not enough data
7.5
21
Vulnerability Management
Not enough data
7.8
18
Not enough data
7.9
21
Not enough data
8.0
19
Not enough data
7.8
21
Cloud Infrastructure Entitlement Management (CIEM)Hide 8 FeaturesShow 8 Features
Not enough data
8.5
10
Access control - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
8.7
9
Not enough data
8.5
10
Not enough data
8.7
10
Not enough data
8.1
8
Monitoring - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
9.0
10
Not enough data
7.8
10
Auditing - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
8.7
10
Not enough data
8.3
10
Not enough data
7.3
6
AI Compliance
Not enough data
7.5
6
Not enough data
6.7
6
Not enough data
8.1
6
Risk Management & Monitoring
Not enough data
6.4
6
Not enough data
7.8
6
AI Lifecycle Management
Not enough data
7.2
6
Access Control and Security
Not enough data
7.2
6
Collaboration and Communication
Not enough data
7.5
6
Agentic AI - AI Governance Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Security - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Data Security Posture Management (DSPM)Hide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Discovery & Classification - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Prioritization - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation & Governance - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI - Security Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Detection and Response (CDR)Hide 4 FeaturesShow 4 Features
Not enough data
7.7
9
Agentic AI - Cloud Detection and Response (CDR)
Not enough data
7.8
9
Not enough data
7.0
9
Not enough data
8.3
8
Services - Cloud Detection and Response (CDR)
Not enough data
7.5
8
Reviews
Reviewers' Company Size
Check Point Security Compliance
Check Point Security Compliance
Small-Business(50 or fewer emp.)
0%
Mid-Market(51-1000 emp.)
20.0%
Enterprise(> 1000 emp.)
80.0%
Cortex Cloud
Cortex Cloud
Small-Business(50 or fewer emp.)
30.3%
Mid-Market(51-1000 emp.)
31.2%
Enterprise(> 1000 emp.)
38.5%
Reviewers' Industry
Check Point Security Compliance
Check Point Security Compliance
Information Technology and Services
30.0%
Design
20.0%
Telecommunications
10.0%
Marketing and Advertising
10.0%
Gambling & Casinos
10.0%
Other
20.0%
Cortex Cloud
Cortex Cloud
Information Technology and Services
17.4%
Computer & Network Security
11.0%
Computer Software
9.2%
Consulting
7.3%
Information Services
4.6%
Other
50.5%
Alternatives
Check Point Security Compliance
Check Point Security Compliance Alternatives
Wiz
Wiz
Add Wiz
Vanta
Vanta
Add Vanta
Sprinto
Sprinto
Add Sprinto
Drata
Drata
Add Drata
Cortex Cloud
Cortex Cloud Alternatives
Wiz
Wiz
Add Wiz
Orca Security
Orca Security
Add Orca Security
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Add Microsoft Defender for Cloud
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Discussions
Check Point Security Compliance
Check Point Security Compliance Discussions
Monty the Mongoose crying
Check Point Security Compliance has no discussions with answers
Cortex Cloud
Cortex Cloud Discussions
Monty the Mongoose crying
Cortex Cloud has no discussions with answers