Check Point CloudGuard Network Security Features
Management (3)
Dashboards and Reports
Based on 39 Check Point CloudGuard Network Security reviews. Access pre-built and custom reports and dashboards.
Workflow Management
Creates new or streamlines existing workflows to better handle IT support tickets and service. This feature was mentioned in 31 Check Point CloudGuard Network Security reviews.
Administration Console
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks 35 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
Operations (3)
Governance
Based on 34 Check Point CloudGuard Network Security reviews. Allows users to create, edit, and relinquish user access privileges.
Logging and Reporting
As reported in 37 Check Point CloudGuard Network Security reviews. Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
API / Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. This feature was mentioned in 38 Check Point CloudGuard Network Security reviews.
Security Controls (4)
Anomaly Detection
Based on 37 Check Point CloudGuard Network Security reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data Loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. 33 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
Security Auditing
Based on 33 Check Point CloudGuard Network Security reviews. Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. This feature was mentioned in 32 Check Point CloudGuard Network Security reviews.
Network Management (8)
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Network Mapping
Allows visual display of networks segmented components and their connected resources.
Security Analytics
Utilizes behavioral analysis to improve security procedures and documentation.
API/Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Network Mapping
As reported in 23 Check Point CloudGuard Network Security reviews. Provides visual displays network connections, services, and endpoints.
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. 23 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
Reporting
As reported in 20 Check Point CloudGuard Network Security reviews. Documents suspicious activity within a network and provide analysis of potential threats or vulnerabilities.
Console
As reported in 21 Check Point CloudGuard Network Security reviews. Provides a centralized console for administration tasks and unified control.
Security (8)
Security Automation
Allows administrative control over automated security tasks.
Application Security
Protects application access and data. Prompts additional authentication for suspicious users.
Workload Protection
Protects computing resources across a network. Prompts additional authentication for suspicious users.
Data Protection
Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users.
Compliance Monitoring
Monitors data quality and sends alerts based on violations or misuse. This feature was mentioned in 40 Check Point CloudGuard Network Security reviews.
Anomoly Detection
Based on 38 Check Point CloudGuard Network Security reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data Loss Prevention
Based on 36 Check Point CloudGuard Network Security reviews. Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Cloud Gap Analytics
Based on 38 Check Point CloudGuard Network Security reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Identity Management (3)
Adaptive Access Control
Provides a risk-based approcach to determining trust within the network.
Identity Scoring
Calculates risk based on user behavior, permissions, and requests.
User Monitoring
Monitors users attempting unauthorized access to databases, applicaitons, and othe network components.
Network Maintenance (3)
Policy Optimization
Based on 23 Check Point CloudGuard Network Security reviews. Identifies redundent processes and policies, automates changes to reduce unnecessary policy enforcement.
Risk Analysis
As reported in 22 Check Point CloudGuard Network Security reviews. Identifies potential network security risks, vulnerabilities, and compliance impacts.
Auditing
Allows for deep examination into network-connected devices, policies, and protocols. 20 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
Network Monitoring (3)
Network Monitoring
Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point. This feature was mentioned in 19 Check Point CloudGuard Network Security reviews.
Configuration Monitoring
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. 19 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
Change Management
Tools to track and implement required network policy changes. 19 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
Compliance (3)
Governance
Allows users to create, edit, and relinquish user access privileges. This feature was mentioned in 38 Check Point CloudGuard Network Security reviews.
Data Governance
As reported in 37 Check Point CloudGuard Network Security reviews. Ensures user access management, data lineage, and data encryption.
Sensitive Data Compliance
Based on 37 Check Point CloudGuard Network Security reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Administration (13)
Policy Enforcement
Allows administrators to set policies for security and data governance. This feature was mentioned in 41 Check Point CloudGuard Network Security reviews.
Auditing
Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices. 39 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
Workflow Management
Creates new or streamlines existing workflows to better handle IT support tickets and service. This feature was mentioned in 36 Check Point CloudGuard Network Security reviews.
Auditing
Documents access and alterations of the database for analytics and reporting. This feature was mentioned in 46 Check Point CloudGuard Network Security reviews.
Data Discovery
Based on 46 Check Point CloudGuard Network Security reviews. Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems.
Access Control
As reported in 47 Check Point CloudGuard Network Security reviews. Supports LDAP Protocol to enable access control and governance.
Policy Management
As reported in 28 Check Point CloudGuard Network Security reviews. Provides network security features to customize network access rules, workflows, and compliance requirements.
Logging and Reporting
As reported in 27 Check Point CloudGuard Network Security reviews. Captures logs for all firewall functions, storing information, incidents, and activity for user reference and analysis.
Application Gateway
As reported in 30 Check Point CloudGuard Network Security reviews. Application-level proxy that applies security mechanisms to connect clients to applications while concealing client network and computers.
Concurrent Sessions
Determines the number of connections a firewall is able to track and facilitate securely. 29 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
Policy Enforcement
Allows administrators to set policies for security and governance. This feature was mentioned in 12 Check Point CloudGuard Network Security reviews.
Dependency Mapping
Based on 12 Check Point CloudGuard Network Security reviews. Facilitates the discovery, allocation, and mapping of application dependencies across servers, networks, and cloud environments.
Network Mapping
Allows visual display of networks segmented components and their connected resources. This feature was mentioned in 12 Check Point CloudGuard Network Security reviews.
Data Protection (5)
Data Masking
Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties. This feature was mentioned in 42 Check Point CloudGuard Network Security reviews.
Data Encryption/Security
Manages policies for user data access and data encryption. 43 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
Data loss Prevention
Based on 42 Check Point CloudGuard Network Security reviews. Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Anomoly Detection
As reported in 42 Check Point CloudGuard Network Security reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. This feature was mentioned in 43 Check Point CloudGuard Network Security reviews.
Analysis (3)
Cloud Gap Analytics
As reported in 43 Check Point CloudGuard Network Security reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
As reported in 43 Check Point CloudGuard Network Security reviews. Monitors data quality and send alerts based on violations or misuse.
User Analytics
Allows for reporting and documentation of individual user behavior and privileges. 43 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
Monitoring (4)
Load Balancing
As reported in 28 Check Point CloudGuard Network Security reviews. Monitors traffic and distribute resources and scales infrastructure workloads to match traffic.
Continuous Analysis
Based on 28 Check Point CloudGuard Network Security reviews. Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Intrusion Prevention
Enforces security paramaters to prevent unauthorized access. 27 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
Intrusion Detection
Detects unauthorized access and use of privileged systems. This feature was mentioned in 26 Check Point CloudGuard Network Security reviews.
Functionality (4)
Virtual Private Network (VPN)
Provides a virtualized network for client network to mask identity, location, and other sensitive information. 27 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
Antivirus
Based on 25 Check Point CloudGuard Network Security reviews. Provides malware protection capabilities in addition to traditional firewall barrier technology.
URL Filtering
As reported in 25 Check Point CloudGuard Network Security reviews. Provides access control tools to categorize and block traffic and match traffic to firewall policies.
Availability
Deploys firewall(s) configured in sync to prevent network failure and provide business continuity. 28 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
Enforcement (5)
Identity-Based Policy Management
Accelerates policy change workflows using identity attributes to manage microsegmentation policies. This feature was mentioned in 12 Check Point CloudGuard Network Security reviews.
Workflow Automation
Completely automates end-to-end policy enforcement workflows across hybrid- and multi-cloud environments. 13 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
Network Segmentation
As reported in 13 Check Point CloudGuard Network Security reviews. Allows administrative control over network components, mapping, and segmentation.
Intelligent Segmentation
Automates segmentation and provides AI-based improvement suggestions. This feature was mentioned in 12 Check Point CloudGuard Network Security reviews.
Workload Protection
Based on 13 Check Point CloudGuard Network Security reviews. Protects computing resources across a network. Prompts additional authentication for suspicious users.
Visibility (3)
Breach Detection
Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks. 13 reviewers of Check Point CloudGuard Network Security have provided feedback on this feature.
Observability
Generate insights across IT systems utilizing event metrics, logging, traces, and metadata. This feature was mentioned in 13 Check Point CloudGuard Network Security reviews.
Application Discovery
Based on 11 Check Point CloudGuard Network Security reviews. Detect new assets and applications as they enter a cloud environments and networks to add to asset inventory.
Generative AI (3)
AI Text Summarization
Based on 20 Check Point CloudGuard Network Security reviews. Condenses long documents or text into a brief summary.
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Generation
Allows users to generate text based on a text prompt.
Artificial Intelligence - Firewall (1)
AI Firewall
Based on 19 Check Point CloudGuard Network Security reviews. Utilizes AI to monitor network traffic, identify anomalies, and block attacks.
Agentic AI - Firewall Software (2)
Autonomous Task Execution
Based on 17 Check Point CloudGuard Network Security reviews. Capability to perform complex tasks without constant human input
Adaptive Learning
Based on 17 Check Point CloudGuard Network Security reviews. Improves performance based on feedback and experience
Agentic AI - AWS Marketplace (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases





