Check Point CloudGuard Network Security Features
Management (3)
Dashboards and Reports
Access pre-built and custom reports and dashboards.
Workflow Management
Creates new or streamlines existing workflows to better handle IT support tickets and service.
Administration Console
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks
Operations (3)
Governance
Allows users to create, edit, and relinquish user access privileges.
Logging and Reporting
Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
API / Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Security Controls (4)
Anomaly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data Loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Security Auditing
Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Network Management (8)
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Network Mapping
Allows visual display of networks segmented components and their connected resources.
Security Analytics
Utilizes behavioral analysis to improve security procedures and documentation.
API/Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Network Mapping
Provides visual displays network connections, services, and endpoints.
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Reporting
Documents suspicious activity within a network and provide analysis of potential threats or vulnerabilities.
Console
Provides a centralized console for administration tasks and unified control.
Security (8)
Security Automation
Allows administrative control over automated security tasks.
Application Security
Protects application access and data. Prompts additional authentication for suspicious users.
Workload Protection
Protects computing resources across a network. Prompts additional authentication for suspicious users.
Data Protection
Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users.
Compliance Monitoring
Monitors data quality and sends alerts based on violations or misuse.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data Loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Identity Management (3)
Adaptive Access Control
Provides a risk-based approcach to determining trust within the network.
Identity Scoring
Calculates risk based on user behavior, permissions, and requests.
User Monitoring
Monitors users attempting unauthorized access to databases, applicaitons, and othe network components.
Network Maintenance (3)
Policy Optimization
Identifies redundent processes and policies, automates changes to reduce unnecessary policy enforcement.
Risk Analysis
Identifies potential network security risks, vulnerabilities, and compliance impacts.
Auditing
Allows for deep examination into network-connected devices, policies, and protocols.
Network Monitoring (3)
Network Monitoring
Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Configuration Monitoring
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Change Management
Tools to track and implement required network policy changes.
Compliance (3)
Governance
Allows users to create, edit, and relinquish user access privileges.
Data Governance
Ensures user access management, data lineage, and data encryption.
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Administration (13)
Policy Enforcement
Allows administrators to set policies for security and data governance.
Auditing
Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.
Workflow Management
Creates new or streamlines existing workflows to better handle IT support tickets and service.
Auditing
Documents access and alterations of the database for analytics and reporting.
Data Discovery
Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems.
Access Control
Supports LDAP Protocol to enable access control and governance.
Policy Management
Provides network security features to customize network access rules, workflows, and compliance requirements.
Logging and Reporting
Captures logs for all firewall functions, storing information, incidents, and activity for user reference and analysis.
Application Gateway
Application-level proxy that applies security mechanisms to connect clients to applications while concealing client network and computers.
Concurrent Sessions
Determines the number of connections a firewall is able to track and facilitate securely.
Policy Enforcement
Allows administrators to set policies for security and governance.
Dependency Mapping
Facilitates the discovery, allocation, and mapping of application dependencies across servers, networks, and cloud environments.
Network Mapping
Allows visual display of networks segmented components and their connected resources.
Data Protection (5)
Data Masking
Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.
Data Encryption/Security
Manages policies for user data access and data encryption.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Analysis (3)
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
User Analytics
Allows for reporting and documentation of individual user behavior and privileges.
Monitoring (4)
Load Balancing
Monitors traffic and distribute resources and scales infrastructure workloads to match traffic.
Continuous Analysis
Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Intrusion Prevention
Enforces security paramaters to prevent unauthorized access.
Intrusion Detection
Detects unauthorized access and use of privileged systems.
Functionality (4)
Virtual Private Network (VPN)
Provides a virtualized network for client network to mask identity, location, and other sensitive information.
Antivirus
Provides malware protection capabilities in addition to traditional firewall barrier technology.
URL Filtering
Provides access control tools to categorize and block traffic and match traffic to firewall policies.
Availability
Deploys firewall(s) configured in sync to prevent network failure and provide business continuity.
Enforcement (5)
Identity-Based Policy Management
Accelerates policy change workflows using identity attributes to manage microsegmentation policies.
Workflow Automation
Completely automates end-to-end policy enforcement workflows across hybrid- and multi-cloud environments.
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Intelligent Segmentation
Automates segmentation and provides AI-based improvement suggestions.
Workload Protection
Protects computing resources across a network. Prompts additional authentication for suspicious users.
Visibility (3)
Breach Detection
Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks.
Observability
Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.
Application Discovery
Detect new assets and applications as they enter a cloud environments and networks to add to asset inventory.
Generative AI (3)
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Generation
Allows users to generate text based on a text prompt.
Artificial Intelligence - Firewall (1)
AI Firewall
Utilizes AI to monitor network traffic, identify anomalies, and block attacks.
Agentic AI - Firewall Software (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Adaptive Learning
Improves performance based on feedback and experience
Agentic AI - AWS Marketplace (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases





