Check Point CloudGuard Posture Management vs. Microsoft Defender for Cloud Apps

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Check Point CloudGuard Posture Management
Score 6.4 out of 10
N/A
CloudGuard Posture Management provides cloud security and compliance posture management for cloud-native environments, including AWS, Azure, Google Cloud, and Kubernetes. CloudGuard automates security, governance and compliance, with customized policies, delivering high-fidelity visibility and control. It is based on technology acquired with Dome9 by Check Point Software Technologies in late 2018. Their product CloudGuard Dome9 was a cloud security and cloud security operations visualization…N/A
Microsoft Defender for Cloud Apps
Score 8.6 out of 10
N/A
Microsoft Defender for Cloud Apps (formerly Microsoft Cloud App Security) is a multimode cloud access security broker.N/A
Pricing
Check Point CloudGuard Posture ManagementMicrosoft Defender for Cloud Apps
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Check Point CloudGuard Posture ManagementMicrosoft Defender for Cloud Apps
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Check Point CloudGuard Posture ManagementMicrosoft Defender for Cloud Apps
Top Pros
Top Cons
Best Alternatives
Check Point CloudGuard Posture ManagementMicrosoft Defender for Cloud Apps
Small Businesses
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Score 8.2 out of 10

No answers on this topic

Medium-sized Companies
Druva Data Resiliency Cloud
Druva Data Resiliency Cloud
Score 9.6 out of 10
Avanan
Avanan
Score 8.7 out of 10
Enterprises
Druva Data Resiliency Cloud
Druva Data Resiliency Cloud
Score 9.6 out of 10
Avanan
Avanan
Score 8.7 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Check Point CloudGuard Posture ManagementMicrosoft Defender for Cloud Apps
Likelihood to Recommend
8.0
(5 ratings)
7.5
(10 ratings)
Usability
8.0
(1 ratings)
-
(0 ratings)
Support Rating
8.2
(4 ratings)
5.0
(1 ratings)
User Testimonials
Check Point CloudGuard Posture ManagementMicrosoft Defender for Cloud Apps
Likelihood to Recommend
Check Point Software Technologies
Scenarios most suited - 1) All the Cyber Security focused development environments 2) Definitely a must for Financial Clients since it deals with live money transactions - Hence it is imperative to keep the Network and tech asset environment secure, and compliant to standards 3) IAM is another area where it plays an IMP part - For eg one of our healthcare clients where they wanted to restrict access 4) Dashboards are also great, we can share the results to GISO/CISO level folks - Custom dashboard feature
Read full review
Microsoft
It is well suited if your team is working with Microsoft tools and Azure services. but if you are using other cloud service providers and don't want to spend efforts in learning integration with third-party software then this is not a great fit for you. overall we are very satisfied with the product. If your corporation with Microsoft tools then I would recommend it.
Read full review
Pros
Check Point Software Technologies
  • Integration with public cloud providers.
  • Rich UI with great dashboards.
  • Great assets inventory.
  • Clarity module.
Read full review
Microsoft
  • Detect threats based on user activity logs.
  • Set manual and automatic alert remediation.
  • Implement activity policies.
  • Detect threats based on user activity logs.
Read full review
Cons
Check Point Software Technologies
  • There is not a comprehensive amount of documentation on how to set up best practices.
  • Our initial set up assistance from Proofpoint approved vendor did not go smoothly.
  • The ability to add more customized widgets in the main overview screen would be helpful.
Read full review
Microsoft
  • In the event of Cloud traffic it is not easy to monitor and identify attacks.
  • Difficult to protect unmatched Cloud devices.
Read full review
Usability
Check Point Software Technologies
Is easy to use, and the standad configuration is well prepared.
Read full review
Microsoft
No answers on this topic
Support Rating
Check Point Software Technologies
I haven't dealt so much with support but we are enjoying the tool!
Read full review
Microsoft
I have not utilized actual support but the Sales and Product teams have been super helpful in moving our implementation forward and showing us the best practices.
Read full review
Alternatives Considered
Check Point Software Technologies
First and foremost reason of our client selecting CheckPoint CloudGuard Posture Management / Dome9 was because they already had CheckPoint Firewalls which are in active use e.g. R75.40 and R82.x products. Customization Vs these other Vendors is another great asset Reporting is one more standout feature, + Multi-cloud capabilities Centralized dashboarding is smooth to navigate as compared to other Vendors Syslog handling is much better as compared to some other vendors , Memory and space issues if planned well are less
Read full review
Microsoft
Microsoft Defender for Cloud Apps was chosen primarily due to its ability to work perfectly within our mostly M365 environment. Given that this was an added feature of our E5 license, we chose to dive into it and use it due to it's good visibility into user actions and the ability to tie all M365 actions together into one place. We did not see similar visibility with other tools that we vetted
Read full review
Return on Investment
Check Point Software Technologies
  • For production environments it is worth the investment.
  • Getting to know how many assets you have helps with cost savings.
Read full review
Microsoft
  • Cloud App Security saves us thousands of dollars finding and rectifying apps security issues
  • Identity Security Posture helps the organization identity stay in shape, saving thousands of dollars on security consultations
  • The cost of suffering a breach cannot be quantified, CAS helps minimize the chances of the attackers succeeding, with excellent historical logging for most operations
Read full review
ScreenShots