Check Point ThreatCloud vs. Cisco TrustSec

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Check Point ThreatCloud
Score 8.9 out of 10
N/A
Check Point Software Technologies provides threat intelligence via the Check Point ThreatCloud.N/A
Cisco TrustSec
Score 7.2 out of 10
N/A
N/AN/A
Pricing
Check Point ThreatCloudCisco TrustSec
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Check Point ThreatCloudCisco TrustSec
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Check Point ThreatCloudCisco TrustSec
Best Alternatives
Check Point ThreatCloudCisco TrustSec
Small Businesses
OpenText Core Endpoint Protection
OpenText Core Endpoint Protection
Score 7.9 out of 10
Armor
Armor
Score 6.0 out of 10
Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Druva Security Cloud
Druva Security Cloud
Score 9.4 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Druva Security Cloud
Druva Security Cloud
Score 9.4 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Check Point ThreatCloudCisco TrustSec
Likelihood to Recommend
8.6
(2 ratings)
9.0
(1 ratings)
User Testimonials
Check Point ThreatCloudCisco TrustSec
Likelihood to Recommend
Check Point Software Technologies
If you have the Check Point environment and want to utilize the Checkpoint environment, you should use the [Check Point] ThreatCloud. Without [Check Point] ThreatCloud, there’s no way to stop the 0days or APTs. However, [Check Point] ThreatCloud relies on the Checkpoint infrastructure to be used and integrated. If you have other firewall and/or endpoint vendors, [Check Point] ThreatCloud is not the best service to be used. Checkpoint also offers 24x7 threat cloud-managed security services to [...] organizations. Threat cloud-managed security services leverage the threat cloud decreasing the detection time and false-positive rates via increasing protection rates.
Read full review
Cisco
  • Control access to critical enterprise resources by business role, device type, and location, so policy changes can be made without redesigning the network.
  • Easily manage access control and segmentation while maintaining compliance.
  • Create and manage policies in an easy-to-use matrix.
  • Reduce the need for costly network re-architecture by automating firewall rules and access control list (ACL) administration.
Read full review
Pros
Check Point Software Technologies
  • anti virus
  • anti bot
Read full review
Cisco
  • Reduce operational expenses by simplifying network segmentation and defining security groups based on business roles, not IP addresses.
  • Limit the impact of a data breach by quickly isolating and containing threats using technology already in your network.
Read full review
Cons
Check Point Software Technologies
  • SOAR integration, Checkpoint does not have built in SOAR
  • Automation throughout the findings of [Check Point] ThreatCloud
  • Special team for threat intelligence
  • K8s threat cloud integration and K8S forensics
  • Native SIEM integration
Read full review
Cisco
  • Help and solutions if needed, support
Read full review
Alternatives Considered
Check Point Software Technologies
As Checkpoint next generation firewalls were already implemented in the network, ThreatCloud was easy to implement and had better features and reputation than competitors
Read full review
Cisco
No answers on this topic
Return on Investment
Check Point Software Technologies
  • High score rates [are] seen on breach systems after deploying systems integrated with [Check Point] ThreatCloud
  • Catch rates are very high compared to other vendors
  • One missing thing is the detection for localized URLs and IPs
  • Purchasing within the 3-year perspective is cheap compared to other solutions; ROI is generally six months
  • [Check Point] ThreatCloud eliminates the need [for] other additional services that may need to be deployed like dedicated IPS, Dedicated Sandbox, DNS solution, etc.
Read full review
Cisco
  • Reduction in IT operational costs
Read full review
ScreenShots