
Attribute | Essential | Advanced | CloudGuard |
Focus | |||
Extras | None | None | |
Headcount | Indeterminable (no information for this product alone) | ||
Headcount Distribution | Indeterminable
(no information for this product alone) | ||
Headcount Growth | Indeterminable (no information for this product
alone) | ||
Headquarters | Indeterminable (no information for this product
alone) | ||
Countries | Indeterminable (no information for this product
alone) | ||
Reputation | Same | ||
Followers | Same | Indeterminable
(no information for this product alone) | |
Research firms | None | None | None |
Founded | 2001 | ||
Funding | Bootstrapped | Same | Indeterminable (no information for this product
alone) |
Acquisitions | None | None | Acquired 0 times and made 1 acquisition |
Revenue | Indeterminable (no information for this product
alone) | ||
CVE | 95 CVEs reported to MITRE by Check Point | ||
Compliance | ISO/IEC 27001, ISO/IEC 27017, ISO/IEC 27018, ISO/IEC 27032, ISO/IEC 27701 and SOC 2 Type II | ||
Bug Bounty | No | ||
Visits | Indeterminable (no information for this product
alone) | ||
Authority | Indeterminable (no information for this product
alone) | ||
Vulnerability database | Check
Point –
Discovered and third-party | ||
Content | No information available | ||
Knowledge base | 13 KB
sections, 4 in common and 9 additional | ||
Community | Forum by Check Point | ||
Sync training | 1 workshop | No | |
Async training | 3 product use courses, all free | ||
Distribution | Same | ||
| Marketplaces | AWS, Azure and GCP | ||
Freemium | No | No | No |
Free trial | |||
Demo | |||
Open Demo | No | No | No |
Pricing | |||
Pricing tiers | 1 plan | 1 plan | 1 plan |
Minimum term | |||
Minimum payment period | |||
Minimum capabilities | |||
Minimum scope | 1 author | 1 user | |
Pricing drivers | |||
Minimum monthly payment |
Attribute | Essential | Advanced | CloudGuard |
PTaaS | No | No | |
Reverse engineering | No | No | |
Secure code review | No | No | |
Pivoting | No | No | |
Exploitation | No | No | |
Manual reattacks | Not applicable | Not applicable | |
Zero-day
vulnerabilities | None | Continuous zero-day vulnerability research | Zero-day detection with WAF |
SLA | Availability and support | ||
Min availability | >=99.95% per minute LTM | >=99.9% per month | |
After-sale guarantees | No | Yes | |
Accreditations | |||
Hacker certifications | Not
applicable | None | |
Type of contract | Employee | Same | |
Endpoint control | Not applicable | Total | Not applicable |
Channel control | Not applicable | Total | Not applicable |
Standards | Some requirements from 67 standards,
4 in common and 63 additional | All requirements from the same standards | 7 standards, 4 in common and 3 additional |
Detection method | Automated tools and AI | ||
Remediation | 5, 3 in common and 2 additional | Same, plus 1 | 3, all in common |
Outputs | 5, 1 in common and 4 additional | Same, plus 2 | 6, 1 in common and 5 additional |
Attribute | Essential | Advanced | CloudGuard |
ASPM | No | ||
API | |||
IDE | 5 functionalities, 2 in common and 3
additional | Same, plus 1 functionality | 2 functionalities, all in common |
CLI | |||
CI/CD | |||
Vulnerability sources | 4 sources | No information available | |
Threat model alignment | No | ||
Priority criteria | No information available | ||
Custom prioritization | No | ||
Scanner origin | |||
SCA | 23 package
managers, 8 in common and 15 additional | ||
AI security | No | No | |
Reachability | 12 languages | No | |
Reachability type | Not applicable | ||
SBOM | 22 package managers, 6 in common and 16
additional | 13 package managers, 6 in common and 7 additional | |
Malware detection | Yes | Yes | |
Autofix on components | No | No | No |
Containers | 4 distributions, 2 in common
and 2 additional | 5 distributions, 2 in common and 3
additional | |
Source SAST (languages) | 12,
2 in common and 10 additional | 8, 2 in common and 6 additional | |
Source
SAST (frameworks) | No information available | ||
Custom rules | No | No | |
IaC | 6, 1 in common and 5 additional | 1 in common | |
Binary SAST | 1 type of binary | Same, plus 2 types of binaries | Yes. No information available |
DAST | No | ||
API security testing | No | No | |
IAST | No | No | No |
CSPM | Yes | ||
ASM | No | No | |
Secrets | Same, plus verify other attack vectors and secrets
exploitability | Yes. No information available | |
AI | 3 functions, none in common | ||
MCP | No | ||
Open-source | Not applicable | No | |
Provisioning as Code | No | ||
Deployment | |||
| Regions | |||
Status | |||
Incidents | No information available |
Attribute | Essential | Advanced | CloudGuard |
SCM | 6,
2 in common and 4 additional | 2, all in common | |
Binary repositories | None | None | |
Ticketing | 3, 1 in common and 2 additional | 2, 1 in common and 1 additional | |
ChatOps | None | None | |
IDE | 3,
1 in common and 2 additional | 1 in common | |
CI/CD | 21, 9
in common and 12 additional | 10, 9 in common and 1 additional | |
SCA | |||
Container | |||
SAST | |||
DAST | None | ||
IAST | None | None | None |
Cloud | 3, all in common | 5, 3 in common and 2 additional | |
CSPM | 3 | ||
Secrets | |||
Remediation | None | None | None |
Bug bounty | None | None | None |
Vulnerability management | None | None | |
Compliance | None | None | None |

