Show rating breakdown
Save to My Lists
Claimed
Claimed

4 ThreatCloud IntelliStore Reviews

4.8 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
4 ThreatCloud IntelliStore Reviews
4.8 out of 5
4 ThreatCloud IntelliStore Reviews
4.8 out of 5

ThreatCloud IntelliStore Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
This product has not yet received any negative sentiments.
G2 reviews are authentic and verified.
Ankit  A.
AA
Security Engineer
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about ThreatCloud IntelliStore?

First of all threatCloud Intellistore is very user friendly, the GUI is designed so accurately where anyone can get through it without any help. So basically checkpoint is already a well known for it's network security platform, it's the oldest OEM amongst various known OEMs. In threatcloud Intellistore provides your checkpoint gateway with numerous intelligent cyber defense mechanism, which can be customisable and makes easier for clients/users to integrate any other security modules along with it. If we talk about checkpoint customer Support, it has a great customer support along with the vendor support. Review collected by and hosted on G2.com.

What do you dislike about ThreatCloud IntelliStore?

Personally i dont feel like disliking this Product as it uses the best feeds to protect the checkpoint gateways. Review collected by and hosted on G2.com.

KP
Senior Executive
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about ThreatCloud IntelliStore?

Enhance features to protect modern day Malware. It is protect our data and also one of the best threatcloud which is customizable as per requirement. Review collected by and hosted on G2.com.

What do you dislike about ThreatCloud IntelliStore?

There is no dislike on product but cost is quite high. Review collected by and hosted on G2.com.

Kirtikumar P.
KP
Network Engineer
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about ThreatCloud IntelliStore?

This is very good feature as next generation threat detection, it is giving one step ahead for network monitoring stand point Review collected by and hosted on G2.com.

What do you dislike about ThreatCloud IntelliStore?

As of now there is no such dislike features on this. Review collected by and hosted on G2.com.

Matthew F.
MF
User Support Specialist
Information Technology and Services
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about ThreatCloud IntelliStore?

The best creature that stands out to me would be the network monitoring capabilities. It has a wide variety of interactive features.u Review collected by and hosted on G2.com.

What do you dislike about ThreatCloud IntelliStore?

Only thing I can say is an issue would be pricing. It could be a bit cheaper but great product for whar its worth. Other issue is that theres not much info online. Review collected by and hosted on G2.com.

There are not enough reviews of ThreatCloud IntelliStore for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(531)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
2
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(302)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
3
Mimecast Advanced Email Security Logo
Mimecast Advanced Email Security
4.4
(297)
Mimecast Email Security with Targeted Threat Protection solution that offers comprehensive, multi-layered email security and content controls.
4
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.7
(288)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
5
ThreatLocker Logo
ThreatLocker
4.8
(274)
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how.
6
Intezer Logo
Intezer
4.5
(192)
Automate your malware analysis. Get answers quickly about any suspicious file, URL, endpoint or memory dump.
7
FortiGate NGFW Logo
FortiGate NGFW
4.7
(176)
FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.
8
Resolver Logo
Resolver
4.3
(160)
All implementations include training and advice on the most effective way to manage your processes within the application.
9
Pentera Logo
Pentera
4.5
(137)
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info visit: pentera.io.
10
Recorded Future Logo
Recorded Future
4.6
(127)
Recorded Future Intelligence Cloud elevates your existing security defenses by enhancing the depth and breadth of protection by giving you insights into threats and attacks before they impact, so you can stay ahead of attackers, at the speed and scale of today’s threat environment.
Show More