Overview
Video 1
Video 1

Product video
Check Point Security Management provides advanced security management platform for enterprises to be more efficient at deploying protections across their organizations and across public, private and hybrid clouds.
Efficient: Automation and granular delegation help alleviate operational overhead. The Security Management API allows security teams to automate any task or create web portals for security self-service. Management interface features anticipate the administrator's daily needs, providing security intelligence to make better policy decisions.
Fully Integrated: Security Management has logging, monitoring, event correlation and reporting in one place. A visual dashboard provides full visibility into security across the network, helping organizations monitor the status of enforcement points and stay alert to potential threats. The customizable dashboard provides a full view of the security posture and drilldown capabilities into incident or log details. Reports are configurable and accessible from any web browser.
Security Management is required to control CloudGuard Network Security Gateways.
Customers may use this BYOL offering if they have already obtained a Check Point Security Management license.
To maintain the highest quality and security of our management solutions, Check Point recommends installing the latest recommended Jumbo Hotfix, especially after the initial deployment.
Highlights
- One Platform, One Policy - a single pane of glass console manages the entire IT infrastructure - from the data center to private/public/hybrid cloud deployments - for full visibility, security efficiency and consistency. The policy can be segmented into layers for seamless network segmentation.
- Extensible, Scalable Platform: The Security Management platform scales to the most complex and dynamic environments. The RESTful APIs make it easy to integrate securely with orchestration, change management and ticketing systems, enabling automated security change control and provisioning.
- Check Point is an APN Advanced Technology Partner with Networking and Security Competencies. CloudGuard Network Security is integrated with a broad range of AWS services, including AWS GWLB, AWS Cloud WAN, AWS Outposts, Amazon GuardDuty, Amazon CloudWatch, AWS Security Hub, AWS Transit Gateway, AWS CloudTrail and VPC Flow Logs. CloudGuard Network Security also provides a library of CloudGuard CloudFormation templates (CFTs) to simplify deployment.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
Please see seller website for refund details.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Additional details
Usage instructions
Once the instance is running, connect to it using SSH, set an admin password using: 'set user admin password' followed by 'save config'. Then connect to https://[instance] using Internet Explorer (IE) to finalize the configuration. Notes:
- SSH password authentication is disabled in /etc/ssh/sshd_config
- For information regarding Firefox and Chrome refer to sk121373.
Resources
Support
Vendor support
This offer includes Premium Support. For the full list of included support services visit: https://www.checkpoint.com/support-services/support-plans/ To open a support ticket, you would need to have a Check Point user center account. If you do not have a user center account, you can sign up for one here: https://accounts.checkpoint.com . Need support? Contact us at https://www.checkpoint.com/support-services/contact-support/
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products

Customer reviews
Effective Threat Prevention and Unified Cloud Security Management
Fixing vulnerabilities takes time, leaving systems exposed.
Solution & Benefit: CloudGuard can apply real-time protection and “virtual patching” while fixes are in progress, minimizing exposure windows.
Industry-Leading Threat Prevention with Seamless Unified Management
Multi-Cloud Complexity: Provides single-pane visibility and consistent policies for AWS, Azure, GCP, and hybrid setups, easing migrations without policy rework.
Threat Prevention Gaps: Delivers real-time blocking of exploits/malware (100% efficacy in tests), plus IaC integration for DevSecOps.
Misconfigurations & Drift: Continuous posture analysis, auto-remediation, and context-aware alerts fix vulnerabilities from code to runtime.
Strong Hybrid Cloud Security, but Setup Is Complex and Pricey
Clean UI, Seamless Multi-Cloud Security, and Strong AI-Driven Threat Prevention
After implementing CloudGuard, we were able to centralize security management across all our cloud platforms, automate policy enforcement, and gain much deeper visibility into network traffic and potential threats. We struggled with inconsistent security and slow response times, but now we can detect and respond to threats in real time, which has significantly improved our overall security posture and reduced risk exposure.
As a result, we’ve seen clear benefits: security management time has been reduced by around 30–40%, incident response times have improved by up to 50%, and the consolidation of tools has helped lower overall operational costs. Additionally, automated scaling and smarter threat prevention have reduced downtime and minimized the impact of potential attacks, allowing the team to focus more on strategic work rather than constant firefighting.