Overview
Video 1
Video 1

Product video
Check Point Cloud Firewal for AWS delivers advanced, multi-layered network security for the AWS cloud environment and protects cloud assets. Security features include Firewall, IPS, Application Control, IPsec VPN, Antivirus and Anti-Bot.
Check Point Cloud Firewall enables secure VPN connectivity between AWS and enterprise networks, data centers and secure clients with simplified setup, deployment and management. Check Point Cloud Firewall includes SSL/TLS traffic inspection with traffic forwarding and SNI support for advanced threat prevention inside secure SSL traffic.
The Check Point CloudGuard for AWS Security Blueprint provides best practices for designing a secure cloud-based deployment allowing agility, scalability and efficiency. The blueprint promotes automation of processes using APIs and supports Infrastructure As Code practices.
This Check Point Cloud Firewall gateway will be deployed as a single gateway, as a high availability cluster, or as an Auto Scaling group via Check Point CloudFormation templates (sk111013) or via automation tools such as Ansible, Terraform, etc.
This BYOL distributed security gateway is managed from a central Security Management Server, which provides consistent security policy management, enforcement, and reporting across AWS and hybrid deployments within a single pane of glass.
The Security Management Server is not included in this offering. To manage Check Point Cloud Firewall Gateway it is recommended using Check Point Smart-1 Cloud (https://www.checkpoint.com/quantum/unified-cyber-security-platform/smart-1-cloud/ ).
Highlights
- Fully integrated and industry-leading advanced threat prevention security features include: Firewall, IPS, Application Control, IPsec VPN, Antivirus and Anti-Bot. Depending on your existing license, SandBlast adds Threat Extraction (removes exploitable content & promptly delivers sanitized content to users) and Threat Emulation (prevents infections from new malware & targeted attacks using threat sandboxing with the best possible catch rate, and is virtually immune to evasion techniques).
- Provides advanced threat prevention to inspect traffic entering and leaving private subnets in the VPC ("North-South") as well as between VPCs ("East-West"). Designed to meet dynamic security requirements, Check Point Cloud Firewall is cloud-native: it seamlessly integrates with native AWS controls to enable rapid deployment (e.g. using AWS CloudFormation), while supporting network segmentation, AWS Transit Gateway, auto-scaling and high availability across multiple Availability Zones.
- Check Point is an APN Advanced Technology Partner with Networking and Security Competencies. Check Point Cloud Firewall is integrated with a broad range of AWS services, including AWS GWLB, AWS Cloud WAN, AWS Outposts, Amazon GuardDuty, Amazon CloudWatch, AWS Security Hub, AWS Transit Gateway, AWS CloudTrail and VPC Flow Logs. Check Point Cloud Firewall also provides a library of CloudGuard CloudFormation templates (CFTs) to simplify deployment.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
Please see seller website for refund details.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Additional details
Usage instructions
Once the instance is running, connect to it using SSH, set an admin password using: 'set user admin password' followed by 'save config'. Then connect to https://[instance] using Internet Explorer (IE) to finalize the configuration. Notes:
- SSH password authentication is disabled in /etc/ssh/sshd_config
- For information regarding Firefox and Chrome refer to sk121373.
Resources
Support
Vendor support
This offer includes Premium Support. For the full list of included support services visit: https://www.checkpoint.com/support-services/support-plans/ To open a support ticket, you would need to have a Check Point user center account. If you do not have a user center account, you can sign up for one here: https://accounts.checkpoint.com . Need support? Contact us at https://www.checkpoint.com/support-services/contact-support/
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Effective Threat Prevention and Unified Cloud Security Management
Fixing vulnerabilities takes time, leaving systems exposed.
Solution & Benefit: CloudGuard can apply real-time protection and “virtual patching” while fixes are in progress, minimizing exposure windows.
Industry-Leading Threat Prevention with Seamless Unified Management
Multi-Cloud Complexity: Provides single-pane visibility and consistent policies for AWS, Azure, GCP, and hybrid setups, easing migrations without policy rework.
Threat Prevention Gaps: Delivers real-time blocking of exploits/malware (100% efficacy in tests), plus IaC integration for DevSecOps.
Misconfigurations & Drift: Continuous posture analysis, auto-remediation, and context-aware alerts fix vulnerabilities from code to runtime.
Strong Hybrid Cloud Security, but Setup Is Complex and Pricey
Clean UI, Seamless Multi-Cloud Security, and Strong AI-Driven Threat Prevention
After implementing CloudGuard, we were able to centralize security management across all our cloud platforms, automate policy enforcement, and gain much deeper visibility into network traffic and potential threats. We struggled with inconsistent security and slow response times, but now we can detect and respond to threats in real time, which has significantly improved our overall security posture and reduced risk exposure.
As a result, we’ve seen clear benefits: security management time has been reduced by around 30–40%, incident response times have improved by up to 50%, and the consolidation of tools has helped lower overall operational costs. Additionally, automated scaling and smarter threat prevention have reduced downtime and minimized the impact of potential attacks, allowing the team to focus more on strategic work rather than constant firefighting.