Listing Thumbnail

    Check Point Infinity Platform and Services

     Info
    This marketplace listing is used for Check Point Software and Services transactions

    Overview

    This marketplace listing is used to fulfill non-standard transaction (Check Point Software and Services), therefore the pricing table doesn't list any product entitlements and doesn't list any product SKUs, (final prices and entitlements are defined via a Private Offer quote).

    Highlights

    • Check Point Software and Services

    Details

    Delivery method

    Deployed on AWS

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Check Point Infinity Platform and Services

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    1-month contract (3)

     Info
    Dimension
    Description
    Cost/month
    Enterprise SW Offer
    Check Point security private Software offer
    $10,000.00
    Enterprise PS Offer
    Check Point security private PS hours offer
    $10,000.00
    Enterprise HW Offer
    Check Point security private HW offer
    $10,000.00

    Vendor refund policy

    No Refund

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    https://www.checkpoint.com/support-services/contact-support/  24x7 email support with emergency phone number. Premier support available for enterprise customers.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    27 external reviews
    External reviews are sourced from G2  and are not included in the star rating for this product.
    Eyob S.

    Powerful Zero Trust Security

    Reviewed on May 29, 2025
    Review provided by G2
    What do you like best about the product?
    Scalable and Consistent Zero Trust Architecture, Strong Multi Factor authentication and Granular access Control Based on user identity.
    What do you dislike about the product?
    Complex in initial policy Configuration and integration with third Party .
    What problems is the product solving and how is that benefiting you?
    Reduced the attack Surface though micro-segmentation and Secure remote access.
    Aakash S.

    Check Point Endpoint Security features and Capabilities

    Reviewed on May 29, 2025
    Review provided by G2
    What do you like best about the product?
    Check Point Endpoint is very good and best tool to secure our endpoints and network to malicious activities and attacks. The deployment part is very easy. User GUI is very user friendly. Support part is also good and Integration with other third party tools is very smooth. Harmony Endpoint excels in how well it integrates with the broader Check Point security stack, particularly for organizations already invested in Check Point firewalls or the Infinity architecture. Its centralized management via SmartConsole offers a unified interface to monitor, control, and enforce endpoint security policies, streamlining operations and enhancing overall visibility.
    What do you dislike about the product?
    The management console, while feature-rich, may appear complex to smaller teams or those without prior experience in enterprise-grade security solutions.
    What problems is the product solving and how is that benefiting you?
    Harmony Endpoint strengthens our security posture by providing reliable protection for both remote and on-premises endpoints. It delivers advanced threat prevention capabilities without adding unnecessary complexity, allowing us to manage security effectively across a distributed workforce.
    Mohammad T.

    Comprehensive protection, ease of management through a unified console

    Reviewed on May 23, 2025
    Review provided by G2
    What do you like best about the product?
    Prevention-first approach, which offers robust protection against threats like ransomware and malware, along with strong data protection features such as encryption and a unified client for EPP, EDR, and XDR that simplifies security operations
    What do you dislike about the product?
    Occasional deployment challenges, and a somewhat complex management console that can require a steep learning curve
    What problems is the product solving and how is that benefiting you?
    Check Point Endpoint Security Suite addresses the need for advanced threat prevention and data protection across endpoints, benefiting users by reducing the risk of cyberattacks and simplifying security management through a unified platform.
    Samrawit T.

    Check Point Infinity Platform: Unifying Security for the Modern Enterprises

    Reviewed on May 15, 2025
    Review provided by G2
    What do you like best about the product?
    1. Truly Unified Security Architecture
    2. Consistent Policy Enforcement Everywhere
    3. Provides robust protection for the cloud environments, ensuring data security across hybrid infrastructures
    What do you dislike about the product?
    1. Expensive Price
    2. Inconsistent support quality
    What problems is the product solving and how is that benefiting you?
    1. Stopping Advanced multi-vector attacks
    2. Eliminating security silos
    3. Simplifying Hybrid/Multi-Cloud security
    4. Reducing operational overhead
    Etsub A.

    Exploring the Check Point Infinity Platform

    Reviewed on May 15, 2025
    Review provided by G2
    What do you like best about the product?
    1. Provides end-to-end security across networks, endpoints, and cloud environments, ensuring robust protection
    2. Utilizes advanced threat prevention technologies
    3. Offers a unified management console
    4. Easily scales to meet the demands of growing organizations, adapting to evolving security needs
    What do you dislike about the product?
    1. Initial configuration can be intricate
    2. The platform's extensive features can lead to a steep learning curve
    3. Higher cost for small business
    What problems is the product solving and how is that benefiting you?
    Check Point Infinity Platform solves critical problems:
    1. Provides advanced threat prevention capabilities to combat sophisticated cyber threats across various environments
    2. Reduce the complexity of managing multiple security tools and solutions
    3. Enhances visibility into network traffic and security incidents, allowing for better monitoring and quicker response
    View all reviews