Vérifiez le point de terminaison de sécurité.
Qu'aimez-vous le plus à propos de the product?
Il a d'excellentes performances de support client, peut être utilisé facilement ainsi qu'implémenté et intégré facilement. Un chiffrement robuste aide à protéger les données. Dans une seule console, il peut gérer les composants de sécurité des points de terminaison.
Que n’aimez-vous pas à propos de the product?
Je n'aime pas donner des politiques avec plus de soin. Cela nécessite un apprentissage approfondi et des connaissances.
Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
Il résout les problèmes d'endpoint les plus critiques. Il est bénéfique pour prévenir les attaques de logiciels malveillants et les perturbations des activités.
Vérifiez la protection approfondie de la sécurité Zero Trust de Check Point
Qu'aimez-vous le plus à propos de the product?
Micro-segmentation, isolation du réseau, gestion simplifiée et automatisation
Que n’aimez-vous pas à propos de the product?
Coût, Reporting, Écart d'Analytique et Intégration
Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
Accès basé sur une identité stricte, politique unifiée à travers les réseaux et réduction de la surface d'attaque.
Improved network security with real-time threat detection and alert system
What is our primary use case?
My main use case for Check Point Infinity involves using the Check Point 18000, which is a Quantum Spark, as a firewall to block unauthorized access to my organization's network. I use this as a firewall which I can credit for blocking unauthorized access from coming inside. Check Point is very useful to me for blocking each and every device with unauthorized access coming to the inside network. The best thing about Check Point is its feasibility to show what kinds of devices have been connected, whether it is a mobile phone, laptop, desktop, or smartwatch. Each category shows in one dashboard, displaying the number of connected devices, making it easy for me to block unauthorized mobile phones or smartwatches while allowing only official use for laptops and desktops.
I am performing these tasks on a day-to-day basis, and I even refer this solution to everyone as well.
What is most valuable?
These features of Check Point Infinity help me stop real security issues effectively. It has stopped a lot of potential threats for me because, with my previous firewall, which I don't want to disclose, I didn't have the same feasibility to see each device categorized easily. Whenever a device gets infected, Check Point Infinity immediately alerts me with a pop-up simply showing the IP address. From there, I can quickly identify whether the device is a mobile, computer, laptop, or smartwatch to block it efficiently, thus keeping my internal network safe and secure.
The best features that Check Point Infinity offers are its ease of configuration and smooth user experience. I find it very useful because I completed the configuration within two days, despite thinking it would be complicated compared to my previous firewall. I considered restoring my previous firewall backup, but since it was a different brand, I decided to start from scratch. I thought configuring each user's laptop and applying patches would be difficult, but Check Point Infinity made it simple, allowing me to quickly set up local and remote VPNs. Identifying glitches and options is easy, unlike other firewalls, making Check Point Infinity very user-friendly.
There is a reporting alert feature that I find useful in Check Point Infinity. Whenever there are any glitches, such as DOS or DNS activities from internal sources, Check Point Infinity easily identifies those issues and quickly alerts me as the admin through pop-ups, email, and text messages. I can log into Check Point Infinity and block the device immediately when alerted.
Check Point Infinity has positively impacted my organization by significantly reducing incidents. It has defended us against numerous threats and malware, providing immediate alerts when a device is infected. Whenever a threat is identified, I receive a pop-up notification stating that specific devices are infected, and affected IPs automatically get thrown onto the block list for easy identification and actionable responses.
I estimate that since starting with Check Point Infinity, I have received over a hundred alerts for threat protections and malware incidents. Whenever these alerts come through, I block the particular IP, ensuring my internet and network stay safe and secure.
I have seen a return on investment with Check Point Infinity as it prevents costly incidents effectively. The device identifies any impending threat and alerts me immediately, allowing me to log in to the GUI and take necessary actions quickly. This process saves a lot of time and reduces the number of incidents we experience, proving to be invaluable for a system admin.
What needs improvement?
There is room for improvement in Check Point Infinity as I encounter some glitches in its interface. Sometimes, the data utilization report does not show up in Check Point Infinity GUI, necessitating me to reach out to their support team, who typically indicates firmware issues that require new installations. This process can be frustrating, and I feel it should be addressed to enhance user experience.
The customer support needs enhancement as well. When I log a ticket, they often take a long time to resolve the issue, with some tickets remaining unresolved for over six months. This duration is unacceptable, and it definitely needs to change; however, aside from that, everything else is satisfactory with Check Point Infinity.
What do I think about the stability of the solution?
Check Point Infinity is stable in my experience, although I believe customer support needs improvement. If they provide timely and effective support, it would enhance stability and minimize glitches considerably.
What do I think about the scalability of the solution?
The scalability of Check Point Infinity appears adequate, and I believe it could handle an increased number of users as my organization grows.
How are customer service and support?
I rate customer support for Check Point Infinity as a seven out of ten, as it can definitely improve.
I gave customer support this rating because when I raised tickets, some took weeks or even up to six months to resolve. This delay does not reflect well on customer service.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Before switching to Check Point Infinity, I used a different solution that I prefer not to disclose due to confidentiality. The previous solution struggled when we had over 200 users on the network, causing the whole system to lag and resulting in internet connectivity issues. Consequently, we opted to phase that out and transition to Check Point Infinity, a major firewall solution highly recommended in our market.
How was the initial setup?
The initial setup experience with Check Point Infinity was straightforward, and I completed the installation within two days.
What's my experience with pricing, setup cost, and licensing?
My experience with the pricing, setup cost, and licensing for Check Point Infinity was that I received a slight offer at the time of purchase, and that is about it since we acquired it from another vendor.
Which other solutions did I evaluate?
We did not evaluate other options before choosing Check Point Infinity. We directly selected it after taking two or three demos, determining that it was the ideal fit for our medium-sized organization with 400 to 450 users. Currently, Check Point Infinity runs smoothly without issues disrupting our workflow, although I'm uncertain if it will handle growth beyond 500 or 1000 users.
What other advice do I have?
I advise those considering using Check Point Infinity to take multiple demos before making a decision. It's crucial to understand the features available in the firewall according to your company's needs, so taking demos is essential to ensure it meets your security requirements. I rate Check Point Infinity a nine out of ten because I have faced recurring issues with the firmware, where the data utilization does not always display correctly. This frustration requires me to seek support every time, contributing to a slight deduction in my rating.
Which deployment model are you using for this solution?
On-premises
Protection des points de terminaison centralisée et intelligente avec Check Point
Qu'aimez-vous le plus à propos de the product?
Protection complète, prévention des menaces en temps réel, faible impact sur le système et gestion centralisée.
Que n’aimez-vous pas à propos de the product?
Intégration de tiers et configuration initiale complexe
Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
Prévention de la perte de données, faible impact sur le système et prévention des menaces
Sécurité Zero Trust puissante
Qu'aimez-vous le plus à propos de the product?
Architecture Zero Trust évolutive et cohérente, authentification multi-facteurs forte et contrôle d'accès granulaire basé sur l'identité de l'utilisateur.
Que n’aimez-vous pas à propos de the product?
Complexe dans la configuration initiale de la politique et l'intégration avec des tiers.
Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
Réduisez la surface d'attaque grâce à la micro-segmentation et à un accès à distance sécurisé.
Fonctionnalités et capacités de Check Point Endpoint Security
Qu'aimez-vous le plus à propos de the product?
Check Point Endpoint est un outil très bon et le meilleur pour sécuriser nos points de terminaison et notre réseau contre les activités malveillantes et les attaques. La partie déploiement est très facile. L'interface utilisateur est très conviviale. Le support est également bon et l'intégration avec d'autres outils tiers est très fluide. Harmony Endpoint excelle dans la manière dont il s'intègre avec l'ensemble de la pile de sécurité Check Point, en particulier pour les organisations déjà investies dans les pare-feu Check Point ou l'architecture Infinity. Sa gestion centralisée via SmartConsole offre une interface unifiée pour surveiller, contrôler et appliquer les politiques de sécurité des points de terminaison, rationalisant les opérations et améliorant la visibilité globale.
Que n’aimez-vous pas à propos de the product?
La console de gestion, bien que riche en fonctionnalités, peut sembler complexe pour les petites équipes ou celles sans expérience préalable dans les solutions de sécurité de niveau entreprise.
Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
Harmony Endpoint renforce notre posture de sécurité en fournissant une protection fiable pour les points de terminaison à distance et sur site. Il offre des capacités avancées de prévention des menaces sans ajouter de complexité inutile, nous permettant de gérer efficacement la sécurité à travers une main-d'œuvre distribuée.
Protection complète, facilité de gestion grâce à une console unifiée
Qu'aimez-vous le plus à propos de the product?
Approche axée sur la prévention, qui offre une protection robuste contre les menaces telles que les ransomwares et les malwares, ainsi que des fonctionnalités de protection des données solides comme le chiffrement et un client unifié pour EPP, EDR et XDR qui simplifie les opérations de sécurité.
Que n’aimez-vous pas à propos de the product?
Défis de déploiement occasionnels et une console de gestion quelque peu complexe qui peut nécessiter une courbe d'apprentissage abrupte.
Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
La suite de sécurité des points de terminaison Check Point répond au besoin de prévention avancée des menaces et de protection des données sur les points de terminaison, bénéficiant aux utilisateurs en réduisant le risque de cyberattaques et en simplifiant la gestion de la sécurité grâce à une plateforme unifiée.
Security posture enhances with responsive support and seamless integration, though analytics features can improve
What is our primary use case?
Within my organization, I primarily use Check Point Infinity for bandwidth utilization, load balancing, and we analyze all the spams, filters, and blocks.
Another feature of Check Point Infinity that I utilize is blocking all unwanted traffic, restricting around the web, and alerting me about bad actors anytime they attack.
What is most valuable?
The Threat Prevention technology in Check Point Infinity has enhanced my security posture; that's very great, excellent, and helpful.
Check Point Infinity provides financial benefits and cost savings. Without this, our business would not continue at all, as our business depends on this. If we cannot keep our data secret, all our customers will be lost.
What needs improvement?
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
For how long have I used the solution?
I have been familiar with Check Point Infinity for the last four years.
What was my experience with deployment of the solution?
I did not face many challenges or difficulties with installing Check Point Infinity. Initially, the first installation presented a problem, but otherwise, there are not too many issues.
How are customer service and support?
Check Point support is very responsive. I give it a ten.
How would you rate customer service and support?
How was the initial setup?
I do not remember exactly how much time the installation required, but it was one hour only, although there were some issues which were resolved by the tech people.
What about the implementation team?
Only one or two people took part in the installation of Check Point Infinity.
What was our ROI?
I would say we can save about 90% of our budget with Check Point Infinity.
What's my experience with pricing, setup cost, and licensing?
In terms of pricing, I find Check Point Infinity to be an expensive product. In fact, we are evaluating even the spam filter for emails from Check Point, but it was prohibitively costly, so we dropped it and are using Microsoft Defender.
Which other solutions did I evaluate?
Before choosing Check Point Infinity, we evaluated Cisco as another option.
We chose Check Point Infinity instead of Cisco because we found that the price is good, and the ease of use and implementation were better.
What other advice do I have?
I am familiar with Check Point Infinity to some extent.
It is a scalable solution, prominently so.
In the future, I am planning on increasing the number of devices for Check Point Infinity.
My overall rating for Check Point Infinity is eight out of ten.
Which deployment model are you using for this solution?
On-premises
Plateforme Check Point Infinity : Unifier la sécurité pour les entreprises modernes
Qu'aimez-vous le plus à propos de the product?
1. Architecture de sécurité véritablement unifiée
2. Application cohérente des politiques partout
3. Fournit une protection robuste pour les environnements cloud, garantissant la sécurité des données à travers les infrastructures hybrides
Que n’aimez-vous pas à propos de the product?
1. Prix élevé
2. Qualité de support incohérente
Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
1. Arrêter les attaques avancées multi-vecteurs
2. Éliminer les silos de sécurité
3. Simplifier la sécurité hybride/multi-cloud
4. Réduire les frais généraux opérationnels
Exploration de la plateforme Check Point Infinity
Qu'aimez-vous le plus à propos de the product?
1. Fournit une sécurité de bout en bout à travers les réseaux, les points d'accès et les environnements cloud, assurant une protection robuste
2. Utilise des technologies avancées de prévention des menaces
3. Offre une console de gestion unifiée
4. S'adapte facilement pour répondre aux exigences des organisations en croissance, en s'adaptant aux besoins de sécurité évolutifs
Que n’aimez-vous pas à propos de the product?
1. La configuration initiale peut être complexe
2. Les fonctionnalités étendues de la plateforme peuvent entraîner une courbe d'apprentissage abrupte
3. Coût plus élevé pour les petites entreprises
Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
La plateforme Check Point Infinity résout des problèmes critiques :
1. Fournit des capacités avancées de prévention des menaces pour lutter contre les cybermenaces sophistiquées dans divers environnements
2. Réduire la complexité de la gestion de multiples outils et solutions de sécurité
3. Améliore la visibilité du trafic réseau et des incidents de sécurité, permettant une meilleure surveillance et une réponse plus rapide