In my job, I design and propose different solutions from Check Point Infinity for some final customers in final champ profiles. With Check Point Infinity solutions, I can integrate different tools of Check Point like security appliances such as Quantum or Quantum Smart or the orchestrator under Smart Events like different tools of Harmony, Harmony Mail, Harmony Point, and Harmony Browse. I use the Infinity Portal to take control of the administration of these tools and orchestrate and integrate all the information to bring the logs to the final customer to deploy new strategies for cybersecurity or change or update the architecture of security policies.
Reviews from AWS customer
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
External reviews are not included in the AWS star rating for the product.
Cadre de confiance zéro complet avec prévention approfondie des menaces
Cybersécurité unifiée avec la plateforme Check Point Infinity
Unified portal streamlines cybersecurity integration and administration
What is our primary use case?
What is most valuable?
One of the valuable aspects of Check Point Infinity is that I can use one unified portal for the administration of all these tools. I can integrate other tools from other brands too, to consolidate and unify cybersecurity strategies. Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
What needs improvement?
If Check Point continues reforms of AI and takes more information from different origins, not only from its database but also from other brands, it can complete this information and make it stronger.
For how long have I used the solution?
I have had about three years of experience with Check Point Infinity.
What do I think about the scalability of the solution?
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
How are customer service and support?
The technical support is excellent with quick response times and high-quality answers to provide the best solutions needed.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is not complex; it is straightforward. It depends on the reality of the moment for the final customer and what they want for their roadmap. The deployment is usually in a short time as this technology enables quick deployment into the customer's architecture.
What about the implementation team?
The required number of people depends on the size of the final customer, but maybe three to five people, including analysts, engineers, and someone senior, are sufficient for this.
What was our ROI?
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
What's my experience with pricing, setup cost, and licensing?
The pricing is good as Check Point Infinity includes many tools and details that others might not have. The cost depends on the different architecture or needs of the final customer.
Which other solutions did I evaluate?
Some brands like Trend Micro, Sophos, and Fortinet offer good solutions too. However, I prefer Check Point as an expert brand in cybersecurity.
What other advice do I have?
I rate Check Point Infinity a nine out of ten.
Meilleur outil pour l'analyse et la surveillance de la base de données. Tableau de bord puissant et index évolutif.
Empowering security with seamless AI-guided configurations
What is our primary use case?
We have been deploying Check Point Infinity as a new technology for security purposes with our biggest customer in Ethiopia. It serves to secure endpoints and protect from intrusion and various threats. The product is deployed as a SaaS solution, and we use it to protect mobile users and other aspects of the organization.
What is most valuable?
Check Point Infinity offers a multi-layered security approach that enhances our IT security environment. It provides tracking protection, intrusion prevention, and supports mobile users efficiently.
The AI integration helps in guiding configurations and installations, making the process smoother.
Additionally, Check Point is a supportive vendor, offering notable assistance and knowledge sharing during installations and configurations.
What needs improvement?
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity. This would help users to easily understand and deploy the solution.
For how long have I used the solution?
We have been working with Check Point Infinity for one year, as it was deployed with the aid of professional service last year.
What do I think about the stability of the solution?
For the time being, Check Point Infinity is stable with no issues concerning stability.
What do I think about the scalability of the solution?
The product is scalable. If customers require scalability, we can scale the product accordingly to suit organizational growth.
How are customer service and support?
Check Point provides excellent support. As soon as we raise a ticket, they engage promptly, indicating strong vendor support. User support has not presented any issues.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are also working with IBM, Cisco, and FortiGate along with Check Point, for different solutions.
How was the initial setup?
The initial setup is quite seamless and smooth. We follow the solutions easily without encountering any challenges.
What about the implementation team?
The deployment was conducted with the assistance of professional services. This external team has been very supportive and provided necessary guidance throughout the process.
What was our ROI?
We are currently not assessing the financial benefits or return on investment for Check Point Infinity, as we are in the process of deploying it.
What's my experience with pricing, setup cost, and licensing?
I am not aware of the financial cost of the licensing for Check Point Infinity, as I am involved in the technical aspects. The product, as supported by Check Point, offers invaluable assistance for ease of deployment.
Which other solutions did I evaluate?
We are also working with other vendors such as IBM, Cisco, and FortiGate.
What other advice do I have?
I recommend Check Point Infinity to other customers due to its notable benefits and positive experiences with a major financial institution.
I rate Check Point Infinity nine out of ten for its overall satisfactory and scalable features.
Which deployment model are you using for this solution?
Logiciel de suivi de la sécurité des points de terminaison efficace
Suite de protection robuste contre les cyberattaques
Plateforme complète de prévention des menaces de logiciels malveillants
Helps to connect various locations worldwide through VPN
What is our primary use case?
Our company used Check Point Infinity to connect various locations worldwide through VPN, specifically using IPsec, rather than for cybersecurity. We implemented it in on-premises networks to collect data in data centers from different locations.
What needs improvement?
The solution is expensive.
What do I think about the stability of the solution?
The tool is 100 percent stable.
What do I think about the scalability of the solution?
Check Point Infinity is scalable.
How was the initial setup?
The initial deployment took about a month, subsequent deployments were much faster, typically taking only a few days.
What's my experience with pricing, setup cost, and licensing?
The solution's price is quite high, and the licensing model requires extra licenses for various features like SD-WAN.
What other advice do I have?
The tool is one of the most secure and stable products, with clear administration. I rate the overall product an eight out of ten.
I recommend Check Point Infinity to others, especially if they aren't planning to use Fortinet or Palo Alto. All three solutions—Check Point Infinity, Fortinet, and Palo Alto—offer similar levels of security. However, one thing to consider is that the tool's licensing can be expensive and complex.
Amélioration de la sécurité des points de terminaison
2) Gestion centralisée
3) Accès à distance sécurisé
4) Efficacité opérationnelle