Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Check Point Infinity Platform and Services

Check Point Software Technologies

Reviews from AWS customer

1 AWS reviews
  • 5 star
    0
  • 1
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

55 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Harshal P.

Comprehensive Zero Trust Framework with Deep Threat Prevention

  • May 05, 2025
  • Review provided by G2

What do you like best about the product?
Check Point Zero Trust Security provides a highly integrated approach combining identity-aware access control, network segmentation, endpoint protection, and real-time threat intelligence. I particularly appreciate the granular policy enforcement using identity and device context, seamless integration with Active Directory, and the use of ThreatCloud for dynamic threat detection
What do you dislike about the product?
he initial setup and configuration for Zero Trust components, especially identity-based access and segmentation, can be complex and time-consuming. Licensing is modular and sometimes confusing, especially when layering additional services like Harmony or CloudGuard.
What problems is the product solving and how is that benefiting you?
Check Point Zero Trust Security is helping us solve critical issues around unauthorized lateral movement, remote workforce access control, and protection against advanced persistent threats (APTs). By enforcing strict identity and device posture checks, it ensures that only verified users and trusted devices can access sensitive applications, regardless of their location.


    Information Technology and Services

Unified Cybersecurity with Check Point Infinity Platform

  • April 29, 2025
  • Review provided by G2

What do you like best about the product?
I like that everything’s managed in one place — from endpoints to cloud and network. It makes it easier to stay on top of security without juggling multiple tools.
What do you dislike about the product?
The setup can be a bit overwhelming, especially if you’re not already deep into the Check Point ecosystem. And some features are kind of buried in the interface.
What problems is the product solving and how is that benefiting you?
It brings everything under one roof — no more juggling different security tools. It helps us spot threats faster and makes managing policies across cloud, network, and devices way easier.


    LuisPerez3

Unified portal streamlines cybersecurity integration and administration

  • April 22, 2025
  • Review provided by PeerSpot

What is our primary use case?

In my job, I design and propose different solutions from Check Point Infinity for some final customers in final champ profiles. With Check Point Infinity solutions, I can integrate different tools of Check Point like security appliances such as Quantum or Quantum Smart or the orchestrator under Smart Events like different tools of Harmony, Harmony Mail, Harmony Point, and Harmony Browse. I use the Infinity Portal to take control of the administration of these tools and orchestrate and integrate all the information to bring the logs to the final customer to deploy new strategies for cybersecurity or change or update the architecture of security policies.

What is most valuable?

One of the valuable aspects of Check Point Infinity is that I can use one unified portal for the administration of all these tools. I can integrate other tools from other brands too, to consolidate and unify cybersecurity strategies. Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.

What needs improvement?

If Check Point continues reforms of AI and takes more information from different origins, not only from its database but also from other brands, it can complete this information and make it stronger.

For how long have I used the solution?

I have had about three years of experience with Check Point Infinity.

What do I think about the scalability of the solution?

Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.

How are customer service and support?

The technical support is excellent with quick response times and high-quality answers to provide the best solutions needed.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup is not complex; it is straightforward. It depends on the reality of the moment for the final customer and what they want for their roadmap. The deployment is usually in a short time as this technology enables quick deployment into the customer's architecture.

What about the implementation team?

The required number of people depends on the size of the final customer, but maybe three to five people, including analysts, engineers, and someone senior, are sufficient for this.

What was our ROI?

The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.

What's my experience with pricing, setup cost, and licensing?

The pricing is good as Check Point Infinity includes many tools and details that others might not have. The cost depends on the different architecture or needs of the final customer.

Which other solutions did I evaluate?

Some brands like Trend Micro, Sophos, and Fortinet offer good solutions too. However, I prefer Check Point as an expert brand in cybersecurity.

What other advice do I have?

I rate Check Point Infinity a nine out of ten.


    Boddi P.

Best tool for analysis and monitoring the database. Powerful dashboard and Scalable Index.

  • January 07, 2025
  • Review provided by G2

What do you like best about the product?
In short time we can integrate data resources and gain telemetry within environment. This tool interface good visualizations and designed for bid database.
What do you dislike about the product?
When we going to create any custom machine learning model it gets crashed and sometimes it will hang also. It's important to fix this issue on priority basis and there are no more such particular dislikes to discuss. It's an awesome platform to work.
What problems is the product solving and how is that benefiting you?
I like this product way of configured the tool. It provides redundancy and failover of medium to insure our data and services always accessible. It also offers robust security to cover our data and also it includes encryption for data and integrates with a wide range of data sources, include logs. We have good go through of this product.


    Muluken Mekonene

Empowering security with seamless AI-guided configurations

  • December 06, 2024
  • Review provided by PeerSpot

What is our primary use case?

We have been deploying Check Point Infinity as a new technology for security purposes with our biggest customer in Ethiopia. It serves to secure endpoints and protect from intrusion and various threats. The product is deployed as a SaaS solution, and we use it to protect mobile users and other aspects of the organization.

What is most valuable?

Check Point Infinity offers a multi-layered security approach that enhances our IT security environment. It provides tracking protection, intrusion prevention, and supports mobile users efficiently. 

The AI integration helps in guiding configurations and installations, making the process smoother. 

Additionally, Check Point is a supportive vendor, offering notable assistance and knowledge sharing during installations and configurations.

What needs improvement?

I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity. This would help users to easily understand and deploy the solution.

For how long have I used the solution?

We have been working with Check Point Infinity for one year, as it was deployed with the aid of professional service last year.

What do I think about the stability of the solution?

For the time being, Check Point Infinity is stable with no issues concerning stability.

What do I think about the scalability of the solution?

The product is scalable. If customers require scalability, we can scale the product accordingly to suit organizational growth.

How are customer service and support?

Check Point provides excellent support. As soon as we raise a ticket, they engage promptly, indicating strong vendor support. User support has not presented any issues.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We are also working with IBM, Cisco, and FortiGate along with Check Point, for different solutions.

How was the initial setup?

The initial setup is quite seamless and smooth. We follow the solutions easily without encountering any challenges.

What about the implementation team?

The deployment was conducted with the assistance of professional services. This external team has been very supportive and provided necessary guidance throughout the process.

What was our ROI?

We are currently not assessing the financial benefits or return on investment for Check Point Infinity, as we are in the process of deploying it.

What's my experience with pricing, setup cost, and licensing?

I am not aware of the financial cost of the licensing for Check Point Infinity, as I am involved in the technical aspects. The product, as supported by Check Point, offers invaluable assistance for ease of deployment.

Which other solutions did I evaluate?

We are also working with other vendors such as IBM, Cisco, and FortiGate.

What other advice do I have?

I recommend Check Point Infinity to other customers due to its notable benefits and positive experiences with a major financial institution. 

I rate Check Point Infinity nine out of ten for its overall satisfactory and scalable features.

Which deployment model are you using for this solution?

On-premises


    Michael T.

Efficient endpoint security tracking software

  • October 30, 2024
  • Review provided by G2

What do you like best about the product?
Check Point Endpoint Security Suite has enhanced secure collaboration of teams in the enterpries and remote areas. The platform tracks data from initial processing to the end user providing best security measures that cannot be easily compromised. Data analysis has been safe and there is zero cases of malicious attacks.
What do you dislike about the product?
The security suite has achieved most crucial objectives of securing endpoint devices.
What problems is the product solving and how is that benefiting you?
We have effectively configured this software with endpoint devices to enhance reliable data safety. Remote workforce can easily share data and communicate with full protection from malware attacks.


    John D.

Robust protection suite against cyber attacks

  • October 10, 2024
  • Review provided by G2

What do you like best about the product?
The platform offers comprehensive protection cover against all forms of external threats that can affect development lifecycle. It provides secure access with powerful VPN to our remote developers to enhance secure collaboration and connection. Check Point Endpoint Security Suite has enhnaced compliance with security policies that safeguards data.
What do you dislike about the product?
The performance has been stable since we deployed this platform in the enterprise.
What problems is the product solving and how is that benefiting you?
The software has maintained top notch security services that responds quickly to curb cyber threats. It easily integrates with CI/CD pipelines that enforces security checks for deployed codes.


    Milton P.

Comprehensive malware threat prevention platform

  • August 13, 2024
  • Review provided by G2

What do you like best about the product?
This is the most advanced tool that has highly prevented cyber attacks in my department. It offers timely alerts when there impending ransoware attacks targeting our development projects. There were high rate of cases that could lead to higher risks and expose confidential customer data to external threats. Check Point Endpoint Security Suite has promoted secure data handling ethics.
What do you dislike about the product?
I encountered few learning curve challenges after deployment which lasted shortly afer full enrollment for video and physical training sessions.
What problems is the product solving and how is that benefiting you?
It provides effective data protection services for both personal and customer data. The antivirus and firewall protections have prevented me from most risks when I am browsing.


    Martin Ellmann

Helps to connect various locations worldwide through VPN

  • August 08, 2024
  • Review provided by PeerSpot

What is our primary use case?

Our company used Check Point Infinity to connect various locations worldwide through VPN, specifically using IPsec, rather than for cybersecurity. We implemented it in on-premises networks to collect data in data centers from different locations.

What needs improvement?

The solution is expensive.

What do I think about the stability of the solution?

The tool is 100 percent stable. 

What do I think about the scalability of the solution?

Check Point Infinity is scalable. 

How was the initial setup?

The initial deployment took about a month, subsequent deployments were much faster, typically taking only a few days.

What's my experience with pricing, setup cost, and licensing?

The solution's  price is quite high, and the licensing model requires extra licenses for various features like SD-WAN.

What other advice do I have?

The tool is one of the most secure and stable products, with clear administration. I rate the overall product an eight out of ten. 

I recommend Check Point Infinity to others, especially if they aren't planning to use Fortinet or Palo Alto. All three solutions—Check Point Infinity, Fortinet, and Palo Alto—offer similar levels of security. However, one thing to consider is that the tool's licensing can be expensive and complex. 


    Gaurav C.

Enhancing Endpoint Security

  • July 24, 2024
  • Review provided by G2

What do you like best about the product?
Check Point Endpoint Security is valued for its complete solution to endpoint security concerns, manageability and strong protection capabilities.
What do you dislike about the product?
Working with Check Point Endpoint Security no dislikes.
What problems is the product solving and how is that benefiting you?
1)Advanced Threat Prevention
2)Centralized management
3)Secure Remote Access
4)Operational Efficiency