Security posture enhances with responsive support and seamless integration, though analytics features can improve
What is our primary use case?
Within my organization, I primarily use Check Point Infinity for bandwidth utilization, load balancing, and we analyze all the spams, filters, and blocks.
Another feature of Check Point Infinity that I utilize is blocking all unwanted traffic, restricting around the web, and alerting me about bad actors anytime they attack.
What is most valuable?
The Threat Prevention technology in Check Point Infinity has enhanced my security posture; that's very great, excellent, and helpful.
Check Point Infinity provides financial benefits and cost savings. Without this, our business would not continue at all, as our business depends on this. If we cannot keep our data secret, all our customers will be lost.
What needs improvement?
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
For how long have I used the solution?
I have been familiar with Check Point Infinity for the last four years.
What was my experience with deployment of the solution?
I did not face many challenges or difficulties with installing Check Point Infinity. Initially, the first installation presented a problem, but otherwise, there are not too many issues.
How are customer service and support?
Check Point support is very responsive. I give it a ten.
How would you rate customer service and support?
How was the initial setup?
I do not remember exactly how much time the installation required, but it was one hour only, although there were some issues which were resolved by the tech people.
What about the implementation team?
Only one or two people took part in the installation of Check Point Infinity.
What was our ROI?
I would say we can save about 90% of our budget with Check Point Infinity.
What's my experience with pricing, setup cost, and licensing?
In terms of pricing, I find Check Point Infinity to be an expensive product. In fact, we are evaluating even the spam filter for emails from Check Point, but it was prohibitively costly, so we dropped it and are using Microsoft Defender.
Which other solutions did I evaluate?
Before choosing Check Point Infinity, we evaluated Cisco as another option.
We chose Check Point Infinity instead of Cisco because we found that the price is good, and the ease of use and implementation were better.
What other advice do I have?
I am familiar with Check Point Infinity to some extent.
It is a scalable solution, prominently so.
In the future, I am planning on increasing the number of devices for Check Point Infinity.
My overall rating for Check Point Infinity is eight out of ten.
Which deployment model are you using for this solution?
On-premises
Check Point Infinity Platform: Unifying Security for the Modern Enterprises
What do you like best about the product?
1. Truly Unified Security Architecture
2. Consistent Policy Enforcement Everywhere
3. Provides robust protection for the cloud environments, ensuring data security across hybrid infrastructures
What do you dislike about the product?
1. Expensive Price
2. Inconsistent support quality
What problems is the product solving and how is that benefiting you?
1. Stopping Advanced multi-vector attacks
2. Eliminating security silos
3. Simplifying Hybrid/Multi-Cloud security
4. Reducing operational overhead
Exploring the Check Point Infinity Platform
What do you like best about the product?
1. Provides end-to-end security across networks, endpoints, and cloud environments, ensuring robust protection
2. Utilizes advanced threat prevention technologies
3. Offers a unified management console
4. Easily scales to meet the demands of growing organizations, adapting to evolving security needs
What do you dislike about the product?
1. Initial configuration can be intricate
2. The platform's extensive features can lead to a steep learning curve
3. Higher cost for small business
What problems is the product solving and how is that benefiting you?
Check Point Infinity Platform solves critical problems:
1. Provides advanced threat prevention capabilities to combat sophisticated cyber threats across various environments
2. Reduce the complexity of managing multiple security tools and solutions
3. Enhances visibility into network traffic and security incidents, allowing for better monitoring and quicker response
Comprehensive Zero Trust Framework with Deep Threat Prevention
What do you like best about the product?
Check Point Zero Trust Security provides a highly integrated approach combining identity-aware access control, network segmentation, endpoint protection, and real-time threat intelligence. I particularly appreciate the granular policy enforcement using identity and device context, seamless integration with Active Directory, and the use of ThreatCloud for dynamic threat detection
What do you dislike about the product?
he initial setup and configuration for Zero Trust components, especially identity-based access and segmentation, can be complex and time-consuming. Licensing is modular and sometimes confusing, especially when layering additional services like Harmony or CloudGuard.
What problems is the product solving and how is that benefiting you?
Check Point Zero Trust Security is helping us solve critical issues around unauthorized lateral movement, remote workforce access control, and protection against advanced persistent threats (APTs). By enforcing strict identity and device posture checks, it ensures that only verified users and trusted devices can access sensitive applications, regardless of their location.
Unified Cybersecurity with Check Point Infinity Platform
What do you like best about the product?
I like that everything’s managed in one place — from endpoints to cloud and network. It makes it easier to stay on top of security without juggling multiple tools.
What do you dislike about the product?
The setup can be a bit overwhelming, especially if you’re not already deep into the Check Point ecosystem. And some features are kind of buried in the interface.
What problems is the product solving and how is that benefiting you?
It brings everything under one roof — no more juggling different security tools. It helps us spot threats faster and makes managing policies across cloud, network, and devices way easier.
Unified portal streamlines cybersecurity integration and administration
What is our primary use case?
In my job, I design and propose different solutions from Check Point Infinity for some final customers in final champ profiles. With Check Point Infinity solutions, I can integrate different tools of Check Point like security appliances such as Quantum or Quantum Smart or the orchestrator under Smart Events like different tools of Harmony, Harmony Mail, Harmony Point, and Harmony Browse. I use the Infinity Portal to take control of the administration of these tools and orchestrate and integrate all the information to bring the logs to the final customer to deploy new strategies for cybersecurity or change or update the architecture of security policies.
What is most valuable?
One of the valuable aspects of Check Point Infinity is that I can use one unified portal for the administration of all these tools. I can integrate other tools from other brands too, to consolidate and unify cybersecurity strategies. Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
What needs improvement?
If Check Point continues reforms of AI and takes more information from different origins, not only from its database but also from other brands, it can complete this information and make it stronger.
For how long have I used the solution?
I have had about three years of experience with Check Point Infinity.
What do I think about the scalability of the solution?
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
How are customer service and support?
The technical support is excellent with quick response times and high-quality answers to provide the best solutions needed.
How would you rate customer service and support?
How was the initial setup?
The initial setup is not complex; it is straightforward. It depends on the reality of the moment for the final customer and what they want for their roadmap. The deployment is usually in a short time as this technology enables quick deployment into the customer's architecture.
What about the implementation team?
The required number of people depends on the size of the final customer, but maybe three to five people, including analysts, engineers, and someone senior, are sufficient for this.
What was our ROI?
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
What's my experience with pricing, setup cost, and licensing?
The pricing is good as Check Point Infinity includes many tools and details that others might not have. The cost depends on the different architecture or needs of the final customer.
Which other solutions did I evaluate?
Some brands like Trend Micro, Sophos, and Fortinet offer good solutions too. However, I prefer Check Point as an expert brand in cybersecurity.
What other advice do I have?
I rate Check Point Infinity a nine out of ten.
Best tool for analysis and monitoring the database. Powerful dashboard and Scalable Index.
What do you like best about the product?
In short time we can integrate data resources and gain telemetry within environment. This tool interface good visualizations and designed for bid database.
What do you dislike about the product?
When we going to create any custom machine learning model it gets crashed and sometimes it will hang also. It's important to fix this issue on priority basis and there are no more such particular dislikes to discuss. It's an awesome platform to work.
What problems is the product solving and how is that benefiting you?
I like this product way of configured the tool. It provides redundancy and failover of medium to insure our data and services always accessible. It also offers robust security to cover our data and also it includes encryption for data and integrates with a wide range of data sources, include logs. We have good go through of this product.
Empowering security with seamless AI-guided configurations
What is our primary use case?
We have been deploying Check Point Infinity as a new technology for security purposes with our biggest customer in Ethiopia. It serves to secure endpoints and protect from intrusion and various threats. The product is deployed as a SaaS solution, and we use it to protect mobile users and other aspects of the organization.
What is most valuable?
Check Point Infinity offers a multi-layered security approach that enhances our IT security environment. It provides tracking protection, intrusion prevention, and supports mobile users efficiently.
The AI integration helps in guiding configurations and installations, making the process smoother.
Additionally, Check Point is a supportive vendor, offering notable assistance and knowledge sharing during installations and configurations.
What needs improvement?
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity. This would help users to easily understand and deploy the solution.
For how long have I used the solution?
We have been working with Check Point Infinity for one year, as it was deployed with the aid of professional service last year.
What do I think about the stability of the solution?
For the time being, Check Point Infinity is stable with no issues concerning stability.
What do I think about the scalability of the solution?
The product is scalable. If customers require scalability, we can scale the product accordingly to suit organizational growth.
How are customer service and support?
Check Point provides excellent support. As soon as we raise a ticket, they engage promptly, indicating strong vendor support. User support has not presented any issues.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We are also working with IBM, Cisco, and FortiGate along with Check Point, for different solutions.
How was the initial setup?
The initial setup is quite seamless and smooth. We follow the solutions easily without encountering any challenges.
What about the implementation team?
The deployment was conducted with the assistance of professional services. This external team has been very supportive and provided necessary guidance throughout the process.
What was our ROI?
We are currently not assessing the financial benefits or return on investment for Check Point Infinity, as we are in the process of deploying it.
What's my experience with pricing, setup cost, and licensing?
I am not aware of the financial cost of the licensing for Check Point Infinity, as I am involved in the technical aspects. The product, as supported by Check Point, offers invaluable assistance for ease of deployment.
Which other solutions did I evaluate?
We are also working with other vendors such as IBM, Cisco, and FortiGate.
What other advice do I have?
I recommend Check Point Infinity to other customers due to its notable benefits and positive experiences with a major financial institution.
I rate Check Point Infinity nine out of ten for its overall satisfactory and scalable features.
Which deployment model are you using for this solution?
On-premises
Helps to connect various locations worldwide through VPN
What is our primary use case?
Our company used Check Point Infinity to connect various locations worldwide through VPN, specifically using IPsec, rather than for cybersecurity. We implemented it in on-premises networks to collect data in data centers from different locations.
What needs improvement?
The solution is expensive.
What do I think about the stability of the solution?
The tool is 100 percent stable.
What do I think about the scalability of the solution?
Check Point Infinity is scalable.
How was the initial setup?
The initial deployment took about a month, subsequent deployments were much faster, typically taking only a few days.
What's my experience with pricing, setup cost, and licensing?
The solution's price is quite high, and the licensing model requires extra licenses for various features like SD-WAN.
What other advice do I have?
The tool is one of the most secure and stable products, with clear administration. I rate the overall product an eight out of ten.
I recommend Check Point Infinity to others, especially if they aren't planning to use Fortinet or Palo Alto. All three solutions—Check Point Infinity, Fortinet, and Palo Alto—offer similar levels of security. However, one thing to consider is that the tool's licensing can be expensive and complex.
Enhancing Endpoint Security
What do you like best about the product?
Check Point Endpoint Security is valued for its complete solution to endpoint security concerns, manageability and strong protection capabilities.
What do you dislike about the product?
Working with Check Point Endpoint Security no dislikes.
What problems is the product solving and how is that benefiting you?
1)Advanced Threat Prevention
2)Centralized management
3)Secure Remote Access
4)Operational Efficiency