In my job, I design and propose different solutions from Check Point Infinity for some final customers in final champ profiles. With Check Point Infinity solutions, I can integrate different tools of Check Point like security appliances such as Quantum or Quantum Smart or the orchestrator under Smart Events like different tools of Harmony, Harmony Mail, Harmony Point, and Harmony Browse. I use the Infinity Portal to take control of the administration of these tools and orchestrate and integrate all the information to bring the logs to the final customer to deploy new strategies for cybersecurity or change or update the architecture of security policies.
Check Point Infinity Platform and Services
Check Point Software TechnologiesExternal reviews
External reviews are not included in the AWS star rating for the product.
Unified Cybersecurity with Check Point Infinity Platform
Unified portal streamlines cybersecurity integration and administration
What is our primary use case?
What is most valuable?
One of the valuable aspects of Check Point Infinity is that I can use one unified portal for the administration of all these tools. I can integrate other tools from other brands too, to consolidate and unify cybersecurity strategies. Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
What needs improvement?
If Check Point continues reforms of AI and takes more information from different origins, not only from its database but also from other brands, it can complete this information and make it stronger.
For how long have I used the solution?
I have had about three years of experience with Check Point Infinity.
What do I think about the scalability of the solution?
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
How are customer service and support?
The technical support is excellent with quick response times and high-quality answers to provide the best solutions needed.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is not complex; it is straightforward. It depends on the reality of the moment for the final customer and what they want for their roadmap. The deployment is usually in a short time as this technology enables quick deployment into the customer's architecture.
What about the implementation team?
The required number of people depends on the size of the final customer, but maybe three to five people, including analysts, engineers, and someone senior, are sufficient for this.
What was our ROI?
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
What's my experience with pricing, setup cost, and licensing?
The pricing is good as Check Point Infinity includes many tools and details that others might not have. The cost depends on the different architecture or needs of the final customer.
Which other solutions did I evaluate?
Some brands like Trend Micro, Sophos, and Fortinet offer good solutions too. However, I prefer Check Point as an expert brand in cybersecurity.
What other advice do I have?
I rate Check Point Infinity a nine out of ten.
Best tool for analysis and monitoring the database. Powerful dashboard and Scalable Index.
Empowering security with seamless AI-guided configurations
What is our primary use case?
We have been deploying Check Point Infinity as a new technology for security purposes with our biggest customer in Ethiopia. It serves to secure endpoints and protect from intrusion and various threats. The product is deployed as a SaaS solution, and we use it to protect mobile users and other aspects of the organization.
What is most valuable?
Check Point Infinity offers a multi-layered security approach that enhances our IT security environment. It provides tracking protection, intrusion prevention, and supports mobile users efficiently.
The AI integration helps in guiding configurations and installations, making the process smoother.
Additionally, Check Point is a supportive vendor, offering notable assistance and knowledge sharing during installations and configurations.
What needs improvement?
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity. This would help users to easily understand and deploy the solution.
For how long have I used the solution?
We have been working with Check Point Infinity for one year, as it was deployed with the aid of professional service last year.
What do I think about the stability of the solution?
For the time being, Check Point Infinity is stable with no issues concerning stability.
What do I think about the scalability of the solution?
The product is scalable. If customers require scalability, we can scale the product accordingly to suit organizational growth.
How are customer service and support?
Check Point provides excellent support. As soon as we raise a ticket, they engage promptly, indicating strong vendor support. User support has not presented any issues.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are also working with IBM, Cisco, and FortiGate along with Check Point, for different solutions.
How was the initial setup?
The initial setup is quite seamless and smooth. We follow the solutions easily without encountering any challenges.
What about the implementation team?
The deployment was conducted with the assistance of professional services. This external team has been very supportive and provided necessary guidance throughout the process.
What was our ROI?
We are currently not assessing the financial benefits or return on investment for Check Point Infinity, as we are in the process of deploying it.
What's my experience with pricing, setup cost, and licensing?
I am not aware of the financial cost of the licensing for Check Point Infinity, as I am involved in the technical aspects. The product, as supported by Check Point, offers invaluable assistance for ease of deployment.
Which other solutions did I evaluate?
We are also working with other vendors such as IBM, Cisco, and FortiGate.
What other advice do I have?
I recommend Check Point Infinity to other customers due to its notable benefits and positive experiences with a major financial institution.
I rate Check Point Infinity nine out of ten for its overall satisfactory and scalable features.
Helps to connect various locations worldwide through VPN
What is our primary use case?
Our company used Check Point Infinity to connect various locations worldwide through VPN, specifically using IPsec, rather than for cybersecurity. We implemented it in on-premises networks to collect data in data centers from different locations.
What needs improvement?
The solution is expensive.
What do I think about the stability of the solution?
The tool is 100 percent stable.
What do I think about the scalability of the solution?
Check Point Infinity is scalable.
How was the initial setup?
The initial deployment took about a month, subsequent deployments were much faster, typically taking only a few days.
What's my experience with pricing, setup cost, and licensing?
The solution's price is quite high, and the licensing model requires extra licenses for various features like SD-WAN.
What other advice do I have?
The tool is one of the most secure and stable products, with clear administration. I rate the overall product an eight out of ten.
I recommend Check Point Infinity to others, especially if they aren't planning to use Fortinet or Palo Alto. All three solutions—Check Point Infinity, Fortinet, and Palo Alto—offer similar levels of security. However, one thing to consider is that the tool's licensing can be expensive and complex.
Check Point SDP has worked well for me, it acts as a great shield to protect organizations network.
2.Integrating the Check Point SDP with our organizations network was challenging.
Securing Network Environments
1)Zero Trust Architecutre
2)Granular Access Control
3)Application Segmentation
4)Scalability
1)Reducing Attack Surface
2)Enhancing Secure Posture
3)SimplifyingAccess Management
4)Enabling Secure Remote Access
Enhancing Endpoint Security
2)Centralized management
3)Secure Remote Access
4)Operational Efficiency
A unified security system offering intelligent threat prevention but the training is difficult
What is our primary use case?
We leveraged Check Point Infinity primarily for gateway security, cloud security, endpoint security, and infrastructure as a service.
How has it helped my organization?
Architecturally, Check Point functions as a unified security system. Only one policy management section enables administrators to manage all policies from one console. The platform offers intelligent threat prevention capabilities, flagging suspicious activities and preventing potential threats before they impact your network, cloud, or mobile environments.
What is most valuable?
The whole process of consolidation, centralization, and obtaining a single pane of glass view into the current state, necessary changes, and areas for improvement.
Check Point Infinity has significantly improved our workflow within the ecosystem, making processes smoother and more efficient. It hasn’t added unnecessary work; instead, it has streamlined operations and simplified tasks.
What needs improvement?
Some aspects of the reporting in Check Point may take time to learn and become comfortable with. Training is necessary for certain areas, as some features might not be as intuitive. It's important to understand the workflow and how various components function.
For how long have I used the solution?
I have been using Check Point Infinity for one year.
What do I think about the stability of the solution?
It was very fairly stable.
I rate the stability an eight out of ten.
What do I think about the scalability of the solution?
It is a scalable solution. It can accommodate an increase in user count, handle new requirements and changes, and address emerging attack vectors, ensuring continued functionality and security.
It is used by security analysts, security engineers, and some architects.
I rate the scalability an eight out of ten.
Which solution did I use previously and why did I switch?
We were using CrowdStrike.
How was the initial setup?
The initial setup is straightforward. The deployment process involves a team of network architects, security architects, security analysts, and security engineers.
I rate it an eight out of ten.
What was our ROI?
It saved our time by 25%.
What's my experience with pricing, setup cost, and licensing?
It costs around 40k to 50k. We ended up getting a premium one. There was some additional cost.
What other advice do I have?
We could have faced it if Check Point Infinity had not prevented it. This includes understanding the potential security incident we were looking at, gaining insights into where the attempt was being made from, identifying the associated IOCs, and potentially attributing who might be targeting us.
Maintenance wasn't much needed. The fifteen people we had were sufficient. We had coverage across different time zones, so they were able to cover it.
I recommend the solution.
Overall, I rate the solution a seven out of ten.
We can navigate to all the products very easily because it is written in a normal installation
What is our primary use case?
Infinity is a single platform where you can integrate all the Check Point solutions such as Check Point Email Security, Check Point Endpoint Protection, Check Point SaaS, Check Point web proxy solutions, and Check Point Firewall. It can be integrated into the Infinity portal, and we can manage and configure it from the Infiniti portal.
What is most valuable?
Infinity is a technical console where we have to log in, and we can navigate to all the products very easily because it is written in a normal installation. People who know about the product can click and take care of their activity.
What needs improvement?
Technical support is pretty delayed. It's very slow, and they have not yet received their IT. Compared to other OEMs, Check Point's response is a bit slow but could have been improved. There are two areas to improve: The latency of the sandboxing and the technical support efficacy.
For how long have I used the solution?
I have been using Check Point Infinity for five years.
What do I think about the stability of the solution?
I never felt any downtime or any login issues. Whenever I try to log in, it happens properly and normally.
I rate the solution’s stability a nine out of ten.
What do I think about the scalability of the solution?
5,000 end users are using the solution.
I rate the solution’s scalability a nine out of ten.
How was the initial setup?
The initial setup is very straightforward. Also, the OEM vendor will help you with the login, configure the authentication, get into the login, or get into the console, load your device, and start configuring it.
What was our ROI?
Check Point Infinity offers numerous benefits. It provides peace of mind by simplifying security management. It is responsible for on-premises security, allowing users to configure it anywhere. Additionally, it enables seamless remote connection, even if the user is away from the central point. It's the latest in security technology, offering immense value.
What's my experience with pricing, setup cost, and licensing?
Customers need to pay yearly.
What other advice do I have?
Infiniti is a portal that integrates multiple products.
It's a unified management console. I'm able to manage all the solutions and products from my single Infinity console regardless of multiple branches across the globe, anywhere in the world, and they can be controlled from a single console. The major benefit is the SaaS offering. So, customers don't have to manage everything or keep any infrastructure on-premises; it's completely provided by Check Point, with data centers integrated into Infinity. Thus, there are no data integration problems.
Check Point Infinity is well known for its CDR (Content Disarm and Reconstruction) technology rather than CRO (Customer Revenue Optimization) debt protection. This technology is primarily associated with its sandboxing capabilities. However, there is room for improvement in terms of latency when scanning and delivering attachments, links, or files. Although the delay is often negligible, competitors may offer faster results with their sandboxing solutions.
For customers prioritizing robust security, performance, and stability, Check Point can be an excellent choice. Their extensive technical expertise and global deployments contribute to the reliability of their products. With the Infinity architecture, which facilitates comprehensive threat coverage, Check Point offers scalability, reliability, and expandability across various infrastructure needs.
Overall, I rate the solution a nine out of ten.