Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Check Point Infinity Platform and Services

Check Point Software Technologies

Reviews from AWS customer

1 AWS reviews
  • 5 star
    0
  • 1
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

55 reviews
from and

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    reviewer2751120

Consolidation of management and protection at a fair price gives peace of mind

  • September 08, 2025
  • Review from a verified AWS customer

What is our primary use case?

The most common use case for Check Point Infinity is for managing all my gateways in one place and deploying everything from one place.

What is most valuable?

The Infinity portal combines all Check Point solutions in one place, including the endpoint, SASE, and the SMP.

I am using real-time threat intelligence in Check Point Infinity with ThreatCloud and AI.

The analytics capabilities in Check Point Infinity are very good, and it provides an all-in-one solution.

What needs improvement?

Something that should be better in Check Point Infinity is the customization, though I don't have any specific suggestions at this time.

What do I think about the stability of the solution?

Check Point Infinity is a very stable solution; I don't remember experiencing any downtime.

What do I think about the scalability of the solution?

It is a scalable solution.

How are customer service and support?

I would rate technical support from Check Point a perfect score because when I call them, they answer before I could breathe.

How would you rate customer service and support?

Positive

How was the initial setup?

My initial setup of Check Point Infinity was very easy. Setting up the gateway and connecting it to the Infinity portal was very simple.

What was our ROI?

The price of the solution is very fair because it provides good protection at a reasonable cost.

What other advice do I have?

I'm not sure if I purchased the solution through the vendor or AWS marketplace.

I don't use the automations in Check Point Infinity.

I am a customer using Check Point products.

On a scale of 1-10, I rate Check Point Infinity a 9.

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Samrawit T.

Checkpoint Zero Trust Security: A Comprehensive Review for Enterprise Networks

  • September 02, 2025
  • Review provided by G2

What do you like best about the product?
What stands out most about Checkpoint Zero Trust Security is its unified architecture—powered by the Infinity Platform—that enables consistent policy enforcement, deep visibility, and simplified management across networks, cloud, users, and devices.
What do you dislike about the product?
Checkpoint Zero Trust Security can be complex to deploy in highly distributed environments, especially when integrating legacy systems or aligning granular policies across hybrid infrastructures.
What problems is the product solving and how is that benefiting you?
Checkpoint Zero Trust Security solves the challenge of securing hybrid and distributed environments by enforcing least-privilege access, segmenting networks, and continuously verifying trust—benefiting me by enabling unified policy control, reducing lateral movement risks, and simplifying secure access across users, devices, and workloads.


    Information Technology and Services

Streamlined Threat Prevention with Check Point Infinity

  • August 29, 2025
  • Review provided by G2

What do you like best about the product?
Check Point Infinity Platform is that it brings all our security tools together in one place. It protects everything—our network, cloud, computers, and mobile devices—through a single system, which makes it easier to manage
What do you dislike about the product?
The system can be a bit complex to set up and manage at first, especially if you’re not familiar with Check Point products.
What problems is the product solving and how is that benefiting you?
Check Point Infinity helps us keep everything secure in one place. Before, we had to use different tools to protect our network, cloud, and devices, which was confusing and hard to manage.


    Sachin Y.

Checkpoint Endpoint Security Suite - Technical Overview

  • August 24, 2025
  • Review provided by G2

What do you like best about the product?
Checkpoint Endpoint Security Suite is liked because of featured offers Unified Agent & Modulor Setup via Single agent Architecture, Threat Emulation & Extraction through sandboxing and content sanitization, Centralized visibility & Policy Management and customer support is really awesome.
What do you dislike about the product?
Check Point Endpoint Security Suite is having some issues such as High CPU & Battery Drain on devices and conflicts with other security or software solution and Licensing prices as compared to other vendors.
What problems is the product solving and how is that benefiting you?
Check Point Endpoint Security Suite solved problems like unified management, Mobile Device Platform for mobile security and Enhanced Malware Detection.


    Kavindra R.

Best and easy NGFW for SMB

  • August 22, 2025
  • Review provided by G2

What do you like best about the product?
The easy to deploy solution with great security
What do you dislike about the product?
the only problem is the support structure
What problems is the product solving and how is that benefiting you?
the security concerns and easy to manage


    Government Administration

Very Good Functionality and Performance but Complex Config/Management

  • August 20, 2025
  • Review provided by G2

What do you like best about the product?
Solid Security firewall with frequent security Database updates and less vulnerabilities to fix/upgrade compared to some competitors.
What do you dislike about the product?
Configuration and management (Ex: Remote Access VPN etc.) can be complex compared to other vendors. Checkpoint should try to make it less clumsy and more simpler.
What problems is the product solving and how is that benefiting you?
To Keep our network Secure.


    Hawi G.

Check Point Zero Trust Security Deep Protection

  • June 26, 2025
  • Review provided by G2

What do you like best about the product?
Micro-Segmentation, Network Isolation, Simplified Management and Automation
What do you dislike about the product?
Cost ,Reporting ,Analytics Gap and Integration
What problems is the product solving and how is that benefiting you?
Strict Identity based access, Unified Policy Across Networks and Reduce Attack Surface.


    NareshKumar9

Improved network security with real-time threat detection and alert system

  • June 10, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Infinity involves using the Check Point 18000, which is a Quantum Spark, as a firewall to block unauthorized access to my organization's network. I use this as a firewall which I can credit for blocking unauthorized access from coming inside. Check Point is very useful to me for blocking each and every device with unauthorized access coming to the inside network. The best thing about Check Point is its feasibility to show what kinds of devices have been connected, whether it is a mobile phone, laptop, desktop, or smartwatch. Each category shows in one dashboard, displaying the number of connected devices, making it easy for me to block unauthorized mobile phones or smartwatches while allowing only official use for laptops and desktops.

I am performing these tasks on a day-to-day basis, and I even refer this solution to everyone as well.

What is most valuable?

These features of Check Point Infinity help me stop real security issues effectively. It has stopped a lot of potential threats for me because, with my previous firewall, which I don't want to disclose, I didn't have the same feasibility to see each device categorized easily. Whenever a device gets infected, Check Point Infinity immediately alerts me with a pop-up simply showing the IP address. From there, I can quickly identify whether the device is a mobile, computer, laptop, or smartwatch to block it efficiently, thus keeping my internal network safe and secure.

The best features that Check Point Infinity offers are its ease of configuration and smooth user experience. I find it very useful because I completed the configuration within two days, despite thinking it would be complicated compared to my previous firewall. I considered restoring my previous firewall backup, but since it was a different brand, I decided to start from scratch. I thought configuring each user's laptop and applying patches would be difficult, but Check Point Infinity made it simple, allowing me to quickly set up local and remote VPNs. Identifying glitches and options is easy, unlike other firewalls, making Check Point Infinity very user-friendly.

There is a reporting alert feature that I find useful in Check Point Infinity. Whenever there are any glitches, such as DOS or DNS activities from internal sources, Check Point Infinity easily identifies those issues and quickly alerts me as the admin through pop-ups, email, and text messages. I can log into Check Point Infinity and block the device immediately when alerted.

Check Point Infinity has positively impacted my organization by significantly reducing incidents. It has defended us against numerous threats and malware, providing immediate alerts when a device is infected. Whenever a threat is identified, I receive a pop-up notification stating that specific devices are infected, and affected IPs automatically get thrown onto the block list for easy identification and actionable responses.

I estimate that since starting with Check Point Infinity, I have received over a hundred alerts for threat protections and malware incidents. Whenever these alerts come through, I block the particular IP, ensuring my internet and network stay safe and secure.

I have seen a return on investment with Check Point Infinity as it prevents costly incidents effectively. The device identifies any impending threat and alerts me immediately, allowing me to log in to the GUI and take necessary actions quickly. This process saves a lot of time and reduces the number of incidents we experience, proving to be invaluable for a system admin.

What needs improvement?

There is room for improvement in Check Point Infinity as I encounter some glitches in its interface. Sometimes, the data utilization report does not show up in Check Point Infinity GUI, necessitating me to reach out to their support team, who typically indicates firmware issues that require new installations. This process can be frustrating, and I feel it should be addressed to enhance user experience.

The customer support needs enhancement as well. When I log a ticket, they often take a long time to resolve the issue, with some tickets remaining unresolved for over six months. This duration is unacceptable, and it definitely needs to change; however, aside from that, everything else is satisfactory with Check Point Infinity.

What do I think about the stability of the solution?

Check Point Infinity is stable in my experience, although I believe customer support needs improvement. If they provide timely and effective support, it would enhance stability and minimize glitches considerably.

What do I think about the scalability of the solution?

The scalability of Check Point Infinity appears adequate, and I believe it could handle an increased number of users as my organization grows.

How are customer service and support?

I rate customer support for Check Point Infinity as a seven out of ten, as it can definitely improve.

I gave customer support this rating because when I raised tickets, some took weeks or even up to six months to resolve. This delay does not reflect well on customer service.

How would you rate customer service and support?

Which solution did I use previously and why did I switch?

Before switching to Check Point Infinity, I used a different solution that I prefer not to disclose due to confidentiality. The previous solution struggled when we had over 200 users on the network, causing the whole system to lag and resulting in internet connectivity issues. Consequently, we opted to phase that out and transition to Check Point Infinity, a major firewall solution highly recommended in our market.

How was the initial setup?

The initial setup experience with Check Point Infinity was straightforward, and I completed the installation within two days.

What's my experience with pricing, setup cost, and licensing?

My experience with the pricing, setup cost, and licensing for Check Point Infinity was that I received a slight offer at the time of purchase, and that is about it since we acquired it from another vendor.

Which other solutions did I evaluate?

We did not evaluate other options before choosing Check Point Infinity. We directly selected it after taking two or three demos, determining that it was the ideal fit for our medium-sized organization with 400 to 450 users. Currently, Check Point Infinity runs smoothly without issues disrupting our workflow, although I'm uncertain if it will handle growth beyond 500 or 1000 users.

What other advice do I have?

I advise those considering using Check Point Infinity to take multiple demos before making a decision. It's crucial to understand the features available in the firewall according to your company's needs, so taking demos is essential to ensure it meets your security requirements. I rate Check Point Infinity a nine out of ten because I have faced recurring issues with the firmware, where the data utilization does not always display correctly. This frustration requires me to seek support every time, contributing to a slight deduction in my rating.

Which deployment model are you using for this solution?

On-premises


    Eyob S.

Centralized and Intelligent Endpoint Protection with Check Point

  • June 05, 2025
  • Review provided by G2

What do you like best about the product?
Comprehensive Protection ,Real Time Treat Prevention ,Low System Impact and Centralized Management.
What do you dislike about the product?
Third-Party Integration and Complex Initial Setup
What problems is the product solving and how is that benefiting you?
Data Loss Prevention, Low System Impact and Threat Prevention


    Eyob S.

Powerful Zero Trust Security

  • May 29, 2025
  • Review provided by G2

What do you like best about the product?
Scalable and Consistent Zero Trust Architecture, Strong Multi Factor authentication and Granular access Control Based on user identity.
What do you dislike about the product?
Complex in initial policy Configuration and integration with third Party .
What problems is the product solving and how is that benefiting you?
Reduced the attack Surface though micro-segmentation and Secure remote access.