Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Infinity GenAI Protect

Check Point Software Technologies

Reviews from AWS customer

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

33 reviews
from

External reviews are not included in the AWS star rating for the product.


    Sachin Y.

Checkpoint Endpoint Security Suite - Technical Overview

  • August 24, 2025
  • Review provided by G2

What do you like best about the product?
Checkpoint Endpoint Security Suite is liked because of featured offers Unified Agent & Modulor Setup via Single agent Architecture, Threat Emulation & Extraction through sandboxing and content sanitization, Centralized visibility & Policy Management and customer support is really awesome.
What do you dislike about the product?
Check Point Endpoint Security Suite is having some issues such as High CPU & Battery Drain on devices and conflicts with other security or software solution and Licensing prices as compared to other vendors.
What problems is the product solving and how is that benefiting you?
Check Point Endpoint Security Suite solved problems like unified management, Mobile Device Platform for mobile security and Enhanced Malware Detection.


    Abhinandan Y.

Checkpoint Infinity Portal Configuration

  • August 22, 2025
  • Review provided by G2

What do you like best about the product?
It's a single platform but provides a wide range of security services - Provide one security portal to manage network security, cloud security, endpoints, and more. - Minimize complexity through AI services
What do you dislike about the product?
Steep leaningcurve and product complexity Fragmented user experience between modules Complex licensing and cost management.
What problems is the product solving and how is that benefiting you?
The Check Point Infinity Platform solves the challenges of fragmented security tools, rising threats, and manual workflows by offering a unified, AI-powered, cloud-delivered cybersecurity solution. It consolidates protection across networks, cloud, endpoints, email, mobile, and IoT with real-time threat prevention via ThreatCloud AI and Playblocks orchestration. This means simplified operations through a single console, proactive defense with 99.8% threat block rates, faster incident response via automation, and lower total cost of ownership by centralizing subscriptions and tools. Overall, Infinity delivers stronger security, greater efficiency, and predictable costs.


    Government Administration

Very Good Functionality and Performance but Complex Config/Management

  • August 20, 2025
  • Review provided by G2

What do you like best about the product?
Solid Security firewall with frequent security Database updates and less vulnerabilities to fix/upgrade compared to some competitors.
What do you dislike about the product?
Configuration and management (Ex: Remote Access VPN etc.) can be complex compared to other vendors. Checkpoint should try to make it less clumsy and more simpler.
What problems is the product solving and how is that benefiting you?
To Keep our network Secure.


    BLAGHUL R.

Check Point Endpoint Security.

  • July 16, 2025
  • Review provided by G2

What do you like best about the product?
It has excellent customer support performance, Easily can be use as well as easily can be implemented and integrated. Robust encryption helps in protecting data. In single console it can manage endpoint security components.
What do you dislike about the product?
I dislike giving policies with more careful. It requires deep learning and knowledge.
What problems is the product solving and how is that benefiting you?
It solve most critical endpoint problems. It is beneficial in preventing malware attacks and business disruption.


    Hawi G.

Check Point Zero Trust Security Deep Protection

  • June 26, 2025
  • Review provided by G2

What do you like best about the product?
Micro-Segmentation, Network Isolation, Simplified Management and Automation
What do you dislike about the product?
Cost ,Reporting ,Analytics Gap and Integration
What problems is the product solving and how is that benefiting you?
Strict Identity based access, Unified Policy Across Networks and Reduce Attack Surface.


    Eyob S.

Centralized and Intelligent Endpoint Protection with Check Point

  • June 05, 2025
  • Review provided by G2

What do you like best about the product?
Comprehensive Protection ,Real Time Treat Prevention ,Low System Impact and Centralized Management.
What do you dislike about the product?
Third-Party Integration and Complex Initial Setup
What problems is the product solving and how is that benefiting you?
Data Loss Prevention, Low System Impact and Threat Prevention


    Eyob S.

Powerful Zero Trust Security

  • May 29, 2025
  • Review provided by G2

What do you like best about the product?
Scalable and Consistent Zero Trust Architecture, Strong Multi Factor authentication and Granular access Control Based on user identity.
What do you dislike about the product?
Complex in initial policy Configuration and integration with third Party .
What problems is the product solving and how is that benefiting you?
Reduced the attack Surface though micro-segmentation and Secure remote access.


    Aakash S.

Check Point Endpoint Security features and Capabilities

  • May 29, 2025
  • Review provided by G2

What do you like best about the product?
Check Point Endpoint is very good and best tool to secure our endpoints and network to malicious activities and attacks. The deployment part is very easy. User GUI is very user friendly. Support part is also good and Integration with other third party tools is very smooth. Harmony Endpoint excels in how well it integrates with the broader Check Point security stack, particularly for organizations already invested in Check Point firewalls or the Infinity architecture. Its centralized management via SmartConsole offers a unified interface to monitor, control, and enforce endpoint security policies, streamlining operations and enhancing overall visibility.
What do you dislike about the product?
The management console, while feature-rich, may appear complex to smaller teams or those without prior experience in enterprise-grade security solutions.
What problems is the product solving and how is that benefiting you?
Harmony Endpoint strengthens our security posture by providing reliable protection for both remote and on-premises endpoints. It delivers advanced threat prevention capabilities without adding unnecessary complexity, allowing us to manage security effectively across a distributed workforce.


    Mohammad T.

Comprehensive protection, ease of management through a unified console

  • May 23, 2025
  • Review provided by G2

What do you like best about the product?
Prevention-first approach, which offers robust protection against threats like ransomware and malware, along with strong data protection features such as encryption and a unified client for EPP, EDR, and XDR that simplifies security operations
What do you dislike about the product?
Occasional deployment challenges, and a somewhat complex management console that can require a steep learning curve
What problems is the product solving and how is that benefiting you?
Check Point Endpoint Security Suite addresses the need for advanced threat prevention and data protection across endpoints, benefiting users by reducing the risk of cyberattacks and simplifying security management through a unified platform.


    Samrawit T.

Check Point Infinity Platform: Unifying Security for the Modern Enterprises

  • May 15, 2025
  • Review provided by G2

What do you like best about the product?
1. Truly Unified Security Architecture
2. Consistent Policy Enforcement Everywhere
3. Provides robust protection for the cloud environments, ensuring data security across hybrid infrastructures
What do you dislike about the product?
1. Expensive Price
2. Inconsistent support quality
What problems is the product solving and how is that benefiting you?
1. Stopping Advanced multi-vector attacks
2. Eliminating security silos
3. Simplifying Hybrid/Multi-Cloud security
4. Reducing operational overhead