Improves daily threat prevention with real-time detection and requires better alert tuning for faster prioritization
What is our primary use case?
Our main use case for Check Point Infinity is to manage and protect our network from advanced threats. We use it for firewall control, threat prevention, and secure access for remote users. It also helps us monitor traffic and block risky activities and keep our endpoints safe. The platform also gives us clear reports so our team can respond faster. Overall, we can rely on it to keep our environment secure and stable every day.
Recently our team used Check Point Infinity to stop suspicious inbound connections that were targeting one of our internal apps. The system flagged and instantly blocked the activities before any damage was done. The alert Check Point Infinity gave us was clear and detailed so we could review logs and confirm it was a real threat. This quick detection saved us time and prevented a possible breach. It shows how useful the platform is in our daily security work.
What is most valuable?
Check Point Infinity offers many valuable features including AI-powered threat prevention, unified management, autonomous threat prevention, and generative AI copilot, scalable architecture, managed security services that monitor threat intelligence and support from Check Point experts. Users use ThreatCloud AI with 50 engines to block zero-day malware, malware, phishing and advanced threats.
ThreatCloud AI is an engine that gives very strong real-time threat prevention. AI Copilot helps us automate incident response, policy tuning, and threat hunting, saving a lot of manual effort. Managed security services with a dedicated team backing the platform gives confidence and support, especially when things get complex. If I had to pick one, it would be ThreatCloud AI because blocking threats early is the foundation of everything else for us.
Since deploying Check Point Infinity, we have seen a big drop in security incidents thanks to its strong AI-driven threat prevention. Response times have improved dramatically because of the automated XDR workflows. The unified console has simplified managing our firewalls, endpoints and cloud, reducing admin overhead for us. Having the managed security team support has increased our confidence in handling complex threats. Overall, our security posture feels more proactive and resilient.
What needs improvement?
Check Point Infinity is powerful, but there are a few areas that could improve. The learning curve for new users can be steep, especially when managing multiple modules like CloudGuard, Quantum, and Harmony together. Some alerts can be overwhelming, making it harder to prioritize without fine-tuning. While automation helps, occasional manual adjustments are still needed. Overall, it is strong, but simplifying onboarding and alert management would make it even better.
Integration with third-party tools could be smoother. The reporting dashboard could be more customizable for quick insights. Performance on very large networks can sometimes slow during updates. Overall, while the platform is strong, improving user experience, alert management, and integration would make it even more efficient for daily operations.
For how long have I used the solution?
I have been working in my current field since the last 1.4 years.
What do I think about the stability of the solution?
Check Point Infinity has achieved a 99.9% block rate on zero-day malware in the 2025 Miercom test. It has also reached a high phishing prevention rate in the same report. These numbers correlate with fewer real incidents, faster detection, and much lower noise, which we have seen in our organization.
What do I think about the scalability of the solution?
Our experience with Check Point Infinity scalability has been very positive. The Infinity Portal lets us manage on-premises, cloud and edge environments from a single elastic console.
How are customer service and support?
We have reached out to Check Point support a few times. Overall, the response is decent for critical issues. For some critical issues, some users praise their promptness, but others note delays. Tickets sometimes take too long. Documentation could also be more up-to-date.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We evaluated several options before selecting Check Point Infinity. We evaluated Palo Alto Networks, specifically NGFW, since it is a strong all-around security platform. We also evaluated Fortinet, especially Fortinet firewalls for network security, and Microsoft Security.
How was the initial setup?
It was a fresh installation, so we have not migrated any software before implementing Check Point Infinity.
What about the implementation team?
We did not use an external implementation team.
What was our ROI?
We have seen a solid return on investment with Check Point Infinity.
What's my experience with pricing, setup cost, and licensing?
Our experience with Check Point Infinity pricing and licensing was mixed. The subscription model is flexible with one-year and multi-year plans based on per-user or deployment size. Setup costs were moderate but negotiating the price was necessary. Cost depends heavily on scale. According to PeerSpot users, pricing is not fixed and is based more on machines than users.
Which other solutions did I evaluate?
We evaluated several options before selecting Check Point Infinity. We evaluated Palo Alto Networks, specifically NGFW, since it is a strong all-around security platform. We also evaluated Fortinet, especially Fortinet firewalls for network security, and Microsoft Security.
What other advice do I have?
The advice I would give to others for Check Point Infinity is to first run a pilot test. Test its AI-led threat prevention, workflows, and unified portal in a small but realistic environment. Negotiate licenses carefully since cost can scale with modules and users. Invest in team training to understand policy tuning and alert handling. Use automation early to reduce manual work. Finally, regularly review and optimize your security rules and reporting dashboard to maximize value.
Check Point Infinity is a strong, comprehensive security platform. Its AI-driven threat prevention, unified management, and scalability make it reliable for hybrid environments. Automation and managed services save time and improve response. The main areas for improvements are alert management and documentation. Despite that, it has significantly strengthened our security posture and streamlined operations. I would recommend it to organizations seeking robust, all-in-one cybersecurity coverage. I would rate this product a 7 out of 10.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Unifying security tools has streamlined responses and reduced complexity
What is our primary use case?
Check Point Infinity is used in our environment to unify security across network, cloud, including AWS and Azure, and endpoints under a single architecture. It is used most often to protect against advanced threats by leveraging real-time threat intelligence and automated prevention. It helps reduce complexity because instead of managing multiple disconnected products, one integrated solution covers firewall, endpoint protection, email security, and cloud workloads.
A specific example of how Check Point Infinity was used in the environment was during a phishing campaign that targeted several employees with email containing malicious attachments. The system automatically detected the threat across email and endpoint channels and blocked the attachment before it could be opened. At the same time, the firewall component prevented the compromised domain from being reached, which stopped the attack from spreading. This unified response saved the team a lot of time because coordination between different products was not necessary, and this solution is centralized in one portal.
Check Point Infinity fits into the daily workflow by reducing the need to jump between different security consoles. Previously, separate tools existed for firewall, endpoints, and email protection, which made monitoring and response slower. Now, everything is centralized, so the team can quickly see alerts, investigate incidents, and apply policies from one place. This saves time and helps the team stay focused on other IT priorities while still maintaining strong security.
What is most valuable?
The automation and orchestration that Check Point Infinity brings to ease of response is invaluable. Instead of teams manually chasing down alerts across different systems, Check Point Infinity can automatically correlate events and apply prevention measures across endpoints, network, clouds, and applications at the same time.
Check Point Infinity has positively impacted the organization because it has allowed the consolidation of multiple security tools into one unified platform, which immediately reduced complexity and saved time for the team and IT department.
The team has definitely noticed a significant difference since switching to Check Point Infinity. Incident response is much faster because alerts are consolidated in one console.
What needs improvement?
One area where Check Point Infinity could be improved is its user interface. It brings together a lot of powerful features, but sometimes the console feels overwhelming and requires extra time to navigate.
The documentation of Check Point Infinity is not always intuitive.
Integration with third-party tools is an area that could make Check Point Infinity even stronger.
For how long have I used the solution?
Check Point Infinity has been in use for around six years.
What do I think about the stability of the solution?
Check Point Infinity is stable.
What do I think about the scalability of the solution?
Check Point Infinity's scalability is good.
How are customer service and support?
Customer support for Check Point Infinity is excellent because it is very fast.
What was our ROI?
The time saved is considered a significant return on investment.
What other advice do I have?
My advice for others looking into using Check Point Infinity is that when the company needs to protect different options or tools, they should have them centralized in Check Point Infinity portal. Centralized tools and security through Check Point Infinity are important considerations. I would rate this product 9 out of 10.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Advanced Features and Centralized Security Management Shine
What do you like best about the product?
Product is liked because of its advanced features which basically involves Centralized Security Management to manage policies, logs and threat intelligenge via one console, Excellent Visibility and Reporting.
What do you dislike about the product?
There are not may things to dislike about the product as compared to vendors but there are few which involves high pricing, complex licensing and customer support is not so good as compared to other vendors.
What problems is the product solving and how is that benefiting you?
Checkpoint Infinity platform is solving many issues such as Centralized management for all the gateways devices, policies management, user management, logs management and many more.
Unified Security Management with Powerful AI Threat Prevention
What do you like best about the product?
Check Point Infinity Platform offers superior security efficacy and a unified management experience through the Infinity Portal. Key advantages include its AI-powered threat prevention, seamless integration across the entire security landscape, and a single, intuitive console for managing networks, cloud, and endpoints, which simplifies operations and enhances user experience.
What do you dislike about the product?
Check Point Infinity Platform include its high cost, especially for smaller organizations, and its complexity, which can lead to a steep learning curve and overwhelming management. Other drawbacks are the potential for long resolution times for support, occasional issues with documentation, and the platform's dependency on cloud infrastructure.
What problems is the product solving and how is that benefiting you?
he Check Point Infinity Platform addresses core cybersecurity challenges such as managing complex, hybrid IT environments with siloed security tools, the escalation of sophisticated cyber attacks, and the need to demonstrate cost-effectiveness and meet compliance mandates.
Seamless Hybrid Security Integration Across All Environments
What do you like best about the product?
The Check Point Infinity Platform’s seamless integration across on-premises and cloud environments is what stands out most. It ensures consistent protection whether workloads are running in data centers, private clouds, or public cloud providers, which is essential for hybrid architectures.
What do you dislike about the product?
While the Infinity Platform offers strong integration and security capabilities, the management interface can be complex at first, especially when dealing with multiple gateways and policies. Some updates and configuration changes require careful coordination to avoid downtime. Improved automation and clearer documentation would make it even better.
What problems is the product solving and how is that benefiting you?
The Infinity Platform addresses the challenge of fragmented security environments. Before, we had separate tools for network, endpoint, and cloud protection, which created gaps and extra management overhead. Now, Infinity provides one dashboard for threat visibility, real-time intelligence through ThreatCloud AI, and consistent policy enforcement across all systems. It saves time, reduces configuration errors, and enhances threat detection accuracy.