Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Infinity GenAI Protect

Check Point Software Technologies

Reviews from AWS customer

5 AWS reviews

External reviews

65 reviews
from and

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    Ruben Cordero

Unified threat prevention and centralized management have streamlined security operations and improved efficiency

  • November 22, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use for Check Point Infinity is unified security management across multiple environments. I use it most often to protect email, endpoints, and cloud applications under a single infrastructure architecture. It has reduced problems and improved visibility. Having everything integrated means threats are detected and blocked faster, while policies stay consistent across the organization.

Unified security management made a real difference during a phishing campaign that targeted both email and cloud collaboration tools at the same time. Because everything was integrated under one platform, the alerts came through in a single dashboard, and the policies applied consistently across endpoints, email, and cloud apps. This allowed my team to quickly identify the scope of the attack, block the malicious links, and prevent data exposure without having to jump between different systems.

I also use Check Point Infinity to simplify compliance reporting and strengthen cloud security. Having one platform that covers endpoints, gateways, and other applications, I can apply consistent policies and generate reports that auditors find clear.

What is most valuable?

One of the best features for me is unified threat prevention and centralized management.

Unified threat prevention and centralized management have helped my team day-to-day by reducing the time spent switching between different tools and dashboards. For example, when I had to investigate suspicious traffic across endpoints, gateways, or events in the VPN, everything was visible in one place. We could quickly trace the issue and apply consistent policies without delays.

Check Point Infinity has positively impacted my organization by streamlining security prevention and strengthening our overall posture. With everything managed under one platform, I've noticed clear improvements in efficiency since my team no longer has to juggle multiple tools or dashboards. I've also seen cost savings by consolidating licensing and reducing the need for separate solutions. By consolidating multiple tools into one platform, my team saves several hours each week that used to be spent switching between dashboards and managing separate policies. The unified platform has also reduced troubleshooting time during incidents.

What needs improvement?

The addition of languages for the support could improve Check Point Infinity. Support is currently only available in English. I suggest adding additional language support.

For how long have I used the solution?

I have been using Check Point Infinity for around six years.

What other advice do I have?

I rate Check Point Infinity a nine out of ten because I think about the language, as support is only in English. I believe different languages could be incorporated into the support. Check Point Infinity is an excellent tool because it centralizes multiple solutions in one portal. It is very important for all IT administrator teams. I recommend this tool.


    Cristopher Z

Centralized threat prevention and faster incident response have improved operational efficiency

  • November 21, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Infinity is unified threat prevention, centralized management, and end-to-end protection across network, cloud, and endpoint environments.

What is most valuable?

The best features Check Point Infinity offers are its unified threat prevention and centralized management, which make daily operation much simpler.

Centralized management makes daily operations simpler by allowing me to control policies and monitor threats from one console instead of juggling multiple tools. It streamlines tasks like updating firewall rules, applying endpoint protection, and managing VPN access for remote users. We can quickly push consistent security settings across network and cloud environments, which saves time and reduces errors.

Another feature I find particularly valuable in Check Point Infinity is the threat intelligence integration that keeps our defenses updated against new attacks, providing real-time insights that help us adapt quickly and block emerging threats before they impact users.

Since implementing Check Point Infinity, we have noticed a clear improvement in our overall security posture and efficiency because the unified threat prevention reduced the need for multiple point security and simplified daily operation through centralized management.

What needs improvement?

I think Check Point Infinity could be improved in terms of documentation. I need more images and pictures, and the steps should be more intuitive.

Another improvement I would like to see in Check Point Infinity is a more streamlined onboarding process for new administrators since the initial setup can feel complex. Better documentation and guided tutorials would make adoption faster and easier.

For how long have I used the solution?

I have been using Check Point Infinity for around three and a half years.

What do I think about the stability of the solution?

Check Point Infinity is stable in my experience.

What do I think about the scalability of the solution?

The scalability of Check Point Infinity is impressive.

How are customer service and support?

The customer support for Check Point Infinity is very fast when handling different tickets.

How would you rate customer service and support?

Neutral

What was our ROI?

The metric we track for our return on investment is time saved.

I save time with Check Point Infinity because it allows employees to have more free time during the day without any problems related to security.

What's my experience with pricing, setup cost, and licensing?

I had a great experience with pricing, setup cost, and licensing, with no problems encountered at all.

What other advice do I have?

A recent scenario where Check Point Infinity was especially helpful was during a phishing campaign targeting our employees, where the solution quickly blocked malicious email and prevented access to harmful links across both network and endpoint devices. The centralized management console allowed us to monitor the incidents in real-time and apply consistent policies without delays. This not only protected sensitive data, but also reduced downtime and gave our team confidence that threats were contained effectively.

A second example is focused on cloud workloads and remote users, illustrating that we have a variety of things to consider.

In practice, Check Point Infinity helps us protect cloud workloads by applying consistent security policies across Azure environments while also monitoring traffic for advanced threats. For remote users, it provides secure VPN access and endpoint protection that ensures they can connect safely from anywhere without exposing the network.

We have seen a measurable reduction in security incidents and phishing attempts reaching users, leading to improved response times because alerts are centralized and easier to track, which allows faster action. The unified policies across network, cloud, and endpoint environments have lowered misconfigurations and reduced downtime.

I advise others looking into using Check Point Infinity that it is a great tool for centralizing different kinds of security tools by Check Point. It is an excellent idea and provides centralized security. Check Point Infinity centralized is excellent.

I would rate this product an eight out of ten.


    Luis Zamora

Unifying security tools has streamlined responses and reduced complexity

  • November 19, 2025
  • Review from a verified AWS customer

What is our primary use case?

Check Point Infinity is used in our environment to unify security across network, cloud, including AWS and Azure, and endpoints under a single architecture. It is used most often to protect against advanced threats by leveraging real-time threat intelligence and automated prevention. It helps reduce complexity because instead of managing multiple disconnected products, one integrated solution covers firewall, endpoint protection, email security, and cloud workloads.

A specific example of how Check Point Infinity was used in the environment was during a phishing campaign that targeted several employees with email containing malicious attachments. The system automatically detected the threat across email and endpoint channels and blocked the attachment before it could be opened. At the same time, the firewall component prevented the compromised domain from being reached, which stopped the attack from spreading. This unified response saved the team a lot of time because coordination between different products was not necessary, and this solution is centralized in one portal.

Check Point Infinity fits into the daily workflow by reducing the need to jump between different security consoles. Previously, separate tools existed for firewall, endpoints, and email protection, which made monitoring and response slower. Now, everything is centralized, so the team can quickly see alerts, investigate incidents, and apply policies from one place. This saves time and helps the team stay focused on other IT priorities while still maintaining strong security.

What is most valuable?

The automation and orchestration that Check Point Infinity brings to ease of response is invaluable. Instead of teams manually chasing down alerts across different systems, Check Point Infinity can automatically correlate events and apply prevention measures across endpoints, network, clouds, and applications at the same time.

Check Point Infinity has positively impacted the organization because it has allowed the consolidation of multiple security tools into one unified platform, which immediately reduced complexity and saved time for the team and IT department.

The team has definitely noticed a significant difference since switching to Check Point Infinity. Incident response is much faster because alerts are consolidated in one console.

What needs improvement?

One area where Check Point Infinity could be improved is its user interface. It brings together a lot of powerful features, but sometimes the console feels overwhelming and requires extra time to navigate.

The documentation of Check Point Infinity is not always intuitive.

Integration with third-party tools is an area that could make Check Point Infinity even stronger.

For how long have I used the solution?

Check Point Infinity has been in use for around six years.

What do I think about the stability of the solution?

Check Point Infinity is stable.

What do I think about the scalability of the solution?

Check Point Infinity's scalability is good.

How are customer service and support?

Customer support for Check Point Infinity is excellent because it is very fast.

What was our ROI?

The time saved is considered a significant return on investment.

What other advice do I have?

My advice for others looking into using Check Point Infinity is that when the company needs to protect different options or tools, they should have them centralized in Check Point Infinity portal. Centralized tools and security through Check Point Infinity are important considerations. I would rate this product 9 out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Nitin Y.

Advanced Features and Centralized Security Management Shine

  • November 18, 2025
  • Review provided by G2

What do you like best about the product?
Product is liked because of its advanced features which basically involves Centralized Security Management to manage policies, logs and threat intelligenge via one console, Excellent Visibility and Reporting.
What do you dislike about the product?
There are not may things to dislike about the product as compared to vendors but there are few which involves high pricing, complex licensing and customer support is not so good as compared to other vendors.
What problems is the product solving and how is that benefiting you?
Checkpoint Infinity platform is solving many issues such as Centralized management for all the gateways devices, policies management, user management, logs management and many more.


    Mzumbado

Helps prevent advanced threats and reduce incident response times through unified security policies

  • November 15, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Infinity is designing to provide unified protection across networks, cloud, mobile, and points environments, and its main use case is preventing advanced cyber threats by consolidating multiple security layers in one integration solution.

For example, I use Check Point Infinity in a typical day when employees connect remotely; as soon as someone logs in through VPN, Infinity automatically enforces security policies, scans traffic for malware, and blocks suspicious attacks in real time.

What is most valuable?

The best feature Check Point Infinity offers for me is threat prevention, which is effective at blocking malware, ransomware, and phishing, as well as preventing zero-day attacks before they reach users or systems.

For our team, the threat prevention in Check Point Infinity works by layering multiple defenses that stop attacks before they reach users or systems, and the most effective feature for us is the specific SandBlast Zero-Day Prevention, which uses advanced sandboxing and threat emulation to detonate suspicious files in a safe environment.

Check Point Infinity has impacted my organization positively, as I have seen a reduction in security incidents and response times, with threats that used to slip through different point solutions now being blocked automatically thanks to the unified prevention layers.

What needs improvement?

I think Check Point Infinity needs to improve the documentation for deploying it the first time, making it more intuitive and providing better facilities for searching different investigations or deployments about this product.

Another improvement that would make our experience smoother with Check Point Infinity is simplifying the initial setup and configuration process; while powerful, it can feel overwhelming for smaller teams without dedicated security engineers, so more guides, wizards, or automatic best practice templates would be helpful.

For how long have I used the solution?

I have been using Check Point Infinity for around four years.

What do I think about the stability of the solution?

Check Point Infinity is very stable.

What do I think about the scalability of the solution?

Check Point Infinity's scalability is good in my experience.

How are customer service and support?

The customer support is very fast, and I do not have problems with it.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I did not use a different solution before Check Point Infinity.

How was the initial setup?

Another improvement that would make our experience smoother with Check Point Infinity is simplifying the initial setup and configuration process; while powerful, it can feel overwhelming for smaller teams without dedicated security engineers, so more guides, wizards, or automatic best practice templates would be helpful.

What was our ROI?

The best metric regarding return on investment is time saved, as employees have more free time when I need to investigate different threats on the job.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing is great because I do not have any problem with the pricing; for me, it is good.

Which other solutions did I evaluate?

I did not evaluate other options before choosing Check Point Infinity.

What other advice do I have?

Check Point Infinity is a centralized solution; it is a great perimeter and combines other tools into the portal, which presents a great opportunity for me to make my company, network, and organization better. I would rate this product a 9 out of 10.


    Sonu S.

Seamless Hybrid Security Integration Across All Environments

  • November 13, 2025
  • Review provided by G2

What do you like best about the product?
The Check Point Infinity Platform’s seamless integration across on-premises and cloud environments is what stands out most. It ensures consistent protection whether workloads are running in data centers, private clouds, or public cloud providers, which is essential for hybrid architectures.
What do you dislike about the product?
While the Infinity Platform offers strong integration and security capabilities, the management interface can be complex at first, especially when dealing with multiple gateways and policies. Some updates and configuration changes require careful coordination to avoid downtime. Improved automation and clearer documentation would make it even better.
What problems is the product solving and how is that benefiting you?
The Infinity Platform addresses the challenge of fragmented security environments. Before, we had separate tools for network, endpoint, and cloud protection, which created gaps and extra management overhead. Now, Infinity provides one dashboard for threat visibility, real-time intelligence through ThreatCloud AI, and consistent policy enforcement across all systems. It saves time, reduces configuration errors, and enhances threat detection accuracy.


    C. Sanchez

Centralized monitoring and unified policy management have accelerated incident response across hybrid environments

  • November 13, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Infinity is to centralize and streamline our security operations across both cloud and on-premise environments.

I use Check Point Infinity for monitoring and managing security alerts across a hybrid infrastructure, since we have resources both in Azure and on-premise, and it helps consolidate visibility into a single dashboard.

Check Point Infinity has helped us simplify policy management across different environments.

What is most valuable?

The best features that Check Point Infinity offers include an intuitive interface that is accessible from anywhere, with the Azure Infinity portal hosting multiple security solutions under one roof.

Since adopting Check Point Infinity, I have seen a noticeable improvement in how we manage and respond to security threats across our infrastructure.

I have observed saved time by the support department.

What needs improvement?

One area where Check Point Infinity could improve is in the reporting and analytics customization.

I would definitely expand the reporting and analytics side, as while Check Point Infinity does a solid job of aggregating logs and presenting threat data, the customization options for dashboards and reports could be more flexible.

For how long have I used the solution?

I have been working in my current field for three years.

What other advice do I have?

The main cloud provider we use is Azure.

Some hosts we purchase Check Point Infinity through the Azure Marketplace and others directly in the Check Point Infinity portal.

My advice to others looking into using Check Point Infinity is that it is a great centralized security tool. I would rate this review a 9.


    Abhinandan Yadav

Has simplified multi-location security management through a unified cloud dashboard

  • November 08, 2025
  • Review provided by PeerSpot

What is our primary use case?

I use Check Point Infinity Portal for my multiple locations and manage them via a single dashboard.

What is most valuable?

Check Point Infinity Portal is a cloud-based SaaS platform that serves as a unified security management control for an organization's entire infrastructure, including network, cloud, endpoint, mobile, and IoT. It provides a single pane of glass view across network, cloud, endpoint, and mobile security with simplified management.

What needs improvement?

Sometimes when Check Point Infinity cloud is stuck and the policy takes a long time to push, this is not a good feature.

For how long have I used the solution?

I have been using Check Point Infinity Portal for the last one year.

What do I think about the stability of the solution?

I have experienced issues where the cloud team has indicated there is a cloud issue affecting policy deployment.

What other advice do I have?

I advise others looking into using Check Point Infinity to understand which part of their environment they want to secure, whether that is network gateway, cloud workload, endpoint, mobile, or IoT, as Check Point Infinity platform offers broad coverage across all those areas. Establishing clear goals such as improving visibility, unified policies, management, and reduction is important as it reduces management complexity and consolidates control into a single platform. I would rate this solution a 9.


    Raxit M.

All-in-One Checkpoint Management with Powerful Automation

  • November 08, 2025
  • Review provided by G2

What do you like best about the product?
It provides all in one access to the checkpoint product. You can manage gateaway, XDR for all the endpoints and event have features to automate the task of all the in firewall and event endpoint.
What do you dislike about the product?
As it solely depends upon cloud platform, recent outage of AWS and Azure makes i susceepitlble to downtime and not able to use it.
What problems is the product solving and how is that benefiting you?
I am able to view the logs of firewall from anywhere without connecting to VPN. It helps to take down sites that are impersonating as us and also help to automate many rules in our firewall.


    K.Q

Centralized threat detection has simplified workflows and improved team collaboration

  • November 08, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Infinity is utilizing it as a unified security architecture to protect our network, cloud, and endpoints through one consolidated portal. We use it to prevent threats across multiple environments and centralized sites.

What is most valuable?

One of the best features that Check Point Infinity offers in my experience is the centralized management console. Being able to control policies, monitor threats, and manage firewalls, endpoints, and cloud security from a single pane of glass has been a game-changer. It simplifies operations and reduces the chance of misconfigurations. We also rely heavily on ThreatCloud Intelligence, which provides real-time threat data that helps us stay ahead of emerging attacks.

The centralized console has significantly improved our team's efficiency because previously we had to switch between different tools to manage firewalls, endpoints, and cloud policies. Now, everything is in one place. It has made collaboration between our network and security teams very easy, and all people see the same data in real-time. This is perfect for a SOC team operating from a centralized site.

Check Point Infinity has positively impacted my organization because since implementing it, we have seen a noticeable improvement in our overall security posture. Threat detection is faster and more accurate, and the number of false positives has dropped significantly. Our team spends less time chasing alerts and more time focused on other tasks. It is perfect for the organization and the department.

What needs improvement?

While Check Point Infinity is powerful, there are a few areas where it could be improved. The initial setup and configuration can be complex, especially when reviewing different documentation and explaining to different coworkers what to do during the implementation.

The improvements needed for Check Point Infinity include that the documentation is not intuitive, and we needed more pictures or steps to make it more intuitive for all people when deploying it for the first time.

For how long have I used the solution?

I have been using Check Point Infinity for four or five years.

What do I think about the stability of the solution?

Check Point Infinity is very stable for our company. It works great for the admins in support and the whole company.

What do I think about the scalability of the solution?

Check Point Infinity has very good scalability with no issues.

How are customer service and support?

The customer support for Check Point Infinity is very great. The last time I needed to create different kinds of support requests, it went very smoothly.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I did not previously use a different solution because I did not find the need for one before.

How was the initial setup?

My experience with pricing, setup cost, and licensing for Check Point Infinity has been great because I needed to learn about these aspects for this implementation in the past.

What was our ROI?

I have seen a return on investment because, in my experience, for the support department, it is about the time saved as support coworkers are able to do other different activities or tasks.

Which other solutions did I evaluate?

I did not evaluate other options before choosing Check Point Infinity.

What other advice do I have?

One specific scenario where Check Point Infinity made a real difference was during a phishing attempt targeting our sales teams. The platform's Threat Prevention engine flagged the suspicious email before it reached the user's inbox. It automatically quarantined the message and alerted our support team.

I want to add that it is very important for the company because Check Point Infinity combines different tools, and it is very easy to control.

My advice for others looking into using Check Point Infinity is that it has great scalability and is an important tool for your centralized security. I would rate this solution a 9 out of 10.