Try our new research platform with insights from 80,000+ expert users
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited
Real User
Top 5
Well tested with good security and threat protection
Pros and Cons
  • "It provides fantastic visibility of security incidents through deconstructing and dissecting the threat's infection protocol."
  • "The management console has given us some trouble, and the documentation is a little bit rigid in its solution paths."

What is our primary use case?

As part of a large organization, this product gained the visibility of our security team thanks to its reputation of having the most advanced technology against the latest cyber threats. 

It protects everything, from cloud and company networks to endpoints and mobile devices, by adopting Check Point Infinity security architecture as a strategy to neutralize fifth-generation threats that spread fast and at a large scale through different vectors. 

We also saved money in our security implementation measures with this solution.

How has it helped my organization?

Check Point Infinity's security framework requires all users to be authorized and authenticated regardless they're from within or outside the organization. In order to maintain or gain more access to applications and data, the users have to be continuously validated by posture and security checkpoints as if there was no traditional network edge. Whether the network's in the cloud, local, both, or hybrid, and regardless of the location of the worker, the solution is comprehensive to the digital transformation taking place. It opens lots of backdoors and exposes gaps consequence of non-stop data sharing.

What is most valuable?

You can tell this product's standards have gone through heavy validation and testing; it's always verifying access from all resources at all times. If a breach happens, it minimizes its impact, which is a determining factor of its efficiency (worst-case scenario behavior), and incorporates the data to strategize on the best possible responses with the most accurate neutralizing actions. It provides fantastic visibility of security incidents through deconstructing and dissecting the threat's infection protocol.

What needs improvement?

The management console has given us some trouble, and the documentation is a little bit rigid in its solution paths. We could use more audiovisual material with more examples of setups and configurations to minimize the need to discover the information we need in the extensive documents we have available. 

The support team is great. However, we don't want to be constantly on the phone with a technician for Q&A or even to open tickets to design our protocols the way the company requests them.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Real User
Top 5Leaderboard
Centralizes the management of all our Check Point products in one place and offers robust stability
Pros and Cons
  • "I would rate the stability a ten out of ten. Stability is always important. I haven't faced any issues with the Infinity Portal in the last six or seven years."
  • "The updates could be less frequent."

What is our primary use case?

The Infinity Portal is primarily a management tool. It's a single pane of glass to access and control all our Check Point products from one central location.

I work extensively with the Infinity Portal. It's the central management interface for all our Check Point products.

How has it helped my organization?

It has brought value. For example, a customer already has Check Point solutions in place. Rather than opening a separate console for each product, they can use the Infinity Portal. Just open Infinity, and with a single click, they're redirected to the product they need – email security, Harmony Connect, Harmony Internet Access, for example. It eliminates the need to open multiple interfaces.

It's how we manage products like Harmony Mobile, which enhances our mobile security.

Infinity is a platform. The zero-day protection capabilities would come from the specific products we use within it. 

My primary work involves Check Point firewalls and the Harmony product portfolio. We've definitely seen a lot of focus and new business growth in areas like Harmony and Arbor.

What is most valuable?

It's very easy to access and works fine for me. Centralizing the management of all our Check Point products in one place saves our team a ton of time.

Infinity is a platform rather than a specific security feature. It provides a central access point for our purchased Check Point products like Harmony Email, Harmony Connect, Harmony Browser, Harmony VPN, etc.

The unified management console enhances security operations. We manage all our products through a single console instead of needing to open separate interfaces for each one.

What needs improvement?

The updates could be less frequent. 

For how long have I used the solution?

I have been using it for six years now. 

What do I think about the stability of the solution?

I would rate the stability a ten out of ten. Stability is always important. I haven't faced any issues with the Infinity Portal in the last six or seven years.

What do I think about the scalability of the solution?

There is no need for scalability as it is a ready-made and web-based product that we got from Check Point. Most of our customers use it, for example, firewalls, Harmony product portfolio, and cloud/network security. Most of these customers find the Infinity Portal beneficial because of its convenience.

There are easily over a hundred customers. Customers already using Check Point products are, by default, using the Infinity Portal to access them. Even I use it.

How are customer service and support?

The customer service and support are very good. It is very fast and customer friendly. It has been very friendly. 

How was the initial setup?

It's incredibly easy. Once you have a Check Point account, the portal is ready to use. All you need is the URL.

As a cloud-based platform, so, there wasn't easy to difficult. It is a one-minute job. There are no specific requirements for the platform. 

One of the benefits is that there's no deployment required for the Infinity Portal itself. It's accessible via a simple URL.

What's my experience with pricing, setup cost, and licensing?

There's no additional license requirement.

What other advice do I have?

Overall, I would rate the solution a ten out of ten. It's reliable, stable, and very easy for anyone to access from anywhere.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Infinity
December 2024
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
reviewer2008407 - PeerSpot reviewer
Java Developer at EROAD
User
Secure with helpful support and good performance
Pros and Cons
  • "Powerful cyber security functionalities track workflows to block all threats that may arise and affect the workflow chain."
  • "The cost of maintaining and purchasing the security components is high."

What is our primary use case?

This is a full architecture suite that provides robust protection against cyber attacks. 

It resolves growing complex connectivity challenges and networking issues that affect performance. 

Check Point Infinity ascertains the security situation across the company infrastructure to design the best solution for evading ransomware attacks. It monitors the performance of cloud-hosted containers that carry sensitive information. 

Integration with mobile applications and desktop tools took place without any downtime indicators.

How has it helped my organization?

This product has centralized all the network security operations, giving the IT department less time to monitor data workflows. 

It provides security solutions to both cloud and on-premises with less cost as compared to other applications. 

Browsing across the internet sites has been secure with Infinity

It detects any threats across the company application systems that could bring harm and destroy useful data. 

It ensures that all the cloud-hosted applications comply with security policies to enhance the secure collaboration among apps.

What is most valuable?

The security services that are provided in the organization have given departments an opportunity to focus more on productive business activities. 

The complete security set of tools enables each sector to focus on threats that are directly proportional to engaged programs. 

Powerful cyber security functionalities track workflows to block all threats that may arise and affect the workflow chain. 

It has integrated all the components in the organization with the central control system that provides comprehensive reports on work processes.

What needs improvement?

There are a few cases that arise from the customer support staff regarding the setup and operations. 

The cost of maintaining and purchasing the security components is high. 

Familiarization with the security features and operations took time, however, we are now set to enjoy all the benefits. 

So far, we are satisfied with most functionalities. We have achieved the set goals and updated our systems to comply with international security policies. It has integrated effectively with modern tools across the organization.

For how long have I used the solution?

I have been using Infinity for seven months. 

What do I think about the stability of the solution?

The reliable security architecture has boosted performance.

What do I think about the scalability of the solution?

I like the general performance and productivity.

How are customer service and support?

The team cooperates fully when contacted in order to offer any assistance. I appreciate their patience and support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the only solution that I have used in this category.

How was the initial setup?

The setup was slightly complex - especially in terms of integrations with applications.

What about the implementation team?

The implementation process was handled in-house.

What was our ROI?

Increased security infrastructure has resulted in increased ROI.

What's my experience with pricing, setup cost, and licensing?

The cost is relatively high.

Which other solutions did I evaluate?

We are evaluating other options. That said, we have not discovered a more powerful solution yet.

What other advice do I have?

I totally recommend this solution to other enterprises.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Presales Engineer at Vincacyber
Real User
Top 5Leaderboard
A solution for testing with high detection rate but lacks EDR features
Pros and Cons
  • "The detection and reaction rates are good."
  • "There is an issue with high agent size, which impacts performance."

What is our primary use case?

We use the solution for testing and conducting. For instance, we test this product using open-source samples containing different ransomware tools and another element.

What is most valuable?

The detection rate is good. It also has personal management that provides all the details on one dashboard. Depending upon the requirements, you can customize the dashboard. The visibility part is also very good. It can customised. The reaction rate is good.

What needs improvement?

There is an issue with high agent size, which impacts performance. The EDR part should provide more features.

For how long have I used the solution?

I have been using Check Point Infinity for 6 months.

What do I think about the scalability of the solution?

The solution’s scalability is good but complex to maintain. They need to provide technical training to the partners. Expanding the team to get expertise and hands-on solutions will be easy.

How are customer service and support?

Support is not that much good. Response time is very high. Some issues take a few days to resolve.

How was the initial setup?

The initial setup is neither easy nor complex. Any technical user can quickly deploy it. You need two to three resources to monitor and support the solution for a thousand assets. We use email deployment and data deployment. You don't use manual deployment. It is challenging for multiple users.

What was our ROI?

Check Point is a universal solution with multiple features that customers expect in one product to meet all the requirements.

What's my experience with pricing, setup cost, and licensing?

The product has moderate pricing depending on the devices. The OEM's services are quite high.

What other advice do I have?

We are a cybersecurity company providing solutions for our customers. We tested the Check Point solution, not just as a solution provider but also to assess cybersecurity for Check Point. We tested various products and have found that the Check Point endpoint protection offers multiple capabilities. It covers postal management, DDR capabilities, and many other features, such as cloud assessment and sandboxing in the cloud.

They should have a dedicated team or take services from third-party sources to maintain the solution. They can have this solution for endpoint protection and mobile protection.

We can customize the dashboard to meet our needs. We can tailor the dashboard to display the information we need depending on our requirements.

Overall, I rate the solution a seven out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Flag as inappropriate
PeerSpot user
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Helps with monitoring, reinforces security architecture, and allows for real-time threat prevention
Pros and Cons
  • "It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security."
  • "One of the main improvements that can be made is the latency in the portal."

What is our primary use case?

At the end of 2020, the company was growing its staff. In addition, the pandemic was beginning, and as a result of these two factors, the company needed to protect the organization. It was there that the Check Point Infinity tool was used. 

It is characterized as a great tool against the latest generation of cyber attacks all these attacks are found on mobile devices, endpoints, etc. Always in the security part, companies must be aware of technologies since it is an essential part of organizations, and Check Point Infinity is an excellent tool for these functions.

How has it helped my organization?

The Check Point Infinity tool came in to reinforce security in the organization since a basic security had been implemented that put our data at risk. Using these new technologies, it has also focused on zero-trust and is able to generate complexity and security gaps in the platform of the organization so we can avoid future attacks and errors and be able to provide a quick solution. 

Infinity contains all the modern Check Point components like DLP, IPS, VPN, etc. We currently use R80.10 and it helped us a lot with security and implementations.

What is most valuable?

It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security, those characteristics that it has that different cover devices regardless of the brand, also to help us maintain full control of our employees' devices and thus be able to monitor and ensure more and more security breaches. Infinity helped us a lot in real-time threat prevention, and with continuous updates, it is one of the most important points of all Check Point solutions.

What needs improvement?

One of the main improvements that can be made is the latency in the portal. It is one of the most common errors of the Check Point tools, another of the improvements is that the unlimited licenses are based on the number of users. This confuses larger organizations, where not all users need all services. 

Finally, they must improve the technical support they provide to users since we have opened several cases and they take time to attend to them or contact us, and in certain cases, they do not provide a quick solution. They take a long time to solve the error problem in question, which is worrying since, due to this inefficiency, they could attack the organization since there may be a gap in the infrastructure of the organization.

For how long have I used the solution?

The tool was implemented four years ago.

What do I think about the stability of the solution?

In recent years, the stabilized one has done very well. The only thing is the latency to the portal, however, in general, it has behaved very well.

What do I think about the scalability of the solution?

Regarding the scalability of the tool, it is very scalable depending on your implementation.

How are customer service and support?

The experience with support has not been very good since we have had problems with support. It took a long time to answer or solve a problem.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not have any professional security tools.

How was the initial setup?

The implementation was very simple and fast. All you have to do is meet the primary requirements.

What about the implementation team?

The implementation was done in conjunction with the supplier and an internal engineer. The experience was very good; he knew how to do his job.

What was our ROI?

The director of the company will be continuity since if it were not safe there would have been losses.

What's my experience with pricing, setup cost, and licensing?

Check Point maintains competitive prices in the market. It must be taken into account that for the security of an organization is very important to invest in.

Which other solutions did I evaluate?

Check Point Infinity was one of the first options we had in mind due to its great reach in the security market.

What other advice do I have?

The only thing would be to improve the latency in the graphical interface and technical support.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Michael Mugagga - PeerSpot reviewer
Systems Integrator at Africa Dataedge
User
Top 10
Easy to deploy with a nice GUI and good AI
Pros and Cons
  • "The sandblast threat emulation is great."
  • "We'd like to see support for fiber connections."

What is our primary use case?

We required a first line of defense to protect, monitor, and ensure that no confidential information leaves the internal network. We also required a device that can segment our network so that different subnets like the DMZ, Production network, and testing environments. Threat prevention that required AI and ML capabilities was another reason to acquire the Check Point Quantum Spark NGFW. Finally, it offers an all-in-one solution that was a necessity where the same instance could manage and monitor VPNs, application control, web filtering, intrusion detection, and email security.

How has it helped my organization?

With Check Point Quantum Spark, we have a first line of defense in our environment, seated just after the router that connects to the ISP's endpoint, all traffic entering and leaving the network is monitored, and filtered depending on the different rules created. 

The functionality of AI helps further in the threat detection field. This NGFW is able to support a large number of VPN connections and at the same time monitor these connections for any anomaly. 

Finally, for any flagged threats, a sandbox functionality is also provided making it even more robust in detecting zero-day attacks.

What is most valuable?

The sandblast threat emulation is great. We are able to visualize the extent of specific threats without necessarily having them deployed in our environment. The Sandbox feature is able to virtualize an environment that can mirror what we have in the internal environment.

The quality of Service for different traffic types is excellent. We are able to prioritize business-critical traffic over other types of traffic like streaming.

Artificial intelligence threat profiling has helped a lot in detecting and protecting the internal network from zero-day, DNS, and DDoS attacks. 

What needs improvement?

We'd like to see support for fiber connections. With the growth of the network, we would expect that more and more traffic is going through this device and soon enough, the bottleneck will be the type of connection being used to transfer data to the router and further to the ISP. A throughput of 1GBPS will hinder performance on the network.

Configuring fault tolerance for specific features, for example, power sources would ensure that the chances of the system shutting down due to a power surge are highly limited. This can further increase the SLA to 99.99%

For how long have I used the solution?

We've used the solution for three years and we just recently upgraded to the 1535 series.

What do I think about the stability of the solution?

The system is stable and able to perform with the advised load without fail. 

What do I think about the scalability of the solution?

Quantum Spark is designed for small to medium businesses. With this in mind, the scalability is perfect and will support up to a firewall throughput of 1GBPS which is favorable for an SMB.

How are customer service and support?

The Check Point customer service is prompt and with their knowledge base, the majority of the issues incurred are already cleared noted with a list of multiple solutions. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously we used the Sophos XGS series. The Sophos XGS firewall no longer met the business' growing needs as it further led to a slowness in the performance of the network hence the search for a new system that would fix this.

How was the initial setup?

The initial setup was straightforward. Check Point's GUI interfaces are user-friendly, and it also provides a lot of information on setting up their devices.

What about the implementation team?

This was an in-house deployment. 

What was our ROI?

With the increased internal network performance and a decrease in the threats being exposed to the network; the return on investment for this is roughly in the range of 40% to 60%.

What's my experience with pricing, setup cost, and licensing?

Quantum Spark has different subscription models where you can add more functionality as required. For a constrained budget, you can specifically pick out the functionalities you want, and pay for that.

Which other solutions did I evaluate?

We also considered:

  • Cisco ASA 5500 series
  • Cisco FirePower 1000s

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Senior Network/Security Engineer at Skywind Group
Real User
Offers a unified security approach that provides full control over users and what they can do
Pros and Cons
  • "We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure."
  • "I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

How has it helped my organization?

The "Infinity" is not some standalone security solution, but the way you plan and implement the whole security infrastructure of your company. It contains all the modern components from Check Point. 

In our company, we use the hardware appliances, Next-Generation Firewalls, with a bunch of blades activated (DLP, IPS, VPN, etc.) to protect the data centers. Our data centers are controlled by the Check Point Security management, with the current version being R80.10. These are the basic building blocks of Check Point Infinity, and they work just great together. They also allow for the future extension and we are thinking about adding the Anti-DDOS protection on the edge of our environments. 

We are fully satisfied with the abilities it provides and the general approach of the Check Point solutions.

What is most valuable?

The Check Point Infinity architecture is the unified approach for building the unified security infrastructure of our company. I like that it covers all the pieces of the modern enterprise organization security needs including offices and data centers, public cloud environments, and the interconnects between them. It also protects end-user devices such as laptops, smartphones, and tablets.

We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure. I also like that all of the components are tightly integrated and there is a single endpoint to control all the elements. This is called the Smart Console.

What needs improvement?

Even though we have had several support cases opened for the components of the Check Point Infinity architecture, as an administrator, I'm satisfied with the solution and the abilities it provides. I can't describe any disadvantages at the moment, except for the overall price of purchasing and maintaining the entire set of components.

I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain. Maintenance requires that the licenses and the support services be prolonged regularly.

Alternatively, they should create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers.

For how long have I used the solution?

We have been using the Check Point Infinity for about three years, starting in late 2017.

What do I think about the stability of the solution?

All of the components in Check Point Infinity are mature and stable and we have not encountered any issue with that.

What do I think about the scalability of the solution?

The solution scales well with the hardware we have, and we see that scalability, the Active-Active HA mode, doesn't affect the overall performance much after activation.

How are customer service and technical support?

We have had several support cases opened, but none of them were connected with the Check Point Mobile Access Software Blade. Some of the issues were resolved by installing the latest recommended JumoHotfix, whereas some required additional configuration at the OS kernel level.

The longest issue took about one month to be resolved, which we consider too long.

Which solution did I use previously and why did I switch?

We have not used any solution of this kind before.

How was the initial setup?

The setup was straightforward. The configuration was easy and understandable, and we relied heavily on built-in objects and groups.

What about the implementation team?

Our deployment was completed by our in-house team. We have a Check Point Certified engineer working in the engineering team.

What's my experience with pricing, setup cost, and licensing?

Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.

Which other solutions did I evaluate?

We decided to stick to the Check Point Infinity after the demo with the vendor.

What other advice do I have?

The Check Point Infinity security architecture is a robust and modern security solution for organizations of any size, but make sure that you have a dedicated budget to maintain it. It is really not cheap.

Also, it is better to have a dedicated and certified Check Point specialist in your engineering team, since the solution is complex.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Erick Chinchilla Mena - PeerSpot reviewer
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Real User
Great protection with centralized segmentation and management
Pros and Cons
  • "Infinity has come to give us total protection."
  • "In the future, I would like to see new developments that allow us to centralize the cloud."

What is our primary use case?

Today we have the need to protect various infrastructures we have. We have infrastructure on-premise and in the cloud, and we have a variety of branches. All of the infrastructures has demanded greater security from us. We needed a new and evolved way of managing equipment and the security of our infrastructure. As a result of all these concerns, we have been adopting innovative security technologies, and this is where we have added additional value to the protection that we want to give to each of the places where we have hosted data and information. We have been adopting the themes of Infinity Cloud to have total protection.

How has it helped my organization?

Infinity has come to give us total protection. It has come to cover branches, devices, infrastructure, different clouds, and various types of sites where we host data, and we need to share it between the different regions we have a presence in. It has given us the protection that we did not have before.

The segmentation and management came in decentralized, which means that this has given us protection while providing the ability to centralize a single portal for our security teams so that each one of them can administer and manage everything. Infinity is of great value as it can centralize all those dashboards. Before we had them separate.

What is most valuable?

Everyone who uses Check Point products has been realizing that it has been innovating in immense ways. Before we had the perimeter network administration teams in one place, with the management of mobile devices or web browsing handled separately. Today, we have them in a centralized place and are managing (in different tabs) the security of each of its devices, branches, clouds, etc. It is a more efficient way to take advantage of all the computing power and intelligence behind it. And it has additional AI.

What needs improvement?

In the future, I would like to see new developments that allow us to centralize the cloud. Infinity Cloud is one of the most powerful clouds in security where a number of sites or technological capabilities have been established to protect our networks, our equipment, and our infrastructure, however, in the future what we could have is a comprehensive and novel way for new or additional features to protect services such as blockchain or web services3.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Infinity Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2024
Buyer's Guide
Download our free Check Point Infinity Report and get advice and tips from experienced pros sharing their opinions.