Today we have the need to protect various infrastructures we have. We have infrastructure on-premise and in the cloud, and we have a variety of branches. All of the infrastructures has demanded greater security from us. We needed a new and evolved way of managing equipment and the security of our infrastructure. As a result of all these concerns, we have been adopting innovative security technologies, and this is where we have added additional value to the protection that we want to give to each of the places where we have hosted data and information. We have been adopting the themes of Infinity Cloud to have total protection.
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Great protection with centralized segmentation and management
Pros and Cons
- "Infinity has come to give us total protection."
- "In the future, I would like to see new developments that allow us to centralize the cloud."
What is our primary use case?
How has it helped my organization?
Infinity has come to give us total protection. It has come to cover branches, devices, infrastructure, different clouds, and various types of sites where we host data, and we need to share it between the different regions we have a presence in. It has given us the protection that we did not have before.
The segmentation and management came in decentralized, which means that this has given us protection while providing the ability to centralize a single portal for our security teams so that each one of them can administer and manage everything. Infinity is of great value as it can centralize all those dashboards. Before we had them separate.
What is most valuable?
Everyone who uses Check Point products has been realizing that it has been innovating in immense ways. Before we had the perimeter network administration teams in one place, with the management of mobile devices or web browsing handled separately. Today, we have them in a centralized place and are managing (in different tabs) the security of each of its devices, branches, clouds, etc. It is a more efficient way to take advantage of all the computing power and intelligence behind it. And it has additional AI.
What needs improvement?
In the future, I would like to see new developments that allow us to centralize the cloud. Infinity Cloud is one of the most powerful clouds in security where a number of sites or technological capabilities have been established to protect our networks, our equipment, and our infrastructure, however, in the future what we could have is a comprehensive and novel way for new or additional features to protect services such as blockchain or web services3.
Buyer's Guide
Check Point Infinity
November 2024
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,660 professionals have used our research since 2012.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Systems Engineer at PGE
Stable platform with good technical support services
Pros and Cons
- "It is a scalable product."
- "Check Point Infinity is not compatible with Windows 8."
What is most valuable?
It is a good tool. If we plan to change the password, we don't have to change the MX Points or SPF settings, as it works with Microsoft 365. It helps us prevent losing emails.
What needs improvement?
Check Point Infinity is not compatible with Windows 8.
For how long have I used the solution?
We have been using Check Point Infinity for two months. We did a POC for it.
What do I think about the stability of the solution?
It is a stable product.
What do I think about the scalability of the solution?
It is a scalable product.
How are customer service and support?
The technical support services are good. We reach them regarding technical errors. They reply with the solutions in a few hours.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup process is complex.
What's my experience with pricing, setup cost, and licensing?
The product has good pricing considering the features and a global approach. I rate its pricing an eight out of ten.
What other advice do I have?
I rate Check Point Infinity a nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point Infinity
November 2024
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,660 professionals have used our research since 2012.
Cloud Engineer at ITQS
Reliable, good at emulating threats, and is easy to manage
Pros and Cons
- "For me, one of the best features of Check Point Infinity is to be able to have the possibility of emulating the activity of attached files with malicious content in such a short time."
- "They need to update the guides."
What is our primary use case?
As we adapt to the changes left by the pandemic, we must adapt our technologies, our equipment, and the traditional scheme in which we worked must evolve.
As a result of these changes, we have been adopting security and much of the administration with fully cloud services to be able to adapt to these changes and give greater adaptability to our technologies.
With Check Point Infinity, we have the possibility of managing our platform from the cloud. It also offers us centralization and other solutions of the same portfolio in one place, taking advantage of great advantages; it is at this point where Check Point allows us to take advantage of a secure and centralized administration.
How has it helped my organization?
Check Point Infinity is one of the solutions that has given us more value, being able to adopt their cloud where they centralize many solutions. Taking advantage of all that computing power, we assure users inside or outside the organization are safe. After all, due to the changes produced by the pandemic, we have had to evolve with security and administration.
To have a cloud such as Check Point Infinity is to have an ally that puts at our disposal many solutions from a single portal. It offers great response at the level of security.
What is most valuable?
For me, one of the best features of Check Point Infinity is to be able to have the possibility of emulating the activity of attached files with malicious content in such a short time. This capacity is of great value. Many times we want to know what an attack does and how an attack is exploited on our computers. With what we have learned from emulation we can reinforce our security lines or bases. You can learn a lot while always staying protected.
What needs improvement?
They need to update the guides. The product has improved a lot. However, its support guides are still the same as they were seven years ago. I say this from experience. For example, for configuration, it is necessary in some cases to consult these same guides and you see yourself looking at references the old information is still there.
The support for Latin America is one of those that is also a bit neglected. We are without direct technicians speaking in Spanish. In some cases and their support is fast, however, this cultural shock makes interaction difficult, and when it comes to the escalation of the problems, mainly when the cases are urgent or escalated, the most experienced technicians only speak English.
For how long have I used the solution?
I've used the solution for around two years.
What do I think about the stability of the solution?
The solution is scalable and is very complete. It centralizes everything.
What do I think about the scalability of the solution?
It is a really complete solution. It manages to cover everything in the Infinity Check Point Portal.
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
What's my experience with pricing, setup cost, and licensing?
What Check Point currently does at the security level is very good. However, some prices in reference to licenses are a bit high. An example is how they sell SSL.
Which other solutions did I evaluate?
We did not evaluate other options.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Has centralized management console but technical support lags
Pros and Cons
- "The tool's most valuable feature for threat prevention is the encryption alarm. I find the centralized management console, including the log analyzer and reports in Check Point Infinity, extremely beneficial for enhancing security and operations efficiency in our enterprise. I would rate it a perfect ten out of ten, as it effectively helps us analyze logs, and detect potential attacks."
- "The tool's technical support lags."
What is most valuable?
The tool's most valuable feature for threat prevention is the encryption alarm.
I find the centralized management console, including the log analyzer and reports in Check Point Infinity, extremely beneficial for enhancing security and operations efficiency in our enterprise. I would rate it a perfect ten out of ten, as it effectively helps us analyze logs, and detect potential attacks.
What needs improvement?
The tool's technical support lags.
For how long have I used the solution?
I have been using the product for six to seven months.
What do I think about the stability of the solution?
I rate the solution's stability a nine out of ten.
What do I think about the scalability of the solution?
I rate the tool's scalability an eight point five out of ten.
Which solution did I use previously and why did I switch?
We used Trend Mico before Check Point Infinity.We currently have approximately 500 endpoints deployed. So far, the system is working seamlessly, and we haven't encountered any security issues. I'm confident in the product's security features. We are currently the documentation, and the support portal has been reliable, providing us with ample resources to troubleshoot any issues.
What's my experience with pricing, setup cost, and licensing?
When it comes to price, the paramount consideration is the strength of the security. If the security measures provided by the product, such as Check Point Infinity, are robust and meet our requirements, price becomes a secondary concern.
What other advice do I have?
For those considering Check Point Infinity, my advice is to gain hands-on experience and acquire a foundational understanding of the product before diving into the implementation process. I rate it a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Mar 10, 2024
Flag as inappropriateInfinity Porta is a secure environment and has good overall functionality
Pros and Cons
- "We can add our environments and can configure and manage them easily which is why administrators are happy with this tool."
- "Check Point Infinity's web application is sometimes a little slow."
What is our primary use case?
We needed to handle the administration of the tools that we have with Check Point without the use of administration servers and from the cloud. With this product, we can centrally manage our security environments for the company through a web portal.
It is really easy to do it this way as the portal is managed directly by Check Point. We can detach ourselves from the portal and focus on the security of the infrastructure itself. The portal is extremely intuitive for admins.
How has it helped my organization?
We like the Check Point Infinity Portal's functionality. It provides us, within the license, the use of a secure environment for the administration of various manufacturer tools and we can easily, intuitively, and safely work from the web browser without having to have our own server and additional licensing to manage. In addition, this console complies with all identity security tools that prevent us from being violated by losing control of the console.
From the portal, we manage our FWs in addition to using Harmony Connect.
What is most valuable?
This web tool, or the web administration server included in the license, is really intuitive. We can add our environments and can configure and manage them easily which is why administrators are happy with this tool.
There are no additional costs, which is why it is really important for the company.
And finally, it is managed by Check Point in terms of access, availability, and security. Connecting to the portal is secure which is really providing the company with administration security.
What needs improvement?
Check Point Infinity's web application is sometimes a little slow. It really is only a little slow, however, it is perceived that it is not normal to be that way. The performance of the site could be improved depending on the capabilities it has at the moment.
There should be more documentation on these new technologies and administrative portals, in addition to including more tools from the manufacturer to finally have them all centralized to facilitate the client's administration from the same place without having any connectivity problems.
For how long have I used the solution?
We have used Check Point Infinity Portal for at least a year and have had great results. It is a centrally managed environment for many of the other Check Point tools.
Which solution did I use previously and why did I switch?
I have not previously used a solution similar to Check Point Infinity.
What's my experience with pricing, setup cost, and licensing?
The tool comes licensed with the required security tools. I recommend that new users try it as a test mode to determine if their infrastructure and the administration functionality work for them.
Which other solutions did I evaluate?
We always try to validate the competence of manufacturers in our organization in order to determine the best option. In this case, Check Point is the best option for us.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Manager at a financial services firm with 10,001+ employees
Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network
Pros and Cons
- "The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."
- "The licensing model for Check Point Infinity is not clear."
What is our primary use case?
We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors.
These sophisticated attacks are on mobile devices, endpoints, cloud, and various enterprise networks. They easily bypass the conventional, static detection-based systems used by organizations today.
The legacy perimeter-focused security approaches have become ineffective. The outdated assumption that everything inside the security perimeter can be trusted leaves organizations exposed for vulnerability and attack.
To protect the organization, we need to move up to the latest generation of cybersecurity tools. These combine real-time threat prevention, shared intelligence, and the most advanced zero-trust security across network, cloud, endpoint, and mobile devices.
How has it helped my organization?
Rebuilding security infrastructure around the Zero Trust approach, using disparate technologies might lead to complexities and inherent security gaps. To avoid errors and provide robust security, Check Point offers more practical and holistic approaches to implement Zero Trust. It is based on a single consolidated cybersecurity architecture, Check Point Infinity.
Check Point provides different solutions to protect organizations at each level. They have products that can work in a silo or can be integrated with other security solutions to enhance security by mitigating risk and providing a dashboard for monitoring.
Generated logs can be sent to a SIEM solution, where a use case or action can be defined against raised alerts. Automated policies/processes can be created accordingly.
For example, if we need to block communication from a suspicious IP for which an alert has been raised, and send it to ServiceNow. We can create a playbook on the ServiceNow platform for raisings an alert, which will instruct the NGFW firewall to block the connection.
What is most valuable?
The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles.
Zero Trust Security, Check Point Infinity is an architecture provided by Check Point that includes a solution for protecting organizations at different levels.
Zero Trust Networks: The Check Point Security Gateway enables micro-segmentation across the organization's network. Integration with Identity awareness and Application Control enables policy enforcement at a granular level.
Zero Trust Workloads: Protect workloads hosted in private and public clouds, enforce compliance, detect and remediate misconfiguration.
Zero Trust People: Identity awareness enables granting access to data for authorized users with SSO and MFA.
Zero Trust Devices: Sandblast Agent Endpoint and Check Point Sandblast Mobile protect employees' mobile devices and workstations from advanced attacks, Zero-day malware, malicious app installation, and more. Network-based threat prevention protects devices from threats that are coming from the network and vice versa.
Zero Trust Data: Protect data by performing full hard disk encryption on endpoint and external media encryption on all removable storage media. Data shared to external partners over the Internet is encrypted by site-to-site VPN and client-to-site VPN.
Visibility and Analytics: The Check Point attack dashboard allows for immediate response to security incidents and provides real-time forensics for investigating events.
Automation and Orchestration: Security architecture integration with organization border IT environment enhances speed and agility, incident response, policy accuracy, and task delegation.
What needs improvement?
The licensing model for Check Point Infinity is not clear. As infinity licenses are based on the number of users, it confuses larger organizations, where not every user needs every service.
For example:
For an organization size of more than 100,000 users, where only a few users need to have access to SandBlast Mobile for protecting their BYOD devices against threats, and there are a few users that need Capsule to access corporate data, and in addition, if the organization needs to protect all of the user's email accounts using Check Point Email Security, then it creates issues in terms of the license count. It is confusing when it comes to figuring out how to fulfill the requirements.
What do I think about the stability of the solution?
Check Point solutions are stable.
What do I think about the scalability of the solution?
It's a framework, so it is scalable.
How are customer service and technical support?
The technical support is excellent.
Which solution did I use previously and why did I switch?
We are using this solution to provide having security at each level of the environment.
How was the initial setup?
Different solutions or products from Check Point are involved for creating complete this security framework.
What about the implementation team?
We deployed with an in-house team with OEM support.
What's my experience with pricing, setup cost, and licensing?
Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA).
Which other solutions did I evaluate?
We have worked with different products from Check Point and other security solutions.
What other advice do I have?
This is a security architecture. Organizations can use different Check Point solutions for protecting different environments, such as the network, email, endpoints, and more.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Chief Executive Officer at EE Solutions GmbH
Helps to connect various locations worldwide through VPN
Pros and Cons
- "Our company used Check Point Infinity to connect various locations worldwide through VPN, specifically using IPsec, rather than for cybersecurity. We implemented it in on-premises networks to collect data in data centers from different locations."
- "The solution is expensive."
What is our primary use case?
Our company used Check Point Infinity to connect various locations worldwide through VPN, specifically using IPsec, rather than for cybersecurity. We implemented it in on-premises networks to collect data in data centers from different locations.
What needs improvement?
The solution is expensive.
What do I think about the stability of the solution?
The tool is 100 percent stable.
What do I think about the scalability of the solution?
Check Point Infinity is scalable.
How was the initial setup?
The initial deployment took about a month, subsequent deployments were much faster, typically taking only a few days.
What's my experience with pricing, setup cost, and licensing?
The solution's price is quite high, and the licensing model requires extra licenses for various features like SD-WAN.
What other advice do I have?
The tool is one of the most secure and stable products, with clear administration. I rate the overall product an eight out of ten.
I recommend Check Point Infinity to others, especially if they aren't planning to use Fortinet or Palo Alto. All three solutions—Check Point Infinity, Fortinet, and Palo Alto—offer similar levels of security. However, one thing to consider is that the tool's licensing can be expensive and complex.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Aug 9, 2024
Flag as inappropriateSystems Integrator at a tech services company with 11-50 employees
Easy to deploy with a nice GUI and good AI
Pros and Cons
- "The sandblast threat emulation is great."
- "We'd like to see support for fiber connections."
What is our primary use case?
We required a first line of defense to protect, monitor, and ensure that no confidential information leaves the internal network. We also required a device that can segment our network so that different subnets like the DMZ, Production network, and testing environments. Threat prevention that required AI and ML capabilities was another reason to acquire the Check Point Quantum Spark NGFW. Finally, it offers an all-in-one solution that was a necessity where the same instance could manage and monitor VPNs, application control, web filtering, intrusion detection, and email security.
How has it helped my organization?
With Check Point Quantum Spark, we have a first line of defense in our environment, seated just after the router that connects to the ISP's endpoint, all traffic entering and leaving the network is monitored, and filtered depending on the different rules created.
The functionality of AI helps further in the threat detection field. This NGFW is able to support a large number of VPN connections and at the same time monitor these connections for any anomaly.
Finally, for any flagged threats, a sandbox functionality is also provided making it even more robust in detecting zero-day attacks.
What is most valuable?
The sandblast threat emulation is great. We are able to visualize the extent of specific threats without necessarily having them deployed in our environment. The Sandbox feature is able to virtualize an environment that can mirror what we have in the internal environment.
The quality of Service for different traffic types is excellent. We are able to prioritize business-critical traffic over other types of traffic like streaming.
Artificial intelligence threat profiling has helped a lot in detecting and protecting the internal network from zero-day, DNS, and DDoS attacks.
What needs improvement?
We'd like to see support for fiber connections. With the growth of the network, we would expect that more and more traffic is going through this device and soon enough, the bottleneck will be the type of connection being used to transfer data to the router and further to the ISP. A throughput of 1GBPS will hinder performance on the network.
Configuring fault tolerance for specific features, for example, power sources would ensure that the chances of the system shutting down due to a power surge are highly limited. This can further increase the SLA to 99.99%
For how long have I used the solution?
We've used the solution for three years and we just recently upgraded to the 1535 series.
What do I think about the stability of the solution?
The system is stable and able to perform with the advised load without fail.
What do I think about the scalability of the solution?
Quantum Spark is designed for small to medium businesses. With this in mind, the scalability is perfect and will support up to a firewall throughput of 1GBPS which is favorable for an SMB.
How are customer service and support?
The Check Point customer service is prompt and with their knowledge base, the majority of the issues incurred are already cleared noted with a list of multiple solutions.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously we used the Sophos XGS series. The Sophos XGS firewall no longer met the business' growing needs as it further led to a slowness in the performance of the network hence the search for a new system that would fix this.
How was the initial setup?
The initial setup was straightforward. Check Point's GUI interfaces are user-friendly, and it also provides a lot of information on setting up their devices.
What about the implementation team?
This was an in-house deployment.
What was our ROI?
With the increased internal network performance and a decrease in the threats being exposed to the network; the return on investment for this is roughly in the range of 40% to 60%.
What's my experience with pricing, setup cost, and licensing?
Quantum Spark has different subscription models where you can add more functionality as required. For a constrained budget, you can specifically pick out the functionalities you want, and pay for that.
Which other solutions did I evaluate?
We also considered:
- Cisco ASA 5500 series
- Cisco FirePower 1000s
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Check Point Infinity Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
Advanced Threat Protection (ATP)Popular Comparisons
Microsoft Defender for Office 365
Palo Alto Networks WildFire
Palo Alto Networks VM-Series
IRONSCALES
Buyer's Guide
Download our free Check Point Infinity Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Check Point's software compatible with other products?
- How much do independent test results affect your security purchases?
- Holding Security Vendors Accountable
- What can businesses do to improve their security posture?
- When evaluating Advanced Threat Protection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- Compromise Assessment vs Threat Hunting
- What are the main evaluation criteria for you when choosing the right vendor for brand protection services?
- Why is ATP (Advanced Threat Protection) important for companies?