Try our new research platform with insights from 80,000+ expert users

Check Point Infinity vs Cisco Secure Network Analytics comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Check Point Infinity
Average Rating
8.6
Reviews Sentiment
7.4
Number of Reviews
26
Ranking in other categories
Advanced Threat Protection (ATP) (12th)
Cisco Secure Network Analytics
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
59
Ranking in other categories
Network Monitoring Software (24th), Network Traffic Analysis (NTA) (3rd), Network Detection and Response (NDR) (5th), Cisco Security Portfolio (3rd)
 

Featured Reviews

Ashish Upadhyay - PeerSpot reviewer
Provide unified threat prevention and response across our entire decentralized finance system
While Check Point Infinity offers a robust security operations platform, it could benefit from improvements in several areas. Firstly, the platform's pricing structure can be complex, which might be prohibitive for smaller businesses, limiting its accessibility. Simplifying the pricing model or offering more flexible pricing options could make Check Point Infinity more appealing to a wider range of organizations. Secondly, alert fatigue is a common issue with platforms that have strong detection capabilities. Implementing more filtering and prioritization mechanisms can help address this issue, ensuring that security teams can focus on the most critical threats. These are the areas where I believe there's room for improvement. In future releases, I would like to add more integration features. The ability to integrate seamlessly with more third-party applications would make it more customizable for our needs and simplify the integration process. This would improve our overall threat detection capabilities.
Rainier S. - PeerSpot reviewer
You are able to drill down into a center's utilization, then create reports based on it
In the last year or two, we have been working with our Cisco NAS engineers to improve our security posturing. It is more our being proactive rather than reactive. While Stealthwatch and Lancope have this ability to look inside and give you visibility (a great feature), follow-up is the rule. We would like filters that you can put into place to tap onto certain types of behaviors, alerts out, and/or hopefully a block. This is sort of what we are looking for. I might be speaking too early, because we are not down this path yet. We know the feature set is there, we just do not know yet how to achieve it. That is proactive rather than more reactive. For Lancope Stealthwatch, we would like to see it more on the ASA Firewall platform. While this might already be available, this is more a failing of Cisco to inform us if it is there. For example: * Are we on the right or wrong version of the code? * What does the code look like? * Are we are really looking at firewalls? Or is it more about the foundation and route switches that we are seeing? It is about visibility.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure."
"I would rate the stability a ten out of ten. Stability is always important. I haven't faced any issues with the Infinity Portal in the last six or seven years."
"The solution is very stable. I would estimate it's 99.9% stable, if not more."
"Infinity has come to give us total protection."
"The initial implementation was accomplished easily and without deployment problems."
"For me, one of the best features of Check Point Infinity is to be able to have the possibility of emulating the activity of attached files with malicious content in such a short time."
"A notable aspect that I appreciate is their ongoing effort to redesign the portal, giving it a fresh and centralized appearance."
"Check Point Infinity's threat prevention capabilities benefitted our organization."
"Most of the engineers I've worked with have been really good. Very knowledgeable and easy to work with."
"The fact that it can identify down to an IP address of a system that is causing problems, or potentially causing problems, is very valuable."
"The search options on Cisco Stealthwatch are the most valuable. You can get very granular with it, down to the kilobits or the seconds if you want. The product supports any time frame that you need, so that is nice."
"The beginning of any security investigation starts with net flow data."
"It's a dependable product that is able to pinpoint where we have vulnerabilities if they occur."
"Another notable feature of Cisco Secure Network Analytics is its Layer 7 visibility, which allows us to monitor and analyze network communications at the application layer."
"The most valuable features are encrypted threat analysis and the ability to run jobs on entire flows."
"It has been pretty stable since we deployed it, and everything seems to be working fine."
 

Cons

"There is an issue with high agent size, which impacts performance."
"In the future, I would like to see new developments that allow us to centralize the cloud."
"Technical support is something that needs improvement."
"Check Point Infinity price could improve."
"Check Point Infinity is not compatible with Windows 8."
"We'd like to see support for fiber connections."
"The solution is expensive."
"The updates could be less frequent."
"We need to be able to filter out internal IPs as non-threats."
"It is time-consuming to set it up and understand how the tool works."
"We determined that Stealthwatch wouldn't provide the machine learning model that we required."
"Stealthwatch needs improvement when it comes to speed."
"Many of these tools require extensive on-premises hardware to run."
"We've run into some issues with the configuration."
"We've had problems with element licensing costs so scalability is a concern."
"There's a lot of traffic on our network that we don't see sometimes."
 

Pricing and Cost Advice

"While the initial payment might be perceived as relatively higher, the absence of hidden supplementing charges contributes to a straightforward and clear pricing model. The pricing is cheap and moderate."
"The price is moderately priced."
"The product has good pricing considering the features and a global approach."
"The flexibility in pricing is advantageous, and being a special partner allows for negotiating special rates based on the project requirements."
"I rate the product's price a six on a scale of one to ten, where one is cheap, and ten is expensive."
"When it comes to price, the paramount consideration is the strength of the security. If the security measures provided by the product, such as Check Point Infinity, are robust and meet our requirements, price becomes a secondary concern."
"The solution's price is quite high, and the licensing model requires extra licenses for various features like SD-WAN."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"It has a subscription model. There is yearly support, and there is also three-year support. It depends on what the customers want."
"Licensing is on a yearly basis."
"Our fees are approximately $3,000 USD."
"Pricing is much higher compared to other solutions."
"This is an expensive product. We have quit paying for support because we don't want to have to upgrade it and keep paying for it."
"The yearly licensing cost is about $50,000."
"The licensing costs are outrageous."
"One of the things which bugs me about Lancope is the licensing. We understand how licensing works. Our problem is when we bought and purchased most of these Lancope devices, we did so with our sister company. Somewhere within the purchase and distribution, licensing got mixed up. That is all on Cisco, and it is their responsibility. They allotted some of our sister company's equipment to us, and some of our equipment to them. To date, they have never been able to fix it."
report
Use our free recommendation engine to learn which AI-Powered Cybersecurity Platforms solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Security Firm
16%
Computer Software Company
12%
Financial Services Firm
10%
Recreational Facilities/Services Company
9%
Computer Software Company
30%
Financial Services Firm
11%
Government
8%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Infinity?
Check Point Infinity's threat prevention capabilities benefitted our organization.
What needs improvement with Check Point Infinity?
Some aspects of the reporting in Check Point may take time to learn and become comfortable with. Training is necessary for certain areas, as some features might not be as intuitive. It's important ...
What is your primary use case for Check Point Infinity?
We leveraged Check Point Infinity primarily for gateway security, cloud security, endpoint security, and infrastructure as a service.
What do you like most about Cisco Stealthwatch?
The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration.
What is your experience regarding pricing and costs for Cisco Stealthwatch?
The tool is not cheaply priced. In cybersecurity, you want an extra layer of security in your organization. Some sectors want NDR solutions, so you cannot deploy such tools everywhere, as they are ...
What needs improvement with Cisco Stealthwatch?
The expensive nature of the tool is an area of concern where improvements are required.
 

Also Known As

R80, Infinity
Cisco Stealthwatch, Cisco Stealthwatch Enterprise, Lancope StealthWatch
 

Learn More

 

Overview

 

Sample Customers

Edel AG
Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
Find out what your peers are saying about Darktrace, CrowdStrike, Palo Alto Networks and others in AI-Powered Cybersecurity Platforms. Updated: December 2024.
824,053 professionals have used our research since 2012.