Try our new research platform with insights from 80,000+ expert users

Check Point Infinity vs Cisco Secure Network Analytics comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Infinity
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
27
Ranking in other categories
Advanced Threat Protection (ATP) (12th), AI-Powered Cybersecurity Platforms (7th)
Cisco Secure Network Analytics
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
59
Ranking in other categories
Network Monitoring Software (23rd), Network Traffic Analysis (NTA) (3rd), Network Detection and Response (NDR) (4th), Cisco Security Portfolio (4th)
 

Featured Reviews

Ashish Upadhyay - PeerSpot reviewer
Provide unified threat prevention and response across our entire decentralized finance system
While Check Point Infinity offers a robust security operations platform, it could benefit from improvements in several areas. Firstly, the platform's pricing structure can be complex, which might be prohibitive for smaller businesses, limiting its accessibility. Simplifying the pricing model or offering more flexible pricing options could make Check Point Infinity more appealing to a wider range of organizations. Secondly, alert fatigue is a common issue with platforms that have strong detection capabilities. Implementing more filtering and prioritization mechanisms can help address this issue, ensuring that security teams can focus on the most critical threats. These are the areas where I believe there's room for improvement. In future releases, I would like to add more integration features. The ability to integrate seamlessly with more third-party applications would make it more customizable for our needs and simplify the integration process. This would improve our overall threat detection capabilities.
Rainier S. - PeerSpot reviewer
You are able to drill down into a center's utilization, then create reports based on it
In the last year or two, we have been working with our Cisco NAS engineers to improve our security posturing. It is more our being proactive rather than reactive. While Stealthwatch and Lancope have this ability to look inside and give you visibility (a great feature), follow-up is the rule. We would like filters that you can put into place to tap onto certain types of behaviors, alerts out, and/or hopefully a block. This is sort of what we are looking for. I might be speaking too early, because we are not down this path yet. We know the feature set is there, we just do not know yet how to achieve it. That is proactive rather than more reactive. For Lancope Stealthwatch, we would like to see it more on the ASA Firewall platform. While this might already be available, this is more a failing of Cisco to inform us if it is there. For example: * Are we on the right or wrong version of the code? * What does the code look like? * Are we are really looking at firewalls? Or is it more about the foundation and route switches that we are seeing? It is about visibility.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Infinity has come to give us total protection."
"The initial implementation was accomplished easily and without deployment problems."
"The product's excellent scalability features have allowed our organization to seamlessly adapt to the growing demand. The consensus mechanism and smart contract capabilities have optimized our workflow, resulting in an overall reduction in the complexity of our organization."
"New Check Point technologies can be found via this portal."
"Check Point Infinity offers a multi-layered security approach that enhances our IT security environment."
"The most valuable feature of Check Point Infinity is the ease of use and navigation."
"The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."
"It provides fantastic visibility of security incidents through deconstructing and dissecting the threat's infection protocol."
"It's a dependable product that is able to pinpoint where we have vulnerabilities if they occur."
"StealthWatch lets me see the ports running in and out and the country. It has excellent reporting, telemetry, and artificial intelligence features. With the telemetry, I can set thresholds to detect sudden changes and the alarms go through the PLC parts. I can see all the ports running on that trunk."
"It does change the way we troubleshoot and it is relatively easy to use once you learn it. I would recommend it to someone considering it."
"Stealthwatch has greatly improved our network visibility, in terms of bandwidth, malware, and PCI violations."
"It works efficiently for encrypted traffic analysis."
"The ability to send data flow from other places and have them all in one place is very valuable for us."
"It is a good application, providing for real-time monitoring of the organization of data. It can basically identify points of peak traffic where possible issues are being caused."
"The most valuable feature of this solution is the way the net flow is being merged together in a single pane. That's been extremely useful for us, because can see what's going on with traffic in one single place."
 

Cons

"Check Point Infinity's web application is sometimes a little slow."
"The licensing model for Check Point Infinity is not clear."
"In the future, I would like to see new developments that allow us to centralize the cloud."
"There is an issue with high agent size, which impacts performance."
"Technical support is pretty delayed."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity."
"The updates could be less frequent."
"Its granularity for RBAC roles-based access control needs improvement."
"I would like Cisco to make it easier for the administrators to use it."
"I think the interface is a little lacking. The interface seems like it just needs to be modernized. It's been the same interface now, ever since I've seen it probably four years ago."
"I would like to see a hybrid solution that can work without being connected directly to the internet for those destinations."
"Cisco could improve the administration for the customers."
"If they can make this product more web-based, that would be amazing."
"It would be better to let people know, up front, that is doesn't give you nice, clear information, as seen in the demos, without Cisco ISE installed."
"We had some trouble with the installation as we migrated from our previous solution."
 

Pricing and Cost Advice

"While the initial payment might be perceived as relatively higher, the absence of hidden supplementing charges contributes to a straightforward and clear pricing model. The pricing is cheap and moderate."
"When it comes to price, the paramount consideration is the strength of the security. If the security measures provided by the product, such as Check Point Infinity, are robust and meet our requirements, price becomes a secondary concern."
"The pricing of Check Point Infinity could be better. There is a license needed to use the solution and we pay annually."
"I rate the product's price a six on a scale of one to ten, where one is cheap, and ten is expensive."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"The flexibility in pricing is advantageous, and being a special partner allows for negotiating special rates based on the project requirements."
"The price is moderately priced."
"The solution's price is quite high, and the licensing model requires extra licenses for various features like SD-WAN."
"This is an expensive product. We have quit paying for support because we don't want to have to upgrade it and keep paying for it."
"The tool is not cheaply priced."
"The solution is expensive. It costs several hundred thousand dollars per year (depending on how many flows you are collecting)."
"It is worth the cost."
"Licensing is done by flows per second, not including outside>in traffic."
"There are additional licenses needed for the number of so-called network flows. It's hard to plan the number of flows you need in the network, this is a problem. The price of the Cisco Stealthwatch is relatively inexpensive"
"The licensing costs are outrageous."
"Our fees are approximately $3,000 USD."
report
Use our free recommendation engine to learn which AI-Powered Cybersecurity Platforms solutions are best for your needs.
831,265 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
11%
Security Firm
11%
Recreational Facilities/Services Company
9%
Computer Software Company
30%
Financial Services Firm
11%
Government
9%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Infinity?
Check Point Infinity's threat prevention capabilities benefitted our organization.
What needs improvement with Check Point Infinity?
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity. This would help users to easily understand and deploy the so...
What is your primary use case for Check Point Infinity?
We have been deploying Check Point Infinity as a new technology for security purposes with our biggest customer in Ethiopia. It serves to secure endpoints and protect from intrusion and various thr...
What do you like most about Cisco Stealthwatch?
The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration.
What is your experience regarding pricing and costs for Cisco Stealthwatch?
The tool is not cheaply priced. In cybersecurity, you want an extra layer of security in your organization. Some sectors want NDR solutions, so you cannot deploy such tools everywhere, as they are ...
What needs improvement with Cisco Stealthwatch?
The expensive nature of the tool is an area of concern where improvements are required.
 

Also Known As

R80, Infinity
Cisco Stealthwatch, Cisco Stealthwatch Enterprise, Lancope StealthWatch
 

Learn More

 

Overview

 

Sample Customers

Edel AG
Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
Find out what your peers are saying about CrowdStrike, Darktrace, Trend Micro and others in AI-Powered Cybersecurity Platforms. Updated: December 2024.
831,265 professionals have used our research since 2012.