Try our new research platform with insights from 80,000+ expert users

Check Point Infinity vs Cisco Secure Network Analytics comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Check Point Infinity
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
28
Ranking in other categories
Advanced Threat Protection (ATP) (13th)
Cisco Secure Network Analytics
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
59
Ranking in other categories
Network Monitoring Software (24th), Network Traffic Analysis (NTA) (3rd), Network Detection and Response (NDR) (5th), Cisco Security Portfolio (4th)
 

Mindshare comparison

While both are Network Security Systems solutions, they serve different purposes. Check Point Infinity is designed for Advanced Threat Protection (ATP) and holds a mindshare of 1.0%, up 0.8% compared to last year.
Cisco Secure Network Analytics, on the other hand, focuses on Network Monitoring Software, holds 1.5% mindshare, down 1.7% since last year.
Advanced Threat Protection (ATP)
Network Monitoring Software
 

Featured Reviews

Ashish Upadhyay - PeerSpot reviewer
Provide unified threat prevention and response across our entire decentralized finance system
While Check Point Infinity offers a robust security operations platform, it could benefit from improvements in several areas. Firstly, the platform's pricing structure can be complex, which might be prohibitive for smaller businesses, limiting its accessibility. Simplifying the pricing model or offering more flexible pricing options could make Check Point Infinity more appealing to a wider range of organizations. Secondly, alert fatigue is a common issue with platforms that have strong detection capabilities. Implementing more filtering and prioritization mechanisms can help address this issue, ensuring that security teams can focus on the most critical threats. These are the areas where I believe there's room for improvement. In future releases, I would like to add more integration features. The ability to integrate seamlessly with more third-party applications would make it more customizable for our needs and simplify the integration process. This would improve our overall threat detection capabilities.
Rainier S. - PeerSpot reviewer
You are able to drill down into a center's utilization, then create reports based on it
In the last year or two, we have been working with our Cisco NAS engineers to improve our security posturing. It is more our being proactive rather than reactive. While Stealthwatch and Lancope have this ability to look inside and give you visibility (a great feature), follow-up is the rule. We would like filters that you can put into place to tap onto certain types of behaviors, alerts out, and/or hopefully a block. This is sort of what we are looking for. I might be speaking too early, because we are not down this path yet. We know the feature set is there, we just do not know yet how to achieve it. That is proactive rather than more reactive. For Lancope Stealthwatch, we would like to see it more on the ASA Firewall platform. While this might already be available, this is more a failing of Cisco to inform us if it is there. For example: * Are we on the right or wrong version of the code? * What does the code look like? * Are we are really looking at firewalls? Or is it more about the foundation and route switches that we are seeing? It is about visibility.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We can add our environments and can configure and manage them easily which is why administrators are happy with this tool."
"New Check Point technologies can be found via this portal."
"Our network security posture has improved significantly due to several factors. We've seen a 25% reduction in security incidents due to Infinity's advanced threat prevention capabilities. Additionally, the platform's automation features led to a 20% increase in operational efficiency, allowing our security teams to focus on more strategic tasks."
"Infinity has come to give us total protection."
"Check Point Infinity's threat prevention capabilities benefitted our organization."
"The tool's most valuable feature for threat prevention is the encryption alarm. I find the centralized management console, including the log analyzer and reports in Check Point Infinity, extremely beneficial for enhancing security and operations efficiency in our enterprise. I would rate it a perfect ten out of ten, as it effectively helps us analyze logs, and detect potential attacks."
"It provides fantastic visibility of security incidents through deconstructing and dissecting the threat's infection protocol."
"The product, a cloud-based unified security solution, facilitates the automation of security threat detection and vulnerability management across various endpoints, including mobile and IoT devices. A notable feature is the centralized administration, allowing monitoring of existing solutions from web and mobile devices in a unified interface."
"From a security standpoint, it is just seeing pockets as well. Visibility is very key for us."
"This product alleviates the day-to-day headaches for us, in regards to metrics."
"We find that Stealthwatch can detect the unseen."
"The most valuable features provided by this solution are visibility and information."
"The most valuable part is that Stealthwatch is part of a portfolio of security devices from Cisco. Cisco literally can touch every single end point, every single ingress and egress point in the network. Nobody else has that."
"The solution has increased our threat detection rate. Cisco Stealthwatch has not reduced our incident response times. It has not reduced the amount of time it takes us to detect immediate threats. It has reduced false positives."
"I believe this solution has reduced our incident response time."
"It's a dependable product that is able to pinpoint where we have vulnerabilities if they occur."
 

Cons

"Check Point Infinity's web application is sometimes a little slow."
"One of the main improvements that can be made is the latency in the portal."
"We have had some performance issues. Because of this, we had to redirect traffic to be analyzed by other appliances."
"There is an issue with high agent size, which impacts performance."
"Some aspects of the reporting in Check Point may take time to learn and become comfortable with."
"It seems that the performance varies, likely influenced by the client's size and the provisioning of resources."
"Technical support is something that needs improvement."
"The management console has given us some trouble, and the documentation is a little bit rigid in its solution paths."
"It is time-consuming to set it up and understand how the tool works."
"One update I would like to see is an agent-based client. Currently StealthWatch is network based."
"The configuration of the solution was quite complex."
"The initial setup was straightforward but required a lot of data entry, to begin with building out the server types and network types."
"The usability of this solution needs to be improved."
"I would like to see a hybrid solution that can work without being connected directly to the internet for those destinations."
"One thing I would like to see improved is if it could automatically be tied through ISE, instead of you having to manually get notifications and disable it yourself."
"At my company, we might not be using it enough with other applications that we have that can integrate with it."
 

Pricing and Cost Advice

"While the initial payment might be perceived as relatively higher, the absence of hidden supplementing charges contributes to a straightforward and clear pricing model. The pricing is cheap and moderate."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"Since it has not upgraded its price, Check Point Infinity's pricing is flexible compared to other Check Point solutions."
"The solution's price is quite high, and the licensing model requires extra licenses for various features like SD-WAN."
"Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."
"The pricing of Check Point Infinity could be better. There is a license needed to use the solution and we pay annually."
"I rate the product's price a six on a scale of one to ten, where one is cheap, and ten is expensive."
"When it comes to price, the paramount consideration is the strength of the security. If the security measures provided by the product, such as Check Point Infinity, are robust and meet our requirements, price becomes a secondary concern."
"It has a subscription model. There is yearly support, and there is also three-year support. It depends on what the customers want."
"Pricing is much higher compared to other solutions."
"The solution is expensive. It costs several hundred thousand dollars per year (depending on how many flows you are collecting)."
"The pricing for this solution is good."
"On a yearly basis, licensing is somewhere around $30,000."
"One of the things which bugs me about Lancope is the licensing. We understand how licensing works. Our problem is when we bought and purchased most of these Lancope devices, we did so with our sister company. Somewhere within the purchase and distribution, licensing got mixed up. That is all on Cisco, and it is their responsibility. They allotted some of our sister company's equipment to us, and some of our equipment to them. To date, they have never been able to fix it."
"Today, we are part of the big Cisco ELA, and it is a la carte. We can get orders for whatever we want. At the end of the day, we have to pay for it in one big expense, but that is fine. We are okay with that."
"It is worth the cost."
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
816,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Security Firm
16%
Computer Software Company
12%
Financial Services Firm
10%
Recreational Facilities/Services Company
9%
Computer Software Company
31%
Financial Services Firm
11%
Government
8%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Infinity?
It provides threat detection, predictive analysis, advanced analytics, and advanced threat protection.
What needs improvement with Check Point Infinity?
Some aspects of the reporting in Check Point may take time to learn and become comfortable with. Training is necessary for certain areas, as some features might not be as intuitive. It's important ...
What is your primary use case for Check Point Infinity?
We leveraged Check Point Infinity primarily for gateway security, cloud security, endpoint security, and infrastructure as a service.
What do you like most about Cisco Stealthwatch?
The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration.
What is your experience regarding pricing and costs for Cisco Stealthwatch?
The tool is not cheaply priced. In cybersecurity, you want an extra layer of security in your organization. Some sectors want NDR solutions, so you cannot deploy such tools everywhere, as they are ...
What needs improvement with Cisco Stealthwatch?
The expensive nature of the tool is an area of concern where improvements are required.
 

Also Known As

R80, Infinity
Cisco Stealthwatch, Cisco Stealthwatch Enterprise, Lancope StealthWatch
 

Learn More

 

Overview

 

Sample Customers

Edel AG
Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
Find out what your peers are saying about Microsoft, Palo Alto Networks, Fortinet and others in Advanced Threat Protection (ATP). Updated: October 2024.
816,406 professionals have used our research since 2012.