Try our new research platform with insights from 80,000+ expert users

Check Point Infinity vs Microsoft Defender for Identity comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.5
Check Point Infinity enhances ROI by improving security, reducing threats, and offering comprehensive features for simplified management and remote access.
Sentiment score
6.7
Microsoft Defender for Identity offers cost-effective breach prevention and efficient management, enhancing client satisfaction and reducing hardware costs.
 

Customer Service

Sentiment score
6.2
Check Point Infinity support is praised for its expertise, despite occasional delays, earning high ratings for customer satisfaction.
Sentiment score
8.4
Microsoft Defender for Identity support is generally praised but can experience delays and inefficiencies, especially for complex issues.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
The quality of support is very good, but troubleshooting can take time due to complex setups and the need to provide many logs.
Generally, the support is more effective than other providers like Oracle.
 

Scalability Issues

Sentiment score
8.1
Check Point Infinity is scalable, flexible, adaptable for all organization sizes, and facilitates security despite potential hardware challenges.
Sentiment score
8.8
Microsoft Defender for Identity provides scalable deployment for global enterprises, supporting numerous users and seamless integration in Microsoft environments.
In a Microsoft-centric organization, especially with Azure infrastructure and Office 365, Microsoft Defender for Identity is scalable.
 

Stability Issues

Sentiment score
8.5
Check Point Infinity offers stable, reliable performance with high ratings, requiring minimal maintenance and providing efficient, smooth operations.
Sentiment score
7.9
Microsoft Defender for Identity is generally stable, with users appreciating its reliability despite occasional incidents and technical issues.
Microsoft Defender for Identity is quite robust and built on Azure hyperscale infrastructure, with a 99% availability.
 

Room For Improvement

Check Point Infinity requires improved support, documentation, pricing clarity, and enhancements in speed, integration, and user accessibility for better performance.
Microsoft Defender for Identity requires improvements in integration, threat intelligence, UI, and seeks enhanced documentation, support, and deployment flexibility.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
One improvement I would recommend is the integration of an admin application within Teams, allowing easy access to attack information on a mobile platform.
Reducing false positives is something we've been working on with Microsoft.
The areas of Microsoft Defender for Identity that can be improved include its cost, which is quite expensive when integrated into Sentinel.
 

Setup Cost

Check Point Infinity offers high-end pricing and licensing, often requiring vendor consultation and additional licenses for full functionality.
Microsoft Defender for Identity offers affordable pricing, especially with E5 licenses, providing great value despite its complexity.
The product, as supported by Check Point, offers invaluable assistance for ease of deployment.
Ensuring a fair price according to market standards.
the Microsoft Defender Suite is quite expensive, especially when integrated into Sentinel.
From an organization perspective, using E5 licenses is value for money, especially if Azure and Office 365 are already in use.
 

Valuable Features

Check Point Infinity offers unified management, Zero Trust security, scalability, and seamless integration for comprehensive cybersecurity across various environments.
Microsoft Defender for Identity enhances security by integrating advanced detection, real-time alerts, and automation for efficient threat prevention.
Check Point Infinity offers a multi-layered security approach that enhances our IT security environment.
The most valuable features of Microsoft Defender for Identity include its automatic remedies, possibilities for avoiding incidents, the privilege manager, and the generation of logs that facilitate a safer environment.
The integration into the Microsoft Defender ecosystem is the most valuable feature of Microsoft Defender for Identity.
The advanced threat protection is one of the strengths of Microsoft Defender for Identity, as it utilizes user and entity analytics and can detect indicative attacks.
 

Categories and Ranking

Check Point Infinity
Ranking in Advanced Threat Protection (ATP)
13th
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
27
Ranking in other categories
AI-Powered Cybersecurity Platforms (8th)
Microsoft Defender for Iden...
Ranking in Advanced Threat Protection (ATP)
5th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
21
Ranking in other categories
Microsoft Security Suite (7th), Identity Threat Detection and Response (ITDR) (1st)
 

Mindshare comparison

As of April 2025, in the Advanced Threat Protection (ATP) category, the mindshare of Check Point Infinity is 1.6%, up from 0.7% compared to the previous year. The mindshare of Microsoft Defender for Identity is 7.1%, down from 7.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP)
 

Featured Reviews

Ashish Upadhyay - PeerSpot reviewer
Provide unified threat prevention and response across our entire decentralized finance system
While Check Point Infinity offers a robust security operations platform, it could benefit from improvements in several areas. Firstly, the platform's pricing structure can be complex, which might be prohibitive for smaller businesses, limiting its accessibility. Simplifying the pricing model or offering more flexible pricing options could make Check Point Infinity more appealing to a wider range of organizations. Secondly, alert fatigue is a common issue with platforms that have strong detection capabilities. Implementing more filtering and prioritization mechanisms can help address this issue, ensuring that security teams can focus on the most critical threats. These are the areas where I believe there's room for improvement. In future releases, I would like to add more integration features. The ability to integrate seamlessly with more third-party applications would make it more customizable for our needs and simplify the integration process. This would improve our overall threat detection capabilities.
Sachin Vinay - PeerSpot reviewer
Easily detects advanced attacks based on user behavior
The best feature is security monitoring, which detects and investigates suspicious user activities. It can easily detect advanced attacks based on the behavior. The credentials are securely stored, so it reduces the risk of compromise. It will monitor user behavior based on artificial intelligence to protect the identities in your organization. It will even help secure the on-premise Active Directory. It syncs from the cloud to on-premise, and on-premise modifications will be reflected in the cloud. Identity harvesting is the most common threat. Legacy Microsoft solutions and Amazon face the same issues in the cloud. Users don't implement other security mechanisms in the cloud. In an on-premise environment, we would have multiple security devices like firewalls and several layers of security. Cloud users are less bothered because cloud features are there and only need to be configured. Microsoft Defender for Cloud is the best solution because all threats are completely visible, and it has a great dashboard. The dashboard displays each threat and score, so we can identify the threat rating and act efficiently to avoid compromising user identities. We have a single sign-on feature on the cloud. If we lose a single set of identities, it can compromise the entire organization, including cloud and on-premise. The same identities are being used everywhere. The user activity has to be completely visible on the dashboard, and it has to generate a pattern. It will notify us if there is any security breach. It is a complete monitoring set. Minor changes in the user identity can lead to data leakage. If a password is changed in the cloud, it will be reflected automatically in the on-premise. This minor change will trigger an alert in Microsoft Defender for Identity. It ensures that each cloud identity is well protected from spoofing. It has a comprehensive database of well-known spoofing techniques, enabling us to provide cloud identity protection completely. It has a vast scope because it is completely single sign-on. In the emerging industry, we use single sign-on because users need to authenticate, but it's challenging to remember multiple passwords. Once your user signs in, you can access all the data. An identity compromise would lead to various issues and affect the data on-premises. Defender maintains a constantly updated database with the latest signatures, attack models, and threats. If it detects one threat, it will monitor the suspicious event and give us frequent alerts. Identity protection is vital because we use an identity mechanism for everything, including firewall-related activities. The exact identity used in the cloud is used in the most complex firewalls. We require an excellent migration technique to regain this user credential if something gets compromised. Blocking this requires a massive set of procedures. Microsoft Defender comprehensively monitors identity and provides frequent alerts regarding any issue, so we don't need to think of anything else. Defender's bidirectional sync capabilities are helpful because we need to sync data from multiple directions, including tenant-to-tenant, on-premise-to-cloud, and cloud-to-cloud syncing. As a university, we have multiple tenants, so we need to sync or access data across platforms. That way, everything is more secure, and Microsoft Defender for Cloud also provides ample security for cloud transfers. The bidirectional sync capabilities are flawless—10 out of 10. Our on-premise Active Directory is perfectly synced with the Azure AD. Everything is synced with on-premise, and changes are reflected in minutes. If a problem with identity is addressed on the cloud, the fix will be mirrored on-premise and vice versa. Microsoft Defender for Cloud and Identity are bundled. If we have these two solutions, we don't need to worry about anything else or third-party antivirus. Microsoft Defender for Identity acts as a link to all the Microsoft security features that require identity-based validation. Microsoft Defender instantly provides identity security for all our applications, and users need not worry about typing their passwords. Even in situations with less complex encryption mechanisms, users don't need to worry about typing in their passwords. Defender will check and monitor if there are any flaws in that, and it will let us know if there are any issues. We're a Microsoft shop, so everything works together. If one feature isn't working, everything will be affected. If Defender isn't working, half of our Microsoft security features will be dead. Without identity security, user data can easily be compromised, and data can fall into the hands of intruders or other hackers. The solutions have to complement each other. If anything got wrong, the entire setup would have flaws. Microsoft security has a legacy security mechanism. A while back, we might have gone with Defender for Endpoint, but Microsoft has also grown into the face of the cloud. The same Defender solution is completely maintaining cloud security. We can imagine Microsoft's vast scale and how Defender can protect the cloud environment from vulnerabilities and attacks. We are definitely delighted with Microsoft products. The dashboard features are fantastic because it provides a comprehensive overview. It has a great alert mechanism and log inspector that tracks when users access various servers. With this kind of identity validation, we can control which servers the users can access. We have total visibility from the dashboard. We can track identity usage even if there are no issues. That is an essential advantage.
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
846,617 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
14%
Government
8%
Comms Service Provider
6%
Computer Software Company
15%
Financial Services Firm
13%
Government
8%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Infinity?
Check Point Infinity's threat prevention capabilities benefitted our organization.
What needs improvement with Check Point Infinity?
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity. This would help users to easily understand and deploy the so...
What is your primary use case for Check Point Infinity?
We have been deploying Check Point Infinity as a new technology for security purposes with our biggest customer in Ethiopia. It serves to secure endpoints and protect from intrusion and various thr...
What do you like most about Microsoft Defender for Identity?
Microsoft Defender for Identity provides excellent visibility into threats by leveraging real-time analytics and data intelligence.
What needs improvement with Microsoft Defender for Identity?
One area that needs improvement is the number of alerts generated, leading to alert fatigue. Reducing false positives is something we've been working on with Microsoft.
What is your primary use case for Microsoft Defender for Identity?
Microsoft Defender for Identity ( /products/microsoft-defender-for-identity-reviews ) is used to protect our on-premises and hybrid Active Directory environment. Our organization has a hybrid infra...
 

Also Known As

R80, Infinity
Azure Advanced Threat Protection, Azure ATP, MS Defender for Identity
 

Overview

 

Sample Customers

Edel AG
Microsoft Defender for Identity is trusted by companies such as St. Luke’s University Health Network, Ansell, and more.
Find out what your peers are saying about Check Point Infinity vs. Microsoft Defender for Identity and other solutions. Updated: March 2025.
846,617 professionals have used our research since 2012.