Check Point Infinity and Microsoft Defender for Office 365 are leading solutions in the cybersecurity sector, offering comprehensive protection for various IT environments. Check Point Infinity holds an edge in providing a unified security architecture with advanced zero-trust capabilities, while Microsoft Defender excels in integrating with Microsoft ecosystems.
Features: Check Point Infinity includes a unified security architecture that covers data centers, clouds, and endpoints with robust Zero Trust capabilities. Its real-time threat prevention and centralized management via a console are noteworthy. Microsoft Defender for Office 365 provides comprehensive email security and threat detection within the Office suite. It is particularly valued for its seamless integration with existing Microsoft products and data loss prevention across multiple platforms.
Room for Improvement: Check Point Infinity could benefit from better documentation, a clearer licensing model, and improved support responsiveness and effectiveness. Users also report occasional latency issues. Microsoft Defender for Office 365 should enhance its scalability, provide more detailed security reports, simplify its interface, and work on reducing false positives. Users also wish for better integration with third-party apps and improved phishing detection.
Ease of Deployment and Customer Service: Check Point Infinity offers flexible deployment across on-premises, hybrid, and cloud environments, though users face challenges with slow support and complex licensing. Microsoft Defender for Office 365 is praised for its easy integration within Microsoft ecosystems and operates well in hybrid and cloud settings. Its customer service is generally responsive but could improve in resource support allocation.
Pricing and ROI: Check Point Infinity's pricing is high due to its complex licensing, but it is seen as delivering significant ROI with comprehensive security enhancements. Microsoft Defender for Office 365 follows a subscription model linked to Microsoft licensing plans and is considered expensive, especially for smaller businesses, though it offers significant value within its ecosystem.
It has also decreased our time to detection and response by about 15 to 20 percent.
Customer service and support have been fantastic.
I would reduce the cost.
It ranks the threats and allows us to prioritize those hitting us the hardest, such as email threats.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
Microsoft Defender for Office 365 is a comprehensive security solution designed to protect organizations against advanced threats in their email, collaboration, and productivity environments. It combines the power of Microsoft's threat intelligence, machine learning, and behavioral analytics to provide real-time protection against phishing, malware, ransomware, and other malicious attacks.
With Microsoft Defender for Office 365, organizations can safeguard their email communication by detecting and blocking malicious links, attachments, and unsafe email content. It employs advanced anti-phishing capabilities to identify and prevent sophisticated phishing attacks that attempt to steal sensitive information or compromise user credentials.
This solution also offers robust protection against malware and ransomware. It leverages machine learning algorithms to analyze email attachments and URLs in real-time, identifying and blocking malicious content before it reaches users' inboxes. Additionally, it provides advanced threat-hunting capabilities, allowing security teams to proactively investigate and respond to potential threats.
Microsoft Defender for Office 365 goes beyond email protection and extends its security features to other collaboration tools like SharePoint, OneDrive, and Teams. It scans files and documents stored in these platforms, ensuring that they are free from malware and other malicious content. It also provides visibility into user activities, helping organizations detect and mitigate insider threats.
Furthermore, this solution offers rich reporting and analytics capabilities, providing organizations with insights into their security posture and threat landscape. It enables security administrators to monitor and manage security incidents, track trends, and take proactive measures to enhance their overall security posture.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.