Check Point Infinity and Microsoft Defender for Office 365 are leading solutions in the cybersecurity sector, offering comprehensive protection for various IT environments. Check Point Infinity holds an edge in providing a unified security architecture with advanced zero-trust capabilities, while Microsoft Defender excels in integrating with Microsoft ecosystems.
Features: Check Point Infinity includes a unified security architecture that covers data centers, clouds, and endpoints with robust Zero Trust capabilities. Its real-time threat prevention and centralized management via a console are noteworthy. Microsoft Defender for Office 365 provides comprehensive email security and threat detection within the Office suite. It is particularly valued for its seamless integration with existing Microsoft products and data loss prevention across multiple platforms.
Room for Improvement: Check Point Infinity could benefit from better documentation, a clearer licensing model, and improved support responsiveness and effectiveness. Users also report occasional latency issues. Microsoft Defender for Office 365 should enhance its scalability, provide more detailed security reports, simplify its interface, and work on reducing false positives. Users also wish for better integration with third-party apps and improved phishing detection.
Ease of Deployment and Customer Service: Check Point Infinity offers flexible deployment across on-premises, hybrid, and cloud environments, though users face challenges with slow support and complex licensing. Microsoft Defender for Office 365 is praised for its easy integration within Microsoft ecosystems and operates well in hybrid and cloud settings. Its customer service is generally responsive but could improve in resource support allocation.
Pricing and ROI: Check Point Infinity's pricing is high due to its complex licensing, but it is seen as delivering significant ROI with comprehensive security enhancements. Microsoft Defender for Office 365 follows a subscription model linked to Microsoft licensing plans and is considered expensive, especially for smaller businesses, though it offers significant value within its ecosystem.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
It has also decreased our time to detection and response by about 15 to 20 percent.
The technical support is excellent with quick response times.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
Any issues are addressed quickly by Microsoft's support.
Customer service and support have been fantastic.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
We have never faced scalability problems, and Microsoft manages it effectively.
The solution is stable, as we have been using it for the past two years.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
If Check Point continues reforms of AI and takes more information from different origins, not only from its database but also from other brands, it can complete this information and make it stronger.
The main area for improvement is simplifying the implementation and rollout process.
Microsoft could improve by offering recommendations for domain spoofing attacks, especially scenarios where DNS records like SPF, DKIM, and DMARC are not properly published.
I would reduce the cost.
The pricing is good as Check Point Infinity includes many tools and details that others might not have.
The product, as supported by Check Point, offers invaluable assistance for ease of deployment.
Money-wise, it is a part of the Office 365 suite, making it slightly more expensive compared to Trend Micro.
Microsoft is quite affordable with a lot of features available for any size organization.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
Check Point Infinity offers a multi-layered security approach that enhances our IT security environment.
It provides end-to-end visibility on email threats such as phishing, extending beyond Exchange Online Protection.
It ranks the threats and allows us to prioritize those hitting us the hardest, such as email threats.
Microsoft Defender for Office 365 is now part of a centralized tenant for my entire group.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
Microsoft Defender for Office 365 is a comprehensive security solution designed to protect organizations against advanced threats in their email, collaboration, and productivity environments. It combines the power of Microsoft's threat intelligence, machine learning, and behavioral analytics to provide real-time protection against phishing, malware, ransomware, and other malicious attacks.
With Microsoft Defender for Office 365, organizations can safeguard their email communication by detecting and blocking malicious links, attachments, and unsafe email content. It employs advanced anti-phishing capabilities to identify and prevent sophisticated phishing attacks that attempt to steal sensitive information or compromise user credentials.
This solution also offers robust protection against malware and ransomware. It leverages machine learning algorithms to analyze email attachments and URLs in real-time, identifying and blocking malicious content before it reaches users' inboxes. Additionally, it provides advanced threat-hunting capabilities, allowing security teams to proactively investigate and respond to potential threats.
Microsoft Defender for Office 365 goes beyond email protection and extends its security features to other collaboration tools like SharePoint, OneDrive, and Teams. It scans files and documents stored in these platforms, ensuring that they are free from malware and other malicious content. It also provides visibility into user activities, helping organizations detect and mitigate insider threats.
Furthermore, this solution offers rich reporting and analytics capabilities, providing organizations with insights into their security posture and threat landscape. It enables security administrators to monitor and manage security incidents, track trends, and take proactive measures to enhance their overall security posture.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.