Check Point Infinity and Microsoft Defender Threat Intelligence compete in the cybersecurity solutions category. Check Point Infinity has the upper hand due to its comprehensive visibility and integration capabilities, whereas Microsoft Defender thrives in environments dominated by Microsoft products.
Features: Check Point Infinity provides a unified security architecture that supports Zero Trust principles and manages a wide range of security measures from one centralized console. It offers comprehensive visibility across networks, workloads, devices, and data. Users find its extensive security features and integration abilities highly valuable. Microsoft Defender Threat Intelligence integrates seamlessly with Microsoft products, using global threat intelligence for detection and protection, and is preferred by users in Microsoft-centric environments due to its robust integration across Microsoft platforms.
Room for Improvement: Check Point Infinity faces challenges with pricing complexity, support delays, and outdated documentation. Enhancements in its cloud-based tools, latency issues, and integration capabilities could boost its user experience. Microsoft Defender Threat Intelligence needs to improve its pricing structure, integration with non-Microsoft products, and support for non-Windows platforms. Users require more frequent updates and broader compatibility beyond the Microsoft ecosystem.
Ease of Deployment and Customer Service: Both Check Point Infinity and Microsoft Defender Threat Intelligence are deployable in various environments like on-premises, hybrid, and cloud setups. Check Point Infinity provides strong centralized management but experiences occasional latency and support delays. Microsoft Defender integrates well within Microsoft solutions, facilitating deployment, yet faces criticism for infrequent updates and limited flexibility with non-Microsoft services. In customer support, Check Point sees some complaints about response time, while Microsoft benefits from its large user community despite challenges in direct feedback.
Pricing and ROI: Check Point Infinity is perceived as expensive, offering a complex licensing model yet substantial features for comprehensive security management. It delivers significant ROI through robust on-premises security and ease of configuration. Users appreciate trial options, though pricing could be more flexible. Microsoft Defender Threat Intelligence presents cost-effectiveness with Microsoft 365 bundles, ideal for those in the Microsoft ecosystem. While its pricing may be complicated for SMEs, it offers cost savings in larger installations. Both solutions justify their costs with strong security returns but have varying pricing flexibility based on organizational needs.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
Level two support is knowledgeable and knows how the product works, which is very good.
If there were some customizations available, I would rate its scalability as nine out of ten.
It provides a high level of security and avoids phishing and scam emails.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
Providing code customization would help keep pace with new vulnerabilities and threats.
The product, as supported by Check Point, offers invaluable assistance for ease of deployment.
Check Point Infinity offers a multi-layered security approach that enhances our IT security environment.
One of the best features is that it provides a certain level of customization, allowing us to set our spam confidence levels.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
Microsoft Defender Threat Intelligence is a comprehensive security solution that provides organizations with real-time insights into the latest cyber threats. Leveraging advanced machine learning and artificial intelligence capabilities, it offers proactive threat detection and response, enabling businesses to stay one step ahead of attackers. With Microsoft Defender Threat Intelligence, organizations gain access to a vast array of threat intelligence data, including indicators of compromise (IOCs), security incidents, and emerging threats. This data is collected from a wide range of sources, such as Microsoft's global sensor network, industry partners, and security researchers, ensuring comprehensive coverage and accuracy. The solution's advanced analytics and machine learning algorithms analyze this threat intelligence data in real-time, identifying patterns, trends, and anomalies that may indicate a potential security breach. By continuously monitoring the network and endpoints, Microsoft Defender Threat Intelligence can quickly detect and respond to threats, minimizing the impact of attacks and reducing the time to remediation.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.