Security and Compliance Architect at a manufacturing company with 1,001-5,000 employees
Real User
Top 5
2024-07-22T21:46:00Z
Jul 22, 2024
We could have faced it if Check Point Infinity had not prevented it. This includes understanding the potential security incident we were looking at, gaining insights into where the attempt was being made from, identifying the associated IOCs, and potentially attributing who might be targeting us. Maintenance wasn't much needed. The fifteen people we had were sufficient. We had coverage across different time zones, so they were able to cover it. I recommend the solution. Overall, I rate the solution a seven out of ten.
The solution is perfectly integrated with our public and private cloud environments, and we have a user base across these environments. Check Point Infinity produces a rich report in which we analyze vulnerabilities, such as phishing and malware attacks, on our endpoints. The solution also predicts future threats so that we can proactively take measurable actions on our endpoints. The solution's unified, centralized management console is fabulous and has all the advanced features users require. With the console, you can easily map your resources and monitor them at any time. A team consisting of five people is involved with the solution's maintenance. The solution's documentation and community base are fine. The solution is easy to use and easy to learn to use. Check Point Infinity is a very advanced and user-friendly version of Check Point's security solution. I would recommend the solution to other users for evaluation. If the requirements are fully satisfied, users can go for the live deployment. Overall, I rate the solution ten out of ten
Analista de TI - suporte a redes e segurança at Tribunal de Contas da União
Real User
Top 5
2024-04-11T18:49:09Z
Apr 11, 2024
I would recommend it. However, Check Point could improve its tech support systems. If they had more engineers in Brazil, I think it would be good. Overall, I would rate the solution a nine out of ten.
We are a cybersecurity company providing solutions for our customers. We tested the Check Point solution, not just as a solution provider but also to assess cybersecurity for Check Point. We tested various products and have found that the Check Point endpoint protection offers multiple capabilities. It covers postal management, DDR capabilities, and many other features, such as cloud assessment and sandboxing in the cloud. They should have a dedicated team or take services from third-party sources to maintain the solution. They can have this solution for endpoint protection and mobile protection. We can customize the dashboard to meet our needs. We can tailor the dashboard to display the information we need depending on our requirements. Overall, I rate the solution a seven out of ten.
For those considering Check Point Infinity, my advice is to gain hands-on experience and acquire a foundational understanding of the product before diving into the implementation process. I rate it a nine out of ten.
From our experience, Check Point Infinity has proven to be a good solution. Compared to competitors like SentinelOne, we've found that some solutions are not fully optimized for specific global locations, especially in regions like Europe, North America, and Central Asia. Our preference is for a solution compatible across various geographies, including India, Japan, Singapore, other Asia-Pacific countries, and the European market. This ensures easy integration with our existing third-party applications, such as Microsoft Office, Microsoft Outlook, and Google Workspace. We seek a unified solution that can easily integrate with our existing systems. I rate it an eight out of ten.
Senior Manager at a financial services firm with 10,001+ employees
Real User
2021-03-30T06:29:00Z
Mar 30, 2021
This is a security architecture. Organizations can use different Check Point solutions for protecting different environments, such as the network, email, endpoints, and more.
The Check Point Infinity security architecture is a robust and modern security solution for organizations of any size, but make sure that you have a dedicated budget to maintain it. It is really not cheap. Also, it is better to have a dedicated and certified Check Point specialist in your engineering team, since the solution is complex.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
We could have faced it if Check Point Infinity had not prevented it. This includes understanding the potential security incident we were looking at, gaining insights into where the attempt was being made from, identifying the associated IOCs, and potentially attributing who might be targeting us. Maintenance wasn't much needed. The fifteen people we had were sufficient. We had coverage across different time zones, so they were able to cover it. I recommend the solution. Overall, I rate the solution a seven out of ten.
The solution is perfectly integrated with our public and private cloud environments, and we have a user base across these environments. Check Point Infinity produces a rich report in which we analyze vulnerabilities, such as phishing and malware attacks, on our endpoints. The solution also predicts future threats so that we can proactively take measurable actions on our endpoints. The solution's unified, centralized management console is fabulous and has all the advanced features users require. With the console, you can easily map your resources and monitor them at any time. A team consisting of five people is involved with the solution's maintenance. The solution's documentation and community base are fine. The solution is easy to use and easy to learn to use. Check Point Infinity is a very advanced and user-friendly version of Check Point's security solution. I would recommend the solution to other users for evaluation. If the requirements are fully satisfied, users can go for the live deployment. Overall, I rate the solution ten out of ten
I would recommend it. However, Check Point could improve its tech support systems. If they had more engineers in Brazil, I think it would be good. Overall, I would rate the solution a nine out of ten.
We are a cybersecurity company providing solutions for our customers. We tested the Check Point solution, not just as a solution provider but also to assess cybersecurity for Check Point. We tested various products and have found that the Check Point endpoint protection offers multiple capabilities. It covers postal management, DDR capabilities, and many other features, such as cloud assessment and sandboxing in the cloud. They should have a dedicated team or take services from third-party sources to maintain the solution. They can have this solution for endpoint protection and mobile protection. We can customize the dashboard to meet our needs. We can tailor the dashboard to display the information we need depending on our requirements. Overall, I rate the solution a seven out of ten.
For those considering Check Point Infinity, my advice is to gain hands-on experience and acquire a foundational understanding of the product before diving into the implementation process. I rate it a nine out of ten.
From our experience, Check Point Infinity has proven to be a good solution. Compared to competitors like SentinelOne, we've found that some solutions are not fully optimized for specific global locations, especially in regions like Europe, North America, and Central Asia. Our preference is for a solution compatible across various geographies, including India, Japan, Singapore, other Asia-Pacific countries, and the European market. This ensures easy integration with our existing third-party applications, such as Microsoft Office, Microsoft Outlook, and Google Workspace. We seek a unified solution that can easily integrate with our existing systems. I rate it an eight out of ten.
Overall, I would rate it nine out of ten.
I recommend the solution to those who plan to use it. I rate the overall solution an eight out of ten.
I rate Check Point Infinity a nine out of ten.
It is a great solution with very good features and provides excellent security.
I recommend the use of this administration portal.
I recommend this solution to others. I rate Check Point Infinity a nine out of ten.
The only thing would be to improve the latency in the graphical interface and technical support.
I recommend this security tool. However, it is important to validate with your Check Point partner if it fits your business needs.
This is a security architecture. Organizations can use different Check Point solutions for protecting different environments, such as the network, email, endpoints, and more.
The Check Point Infinity security architecture is a robust and modern security solution for organizations of any size, but make sure that you have a dedicated budget to maintain it. It is really not cheap. Also, it is better to have a dedicated and certified Check Point specialist in your engineering team, since the solution is complex.
We are an integrator as well as a partner. I'd rate the solution ten out of ten.