Security and Compliance Architect at a manufacturing company with 1,001-5,000 employees
Real User
Top 5
2024-07-22T21:46:00Z
Jul 22, 2024
We could have faced it if Check Point Infinity had not prevented it. This includes understanding the potential security incident we were looking at, gaining insights into where the attempt was being made from, identifying the associated IOCs, and potentially attributing who might be targeting us. Maintenance wasn't much needed. The fifteen people we had were sufficient. We had coverage across different time zones, so they were able to cover it. I recommend the solution. Overall, I rate the solution a seven out of ten.
Analista de TI - suporte a redes e segurança at Tribunal de Contas da União
Real User
Top 5
2024-04-11T18:49:09Z
Apr 11, 2024
I would recommend it. However, Check Point could improve its tech support systems. If they had more engineers in Brazil, I think it would be good. Overall, I would rate the solution a nine out of ten.
We are a cybersecurity company providing solutions for our customers. We tested the Check Point solution, not just as a solution provider but also to assess cybersecurity for Check Point. We tested various products and have found that the Check Point endpoint protection offers multiple capabilities. It covers postal management, DDR capabilities, and many other features, such as cloud assessment and sandboxing in the cloud. They should have a dedicated team or take services from third-party sources to maintain the solution. They can have this solution for endpoint protection and mobile protection. We can customize the dashboard to meet our needs. We can tailor the dashboard to display the information we need depending on our requirements. Overall, I rate the solution a seven out of ten.
For those considering Check Point Infinity, my advice is to gain hands-on experience and acquire a foundational understanding of the product before diving into the implementation process. I rate it a nine out of ten.
Senior Manager at a financial services firm with 10,001+ employees
Real User
2021-03-30T06:29:00Z
Mar 30, 2021
This is a security architecture. Organizations can use different Check Point solutions for protecting different environments, such as the network, email, endpoints, and more.
The Check Point Infinity security architecture is a robust and modern security solution for organizations of any size, but make sure that you have a dedicated budget to maintain it. It is really not cheap. Also, it is better to have a dedicated and certified Check Point specialist in your engineering team, since the solution is complex.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
We could have faced it if Check Point Infinity had not prevented it. This includes understanding the potential security incident we were looking at, gaining insights into where the attempt was being made from, identifying the associated IOCs, and potentially attributing who might be targeting us. Maintenance wasn't much needed. The fifteen people we had were sufficient. We had coverage across different time zones, so they were able to cover it. I recommend the solution. Overall, I rate the solution a seven out of ten.
I would recommend it. However, Check Point could improve its tech support systems. If they had more engineers in Brazil, I think it would be good. Overall, I would rate the solution a nine out of ten.
We are a cybersecurity company providing solutions for our customers. We tested the Check Point solution, not just as a solution provider but also to assess cybersecurity for Check Point. We tested various products and have found that the Check Point endpoint protection offers multiple capabilities. It covers postal management, DDR capabilities, and many other features, such as cloud assessment and sandboxing in the cloud. They should have a dedicated team or take services from third-party sources to maintain the solution. They can have this solution for endpoint protection and mobile protection. We can customize the dashboard to meet our needs. We can tailor the dashboard to display the information we need depending on our requirements. Overall, I rate the solution a seven out of ten.
For those considering Check Point Infinity, my advice is to gain hands-on experience and acquire a foundational understanding of the product before diving into the implementation process. I rate it a nine out of ten.
Overall, I would rate it nine out of ten.
I recommend the solution to those who plan to use it. I rate the overall solution an eight out of ten.
I rate Check Point Infinity a nine out of ten.
It is a great solution with very good features and provides excellent security.
I recommend the use of this administration portal.
I recommend this solution to others. I rate Check Point Infinity a nine out of ten.
The only thing would be to improve the latency in the graphical interface and technical support.
I recommend this security tool. However, it is important to validate with your Check Point partner if it fits your business needs.
This is a security architecture. Organizations can use different Check Point solutions for protecting different environments, such as the network, email, endpoints, and more.
The Check Point Infinity security architecture is a robust and modern security solution for organizations of any size, but make sure that you have a dedicated budget to maintain it. It is really not cheap. Also, it is better to have a dedicated and certified Check Point specialist in your engineering team, since the solution is complex.
We are an integrator as well as a partner. I'd rate the solution ten out of ten.