Introducing G2.ai, the future of software buying.Try now

Compare Check Point Infinity Platform and ESET PROTECT

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Check Point Infinity Platform
Check Point Infinity Platform
Star Rating
(51)4.5 out of 5
Market Segments
Mid-Market (38.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Check Point Infinity Platform
ESET PROTECT
ESET PROTECT
Star Rating
(918)4.6 out of 5
Market Segments
Small-Business (45.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us
Free Trial is available
Browse all 5 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that ESET PROTECT excels in user satisfaction, boasting a significantly higher overall score compared to Check Point Infinity Platform. Users appreciate its seamless integration with operating systems, which simplifies deployment and reduces setup time.
  • Users say that ESET PROTECT offers a comprehensive suite of cybersecurity solutions, making it highly effective throughout the risk assessment process. Reviewers highlight its ability to provide relevant information that aids in informed decision-making, a feature that stands out in their daily operations.
  • According to verified reviews, Check Point Infinity Platform is praised for its advanced features, particularly its centralized security management. Users appreciate the ability to manage policies, logs, and threat intelligence from a single console, which enhances visibility and reporting capabilities.
  • Reviewers mention that while ESET PROTECT has a strong focus on ease of use and setup, Check Point Infinity Platform shines in its AI-powered threat prevention and seamless integration across various environments, ensuring consistent protection whether in data centers or cloud settings.
  • Users highlight that ESET PROTECT's scripting capabilities, particularly with Kusto query language, allow for advanced threat detection and analysis, making it a favorite among those who require detailed insights into their security posture.
  • G2 reviewers note that both platforms offer quality support, but ESET PROTECT has a slight edge in user feedback regarding the overall experience, with many users expressing satisfaction with the support they receive, which is crucial for day-to-day operations.
Pricing
Entry-Level Pricing
Check Point Infinity Platform
No pricing available
ESET PROTECT
ESET PROTECT Advanced
Contact Us
Browse all 5 pricing plans
Free Trial
Check Point Infinity Platform
No trial information available
ESET PROTECT
Free Trial is available
Ratings
Meets Requirements
8.9
39
9.2
786
Ease of Use
8.8
41
8.9
788
Ease of Setup
7.8
32
8.7
526
Ease of Admin
8.3
23
8.5
414
Quality of Support
8.9
37
8.9
726
Has the product been a good partner in doing business?
8.8
24
8.9
404
Product Direction (% positive)
9.1
39
8.7
779
Features by Category
9.1
11
Not enough data
Sandbox
8.8
10
Not enough data
Evaluation
9.2
10
Not enough data
8.7
9
Not enough data
8.5
9
Not enough data
8.7
9
Not enough data
Intrusion Detection and Prevention Systems (IDPS)Hide 14 FeaturesShow 14 Features
9.1
10
Not enough data
Prevention
9.4
9
Not enough data
9.4
9
Not enough data
9.2
8
Not enough data
9.2
10
Not enough data
8.9
9
Not enough data
Detection
9.0
10
Not enough data
8.8
10
Not enough data
9.2
10
Not enough data
Administration
8.7
10
Not enough data
8.3
10
Not enough data
8.7
9
Not enough data
Generative AI
Not enough data
Not enough data
Agentic AI - Intrusion Detection and Prevention Systems (IDPS)
Not enough data
Not enough data
Not enough data
Not enough data
Network Security Policy Management (NSPM)Hide 10 FeaturesShow 10 Features
9.3
11
Not enough data
Network Maintenance
9.3
9
Not enough data
9.3
10
Not enough data
8.8
10
Not enough data
Network Management
9.2
10
Not enough data
9.2
10
Not enough data
8.5
10
Not enough data
9.0
10
Not enough data
Network Monitoring
9.0
10
Not enough data
9.1
9
Not enough data
8.7
9
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.7
19
9.2
238
Administration
8.7
18
9.2
192
8.6
18
9.1
200
8.3
18
9.0
201
8.6
18
8.8
193
8.5
18
9.0
197
Functionality
8.7
18
9.0
201
9.2
18
9.1
203
9.3
18
9.2
204
8.9
18
9.3
204
Analysis
8.9
18
9.0
197
8.6
17
9.1
196
8.6
18
Feature Not Available
Software-Defined Perimeter (SDP)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Protection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Malware Analysis ToolsHide 11 FeaturesShow 11 Features
Not enough data
9.4
94
Detection
Not enough data
9.5
76
Not enough data
Feature Not Available
Not enough data
9.3
74
Analysis
Not enough data
9.5
76
Not enough data
9.0
74
Not enough data
9.4
74
Not enough data
9.4
75
Response
Not enough data
9.2
75
Not enough data
9.5
76
Not enough data
9.4
75
Generative AI
Not enough data
Feature Not Available
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
9.6
19
Detection & Response
Not enough data
9.6
14
Not enough data
9.8
14
Not enough data
9.8
14
Not enough data
9.9
14
Management
Not enough data
9.5
13
Not enough data
9.8
14
Not enough data
9.2
13
Analytics
Not enough data
9.4
15
Not enough data
9.0
14
Not enough data
9.3
14
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
9.4
9
Not enough data
9.8
8
Not enough data
9.7
10
Services - Extended Detection and Response (XDR)
Not enough data
9.7
6
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
Not enough data
8.9
16
Platform Features
Not enough data
8.3
14
Not enough data
9.4
13
Not enough data
9.2
13
Not enough data
9.4
14
Not enough data
9.1
13
Not enough data
9.5
14
Not enough data
8.5
8
Automation Capabilities
Not enough data
9.6
13
Not enough data
9.0
13
Not enough data
6.7
8
Not enough data
Not enough data
Generative AI
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.2
6
Not enough data
Generative AI
7.2
6
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
9.7
19
Services - Endpoint Detection & Response (EDR)
Not enough data
9.7
10
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Information and Event Management (SIEM)Hide 14 FeaturesShow 14 Features
Not enough data
Not enough data
Network Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Incident Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Intelligence
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Security Information and Event Management (SIEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Orchestration, Automation, and Response (SOAR)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Automation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Orchestration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Response
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
Check Point Infinity Platform
Check Point Infinity Platform
Small-Business(50 or fewer emp.)
34.0%
Mid-Market(51-1000 emp.)
38.3%
Enterprise(> 1000 emp.)
27.7%
ESET PROTECT
ESET PROTECT
Small-Business(50 or fewer emp.)
45.4%
Mid-Market(51-1000 emp.)
44.3%
Enterprise(> 1000 emp.)
10.3%
Reviewers' Industry
Check Point Infinity Platform
Check Point Infinity Platform
Computer & Network Security
27.7%
Information Technology and Services
19.1%
Manufacturing
8.5%
Computer Networking
6.4%
Telecommunications
4.3%
Other
34.0%
ESET PROTECT
ESET PROTECT
Information Technology and Services
12.4%
Computer Software
5.3%
Computer & Network Security
3.9%
Construction
3.8%
Internet
3.3%
Other
71.2%
Alternatives
Check Point Infinity Platform
Check Point Infinity Platform Alternatives
ThreatDown
ThreatDown
Add ThreatDown
Sumo Logic
Sumo Logic
Add Sumo Logic
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
Webroot Business Endpoint Protection
Webroot
Add Webroot Business Endpoint Protection
ESET PROTECT
ESET PROTECT Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
ThreatDown
ThreatDown
Add ThreatDown
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
Check Point Harmony Endpoint
Check Point Harmony Endpoint
Add Check Point Harmony Endpoint
Discussions
Check Point Infinity Platform
Check Point Infinity Platform Discussions
Monty the Mongoose crying
Check Point Infinity Platform has no discussions with answers
ESET PROTECT
ESET PROTECT Discussions
How can I backup the encryption key?
2 Comments
GABI C.
GC
It's critical to have backups of encryption keys. If the lone copy of a key is lost, data encrypted with that key cannot be accessed. When you initially turn...Read more
Does ESET nod32 protect against malware?
2 Comments
DM
Not allRead more
How to make my team faster at startup?
1 Comment
Miguel Antonio E.
ME
Tools → Scheduled Tasks → Uncheck the Startup File Verification box.Read more