Introducing G2.ai, the future of software buying.Try now

Compare Check Point Infinity Platform and Microsoft Defender for Endpoint

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Check Point Infinity Platform
Check Point Infinity Platform
Star Rating
(51)4.5 out of 5
Market Segments
Mid-Market (38.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Check Point Infinity Platform
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint
Star Rating
(305)4.4 out of 5
Market Segments
Enterprise (38.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Microsoft Defender for Endpoint
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that the Check Point Infinity Platform excels in Intrusion Prevention with a perfect score of 10.0, while Microsoft Defender for Endpoint falls short with a score of 8.7. Reviewers mention that Check Point's robust prevention capabilities provide a strong defense against sophisticated threats.
  • Reviewers mention that the Check Point Infinity Platform offers superior Firewall capabilities, also scoring 10.0, compared to Microsoft Defender's score of 8.4. Users say that Check Point's firewall features are highly customizable and effective in managing network traffic.
  • G2 users highlight the Check Point Infinity Platform's Sandbox feature, which received a score of 8.9, as a standout for malware analysis, while Microsoft Defender lacks a comparable feature. Users report that Check Point's sandboxing capabilities allow for thorough testing of suspicious files before they enter the network.
  • Users on G2 indicate that Microsoft Defender for Endpoint shines in Product Direction with a positive score of 9.2, suggesting a strong commitment to future enhancements. In contrast, Check Point's score of 7.8 indicates some concerns about its roadmap, with reviewers mentioning a desire for more frequent updates.
  • Reviewers mention that the Check Point Infinity Platform has a higher score in Quality of Support at 9.4, compared to Microsoft Defender's 8.5. Users report that Check Point's support team is responsive and knowledgeable, which is crucial for enterprise-level deployments.
  • Users say that Microsoft Defender for Endpoint offers a more user-friendly experience, scoring 8.6 in Ease of Use, while Check Point's score is slightly higher at 9.5. Reviewers mention that the intuitive interface of Microsoft Defender makes it easier for less technical users to navigate and manage security settings.
Pricing
Entry-Level Pricing
Check Point Infinity Platform
No pricing available
Microsoft Defender for Endpoint
No pricing available
Free Trial
Check Point Infinity Platform
No trial information available
Microsoft Defender for Endpoint
No trial information available
Ratings
Meets Requirements
8.9
39
8.6
246
Ease of Use
8.8
41
8.6
251
Ease of Setup
7.8
32
8.6
161
Ease of Admin
8.3
23
8.6
154
Quality of Support
8.9
37
8.5
236
Has the product been a good partner in doing business?
8.8
24
8.6
150
Product Direction (% positive)
9.1
39
9.2
245
Features by Category
9.1
11
Not enough data
Sandbox
8.8
10
Not enough data
Evaluation
9.2
10
Not enough data
8.7
9
Not enough data
8.5
9
Not enough data
8.7
9
Not enough data
Intrusion Detection and Prevention Systems (IDPS)Hide 14 FeaturesShow 14 Features
9.1
10
Not enough data
Prevention
9.4
9
Not enough data
9.4
9
Not enough data
9.2
8
Not enough data
9.2
10
Not enough data
8.9
9
Not enough data
Detection
9.0
10
Not enough data
8.8
10
Not enough data
9.2
10
Not enough data
Administration
8.7
10
Not enough data
8.3
10
Not enough data
8.7
9
Not enough data
Generative AI
Not enough data
Not enough data
Agentic AI - Intrusion Detection and Prevention Systems (IDPS)
Not enough data
Not enough data
Not enough data
Not enough data
Network Security Policy Management (NSPM)Hide 10 FeaturesShow 10 Features
9.3
11
Not enough data
Network Maintenance
9.3
9
Not enough data
9.3
10
Not enough data
8.8
10
Not enough data
Network Management
9.2
10
Not enough data
9.2
10
Not enough data
8.5
10
Not enough data
9.0
10
Not enough data
Network Monitoring
9.0
10
Not enough data
9.1
9
Not enough data
8.7
9
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.7
19
8.6
23
Administration
8.7
18
8.8
21
8.6
18
8.3
21
8.3
18
8.6
21
8.6
18
8.5
21
8.5
18
8.8
21
Functionality
8.7
18
9.0
21
9.2
18
8.6
21
9.3
18
8.8
21
8.9
18
8.7
20
Analysis
8.9
18
8.3
21
8.6
17
8.4
21
8.6
18
8.3
21
Software-Defined Perimeter (SDP)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Protection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.0
57
Generative AI
Not enough data
8.0
52
Not enough data
8.0
52
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.2
6
Not enough data
Generative AI
7.2
6
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
Security Information and Event Management (SIEM)Hide 14 FeaturesShow 14 Features
Not enough data
Not enough data
Network Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Incident Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Intelligence
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Security Information and Event Management (SIEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Orchestration, Automation, and Response (SOAR)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Automation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Orchestration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Response
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Check Point Infinity Platform
Check Point Infinity Platform
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint
Check Point Infinity Platform and Microsoft Defender for Endpoint are categorized as Endpoint Protection Platforms
Reviews
Reviewers' Company Size
Check Point Infinity Platform
Check Point Infinity Platform
Small-Business(50 or fewer emp.)
34.0%
Mid-Market(51-1000 emp.)
38.3%
Enterprise(> 1000 emp.)
27.7%
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint
Small-Business(50 or fewer emp.)
26.9%
Mid-Market(51-1000 emp.)
34.4%
Enterprise(> 1000 emp.)
38.8%
Reviewers' Industry
Check Point Infinity Platform
Check Point Infinity Platform
Computer & Network Security
27.7%
Information Technology and Services
19.1%
Manufacturing
8.5%
Computer Networking
6.4%
Telecommunications
4.3%
Other
34.0%
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint
Information Technology and Services
25.5%
Computer & Network Security
14.3%
Computer Software
6.1%
Financial Services
5.8%
Telecommunications
2.4%
Other
45.9%
Alternatives
Check Point Infinity Platform
Check Point Infinity Platform Alternatives
ThreatDown
ThreatDown
Add ThreatDown
Sumo Logic
Sumo Logic
Add Sumo Logic
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint Alternatives
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Trellix Endpoint Security
Trellix Endpoint Security
Add Trellix Endpoint Security
Discussions
Check Point Infinity Platform
Check Point Infinity Platform Discussions
Monty the Mongoose crying
Check Point Infinity Platform has no discussions with answers
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint Discussions
when scheduled scan starts it consume 100% CPU, can you kindly provide solution for it.
1 Comment
PQ
Method I: Ensure that no other Adware, Antimalware or Antivirus software is installed or not fully removed Method II: Prevent Windows Defender from scanning...Read more
can i use this for my video games?
1 Comment
PQ
if you are using Xbox, then all software's are certified by Microsoft, so no need the virus scan Read more
Which feature in Microsoft Defender for endpoint?
1 Comment
Niket M.
NM
Comprehensive protection: Microsoft Defender for Endpoint provides protection against a wide range of threats, including viruses, malware, ransomware, and...Read more