Introducing G2.ai, the future of software buying.Try now

Compare Check Point Infinity Platform and Palo Alto Networks VM-Series Virtual Firewall

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Check Point Infinity Platform
Check Point Infinity Platform
Star Rating
(51)4.5 out of 5
Market Segments
Mid-Market (38.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Check Point Infinity Platform
Palo Alto Networks VM-Series Virtual Firewall
Palo Alto Networks VM-Series Virtual Firewall
Star Rating
(91)4.3 out of 5
Market Segments
Enterprise (43.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Palo Alto Networks VM-Series Virtual Firewall
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that the Check Point Infinity Platform excels in Intrusion Prevention with a perfect score of 10.0, while reviewers mention that Palo Alto VM-Series, although strong, scores slightly lower at 9.5. This indicates that Check Point may offer more robust protection against intrusions.
  • Reviewers mention that the Quality of Support for Check Point Infinity Platform is rated at 9.4, significantly higher than Palo Alto VM-Series, which has a score of 7.9. Users say that this difference highlights Check Point's commitment to customer service and support.
  • Users on G2 report that Check Point's Firewall capabilities also receive a perfect score of 10.0, while Palo Alto VM-Series scores 9.2. This suggests that Check Point may provide more comprehensive firewall features, which are critical for network security.
  • Reviewers mention that the Ease of Use for Check Point Infinity Platform is rated at 9.5, compared to Palo Alto VM-Series at 8.9. Users say that this ease of use can lead to quicker onboarding and less training time for new users.
  • G2 users report that Check Point Infinity Platform has a higher score in Compliance at 8.9, while Palo Alto VM-Series scores 9.3. This indicates that while Palo Alto may have a slight edge in compliance features, Check Point still offers solid compliance capabilities.
  • Users say that Check Point Infinity Platform's Sandbox feature is rated at 8.9, which is a critical component for malware detection and prevention, while Palo Alto VM-Series does not have a comparable score listed. This suggests that Check Point may provide more advanced sandboxing capabilities for threat analysis.
Pricing
Entry-Level Pricing
Check Point Infinity Platform
No pricing available
Palo Alto Networks VM-Series Virtual Firewall
No pricing available
Free Trial
Check Point Infinity Platform
No trial information available
Palo Alto Networks VM-Series Virtual Firewall
No trial information available
Ratings
Meets Requirements
8.9
39
8.8
84
Ease of Use
8.8
41
8.3
85
Ease of Setup
7.8
32
8.3
81
Ease of Admin
8.3
23
8.5
62
Quality of Support
8.9
37
8.3
82
Has the product been a good partner in doing business?
8.8
24
8.6
63
Product Direction (% positive)
9.1
39
9.4
81
Features by Category
9.1
11
Not enough data
Sandbox
8.8
10
Not enough data
Evaluation
9.2
10
Not enough data
8.7
9
Not enough data
8.5
9
Not enough data
8.7
9
Not enough data
Intrusion Detection and Prevention Systems (IDPS)Hide 14 FeaturesShow 14 Features
9.1
10
8.8
37
Prevention
9.4
9
9.2
36
9.4
9
9.2
37
9.2
8
9.2
35
9.2
10
9.1
36
8.9
9
8.8
32
Detection
9.0
10
9.0
36
8.8
10
9.1
35
9.2
10
9.1
36
Administration
8.7
10
9.0
35
8.3
10
8.8
36
8.7
9
8.6
35
Generative AI
Not enough data
7.7
11
Agentic AI - Intrusion Detection and Prevention Systems (IDPS)
Not enough data
8.3
5
Not enough data
8.3
5
Network Security Policy Management (NSPM)Hide 10 FeaturesShow 10 Features
9.3
11
Not enough data
Network Maintenance
9.3
9
Not enough data
9.3
10
Not enough data
8.8
10
Not enough data
Network Management
9.2
10
Not enough data
9.2
10
Not enough data
8.5
10
Not enough data
9.0
10
Not enough data
Network Monitoring
9.0
10
Not enough data
9.1
9
Not enough data
8.7
9
Not enough data
Not enough data
8.7
69
Administration
Not enough data
8.8
68
Not enough data
8.9
68
Not enough data
8.6
67
Not enough data
8.7
66
Agentic AI - Firewall Software
Not enough data
8.3
12
Not enough data
8.9
11
Functionality
Not enough data
8.8
64
Not enough data
8.8
65
Not enough data
9.0
64
Not enough data
9.0
65
Monitoring
Not enough data
8.7
65
Not enough data
8.7
65
Not enough data
8.9
67
Not enough data
8.9
65
Generative AI
Not enough data
7.9
17
Artificial Intelligence - Firewall
Not enough data
8.8
14
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.7
19
Not enough data
Administration
8.7
18
Not enough data
8.6
18
Not enough data
8.3
18
Not enough data
8.6
18
Not enough data
8.5
18
Not enough data
Functionality
8.7
18
Not enough data
9.2
18
Not enough data
9.3
18
Not enough data
8.9
18
Not enough data
Analysis
8.9
18
Not enough data
8.6
17
Not enough data
8.6
18
Not enough data
Software-Defined Perimeter (SDP)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Protection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.2
6
Not enough data
Generative AI
7.2
6
Not enough data
Security Information and Event Management (SIEM)Hide 14 FeaturesShow 14 Features
Not enough data
Not enough data
Network Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Incident Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Intelligence
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Security Information and Event Management (SIEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Orchestration, Automation, and Response (SOAR)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Automation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Orchestration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Response
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Check Point Infinity Platform
Check Point Infinity Platform
Palo Alto Networks VM-Series Virtual Firewall
Palo Alto Networks VM-Series Virtual Firewall
Check Point Infinity Platform and Palo Alto Networks VM-Series Virtual Firewall are categorized as Intrusion Detection and Prevention Systems (IDPS)
Reviews
Reviewers' Company Size
Check Point Infinity Platform
Check Point Infinity Platform
Small-Business(50 or fewer emp.)
34.0%
Mid-Market(51-1000 emp.)
38.3%
Enterprise(> 1000 emp.)
27.7%
Palo Alto Networks VM-Series Virtual Firewall
Palo Alto Networks VM-Series Virtual Firewall
Small-Business(50 or fewer emp.)
26.7%
Mid-Market(51-1000 emp.)
30.0%
Enterprise(> 1000 emp.)
43.3%
Reviewers' Industry
Check Point Infinity Platform
Check Point Infinity Platform
Computer & Network Security
27.7%
Information Technology and Services
19.1%
Manufacturing
8.5%
Computer Networking
6.4%
Telecommunications
4.3%
Other
34.0%
Palo Alto Networks VM-Series Virtual Firewall
Palo Alto Networks VM-Series Virtual Firewall
Computer & Network Security
17.8%
Information Technology and Services
16.7%
Consulting
5.6%
Computer Software
5.6%
Insurance
4.4%
Other
50.0%
Alternatives
Check Point Infinity Platform
Check Point Infinity Platform Alternatives
ThreatDown
ThreatDown
Add ThreatDown
Sumo Logic
Sumo Logic
Add Sumo Logic
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Palo Alto Networks VM-Series Virtual Firewall
Palo Alto Networks VM-Series Virtual Firewall Alternatives
Sophos Firewall
Sophos Firewall
Add Sophos Firewall
Check Point Next Generation Firewalls (NGFWs)
Check Point Next Generation Firewalls (NGFWs)
Add Check Point Next Generation Firewalls (NGFWs)
Netgate pfSense
Netgate pfSense
Add Netgate pfSense
WatchGuard Network Security
WatchGuard Network Security
Add WatchGuard Network Security
Discussions
Check Point Infinity Platform
Check Point Infinity Platform Discussions
Monty the Mongoose crying
Check Point Infinity Platform has no discussions with answers
Palo Alto Networks VM-Series Virtual Firewall
Palo Alto Networks VM-Series Virtual Firewall Discussions
Monty the Mongoose crying
Palo Alto Networks VM-Series Virtual Firewall has no discussions with answers