Check Point Infinity Platform Features
Network Management (7)
Activity Monitoring
Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Asset Management
Keeps records of each network asset and its activity. Discovers new assets accessing the network.
Log Management
Provides security information and stores the data in a secure repository for reference.
Network Mapping
Provides visual displays network connections, services, and endpoints. 10 reviewers of Check Point Infinity Platform have provided feedback on this feature.
Compliance
As reported in 10 Check Point Infinity Platform reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Reporting
Based on 10 Check Point Infinity Platform reviews. Documents suspicious activity within a network and provide analysis of potential threats or vulnerabilities.
Console
Provides a centralized console for administration tasks and unified control. This feature was mentioned in 10 Check Point Infinity Platform reviews.
Incident Management (3)
Event Management
Alerts users of incidents and allows users to intervene manually or triggers an automated response.
Automated Response
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Incident Reporting
Documents cases of abnormal activity and compromised systems.
Security Intelligence (4)
Threat Intelligence
Stores information related to common threats and how to resolve them once incidents occur.
Vulnerability Assessment
Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
Advanced Analytics
Allows users to customize analytics with granulized metrics that are pertinent to your specific resources.
Data Examination
Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents.
Sandbox (1)
Sandbox
Based on 10 Check Point Infinity Platform reviews. An environment isolated from a network where threats can be safely evaluated.
Evaluation (4)
Malware Evaluation
Tools to test an object to see whether or not it qualifies as malware. This feature was mentioned in 10 Check Point Infinity Platform reviews.
Automatic Submission
The ability for a system to evaluate objects and automatically submit them to the sandbox.
Automatic Evaluation
The ability for a system to evaluate objects within the sandbax and assign a malware probability score.
Malware Probability Scores
The ability to assign objects a score based on their probability of being malware.
Prevention (5)
Intrusion Prevention
Enforces security paramaters to prevent unauthorized access.
Firewall
Protects servers, data center infrastructure and information from a variety of attacks and malware threats.
Encryption
Provide some level of encryption of information, protecting sensitive data while it exists within the data center.
Security hardening
Based on 10 Check Point Infinity Platform reviews. Facilitates system and network security by identifying and remediating vulnerabilities
Cloud Data Protection
Provides high quality and wide scope of in-cloud and offline data security capabilities.
Detection (3)
Intrusion Detection
Detects unauthorized access and use of privileged systems. 10 reviewers of Check Point Infinity Platform have provided feedback on this feature.
Security Monitoring
Based on 10 Check Point Infinity Platform reviews. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Anti-Malware / Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences. 10 reviewers of Check Point Infinity Platform have provided feedback on this feature.
Administration (11)
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. 10 reviewers of Check Point Infinity Platform have provided feedback on this feature.
Administration Console -
As reported in 10 Check Point Infinity Platform reviews. Provides a centralized console for administation tasks and unified control.
API / integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Compliance
Based on 18 Check Point Infinity Platform reviews. Monitors assets and enforces security policies to audit assets and infrastructure security.
Web Control
Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network. 18 reviewers of Check Point Infinity Platform have provided feedback on this feature.
Application Control
Blocks endpoint users from accessing restricted applications. 18 reviewers of Check Point Infinity Platform have provided feedback on this feature.
Asset Management
Based on 18 Check Point Infinity Platform reviews. Keeps records of each network asset and its activity. Discovers new assets accessing the network.
Device Control
As reported in 18 Check Point Infinity Platform reviews. Manages user network accessibility on laptops and mobile devices.
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Scalability
Provides features to allow scaling for large organizations and user bases.
Global Access
Extends SDP network access to users regardless of their physical location.
Network Maintenance (3)
Policy Optimization
Identifies redundent processes and policies, automates changes to reduce unnecessary policy enforcement.
Risk Analysis
Identifies potential network security risks, vulnerabilities, and compliance impacts. This feature was mentioned in 10 Check Point Infinity Platform reviews.
Auditing
Allows for deep examination into network-connected devices, policies, and protocols. This feature was mentioned in 10 Check Point Infinity Platform reviews.
Network Monitoring (3)
Network Monitoring
As reported in 10 Check Point Infinity Platform reviews. Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Configuration Monitoring
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Change Management
Tools to track and implement required network policy changes.
Functionality (4)
System Isolation
Cuts off network connection or temporarily inactivate applications until incidents are remedied. 18 reviewers of Check Point Infinity Platform have provided feedback on this feature.
Firewall
Protects endpoint devices from a variety of attacks and malware threats. 18 reviewers of Check Point Infinity Platform have provided feedback on this feature.
Endpoint Intelligence
Based on 18 Check Point Infinity Platform reviews. Analysis for users to examine threat intelligence data specific to their endpoint devices.
Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences. 18 reviewers of Check Point Infinity Platform have provided feedback on this feature.
Analysis (3)
Automated Remediation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly. This feature was mentioned in 18 Check Point Infinity Platform reviews.
Incident Reports
Produces reports detailing trends and vulnerabilities related to their network and infrastructure. 17 reviewers of Check Point Infinity Platform have provided feedback on this feature.
Behavioral Analysis
As reported in 18 Check Point Infinity Platform reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Automation (4)
Workflow Mapping
Visually displays connected applications and integrated data. Allows customization and management of workflow structures.
Workflow Automation
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Automated Remediation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Log Monitoring
Constantly monitors logs to detect anomalies in real time.
Orchestration (4)
Security Orchestration
Integrates additional security tools to automate security and incident response processes.
Data Collection
Collects information from multiple sources to cross reference and build contextual to correlate intelligence.
Threat Intelligence
Stores information related to common threats and how to resolve them once incidents occur.
Data Visualization
Offer pre-built and custom reporting and dashboards for quick insights into system states.
Response (3)
Alerting
Clearly notifies users with relevant information and anomalies in a timely manner.
Performance Baselin
Sets a standard performance baseline by which to compare log activity.
High Availability/Disaster Recovery
Allows platform to scale to size of desired environment and configured with high availability and disaster recovery capabilities.
Protection (4)
Policy Enforcement
Allows administrators to set policies for security and governance.
Security Audit
Allows for deep examination into network-connected devices, policies, and protocols.
Access Control
Supports LDAP Protocol to enable access control and governance.
User Authentication
Authenticates users prior to granting access to networks, applciations, and systems.
Monitoring (4)
Compliance Monitoring
Monitors data and compliance requirements. Sends alerts based on violations or misuse.
Vulnerability Monitoring
Monitors networks, applications, and systems to identify misconfigurations and access points that can be easily compromised.
Configuration Monitoring
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Observability
Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.
Generative AI (2)
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Summarization
Condenses long documents or text into a brief summary.
Agentic AI - Security Information and Event Management (SIEM) (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Intrusion Detection and Prevention Systems (IDPS) (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Top-Rated Alternatives



