Check Point Infinity

4.6
(4)

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyberattacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectiviity and inefficient security

Work for Check Point Infinity?

Learning about Check Point Infinity?

We can help you find the solution that fits you best.

Check Point Infinity Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • For Category
  • Industry
Ratings
Company Size
User Role
For Category
Industry
Showing 4 Check Point Infinity reviews
LinkedIn Connections
Check Point Infinity review by Consultant
Consultant
Validated Reviewer
Review Source
content

"The best way to protect your environment "

What do you like best?

The ease of deployment and security that the platform offers.

It integrates with all Check Point protection tools such as Gateway, Cloud, Mobile, Endpoint and IOT, and Infrastructure as a Service.

In addition, the tool behind a well intuitive console, which reduces the effort with the administration.

What do you dislike?

I believe that being a tool so robust and working for a long time with her, I do not see something that I do not like.

Recommendations to others considering the product

Be protected against major cyber threats using Check Point Infinity engines.

What business problems are you solving with the product? What benefits have you realized?

One client had many problems with emails that contained infected files. After enabling Threat Emulation and Threat Extraction, which uses infinity engines, these problems have decreased to almost 0%.

Sign in to G2 to see what your connections have to say about Check Point Infinity
Check Point Infinity review by User
User
Validated Reviewer
Review Source
content

"Best. Simply."

What do you like best?

The best thing is that it is extremely reliable. Its Endpoint function is the best in the market without any doubt. And its advanced threat prevention system is impressive. It is undoubtedly the best in the market.

What do you dislike?

Obviously, it is CISCO, so the only thing that is fucked up is the price. Very good, but very good.

Recommendations to others considering the product

If you have money and you want the best this is your option.

What business problems are you solving with the product? What benefits have you realized?

Defense of the external-internal network.

What Threat Intelligence solution do you use?

Thanks for letting us know!
Check Point Infinity review by User in Telecommunications
User in Telecommunications
Validated Reviewer
Review Source
content

"Check point"

What do you like best?

I like that it is easy to use and connects instantly after putting incredientials.

What do you dislike?

I dislike nothing. It is an easy tool to use and it takes no time at all to use it.

What business problems are you solving with the product? What benefits have you realized?

Connecting to my system so that I use it to connect to my network from my business internet to my internal system .

Check Point Infinity review by User
User
Validated Reviewer
Review Source
content

"Great tool "

What do you like best?

This is a very reliable security system. Very dynamic

What do you dislike?

This project is a little bit expensive.

What business problems are you solving with the product? What benefits have you realized?

I am using the tool for cloud based software security

There are not enough reviews of Check Point Infinity for G2 to provide buying insight. Below are some alternatives with more reviews:

1
F-Secure Logo
F-Secure
4.3
(48)
Going beyond malware protection, F-Secure provides end-point protection and security management solutions. Developed in Europe for businesses around the globe.
2
McAfee Threat Intelligence Exchange Logo
McAfee Threat Intelligence Exchange
4.0
(46)
McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.
3
Amazon GuardDuty Logo
Amazon GuardDuty
4.0
(35)
Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads.GuardDuty also detects potentially compromised instances or reconnaissance by attackers.
4
Cisco Talos Logo
Cisco Talos
4.3
(32)
Cisco Talos is a threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks.
5
Alert Logic Cybersecurity Logo
Alert Logic Cybersecurity
4.2
(16)
Alert Logic provides flexible security and compliance offerings to deliver optimal coverage across your environments.
6
Vectra AI Logo
Vectra AI
4.1
(14)
Vectra AI provides an automated threat management solution that monitors internal network traffic to detect in real time active cyber attacks inside networks.
7
Flowmon Logo
Flowmon
4.2
(13)
Flowmon Networks provides a solution that helps companies to enhance performance of their networks and secure them against modern cyber threats.
8
FortiSandbox Logo
FortiSandbox
4.7
(13)
FortiSandbox offers a powerful combination of advanced detection, automated mitigation, actionable insight, and flexible deployment to stop targeted attacks and subsequent data loss. It's also a key component of our Advanced Threat Protection solution.
9
SolarWinds MSP Threat Monitor Logo
SolarWinds MSP Threat Monitor
4.2
(10)
SolarWinds Threat Monitor empowers MSSPs of all sizes by reducing the complexity and cost of threat detection, response, and reporting. You get an all-in-one security operations center (SOC) that is unified, scalable, and affordable.
10
CapStar Forensics Logo
CapStar Forensics
4.6
(5)
CapStar Forensics is an analytic platform that complements Wireshark by enabling the syntax and vocabulary in a fully-programmable, stateful way, with a blazingly fast search engine that allows persistent searching.
Show more
Kate from G2

Learning about Check Point Infinity?

I can help.
* We monitor all Check Point Infinity reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.