We performed a comparison between Check Point Infinity and Microsoft Defender for Office 365 based on real PeerSpot user reviews.
Find out in this report how the two Advanced Threat Protection (ATP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature of Check Point Infinity is the ease of use and navigation."
"We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure."
"I would rate the stability a ten out of ten. Stability is always important. I haven't faced any issues with the Infinity Portal in the last six or seven years."
"The product, a cloud-based unified security solution, facilitates the automation of security threat detection and vulnerability management across various endpoints, including mobile and IoT devices. A notable feature is the centralized administration, allowing monitoring of existing solutions from web and mobile devices in a unified interface."
"It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security."
"It is one of the best brands and products in terms of centralization."
"A notable aspect that I appreciate is their ongoing effort to redesign the portal, giving it a fresh and centralized appearance."
"The most valuable features of the solution stem from factors like ease of use, visibility, and cost to the enterprise."
"At the moment we are satisfied with this product. It's a stable, scalable, and resilient solution for us."
"Defender enables us to secure all 365-related activity from a single place. It gives us visibility into everything happening in Outlook, protecting us against phishing and other email-based threats. Defender helps us detect any suspicious behaviors."
"The most valuable feature is protection against malicious links, fishing, and impersonation. You can train people to be aware of these threats, but they're not always careful. When they're using their phones between meetings, they click on a link, and it's game over."
"I would say that 90% of the spam and phishing attack emails get blocked right off the bat."
"Microsoft Defender for Office 365 has improved my organization's security. It makes it easier to manage the infrastructure without the help of third-party applications."
"Our customers are satisfied with Defender for 365 because Microsoft products are easy to use and customize to meet the client's needs. Everything is in one place, so we can adjust policies as needed for phishing, DLP, ATP, or any other security features that our clients want to apply."
"The basic features are okay and I'm satisfied with the Defender."
"Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of various email campaigns, pinpointing where they emanate from, and identifying the individuals within our organization who are affected."
"The console at the beginning also has the section on where to save the logs, however, if by mistake we choose a very remote area, this detail cannot be corrected unless the change of data center where the logs are housed, which is requested through support, which can become a management difficulty."
"Check Point Infinity is not compatible with Windows 8."
"Alert fatigue is a common issue with platforms that have strong detection capabilities. Implementing more filtering and prioritization mechanisms can help address this issue, ensuring that security teams can focus on the most critical threats."
"Check Point Infinity price could improve."
"While Check Point Infinity is a robust and innovative solution, some areas could benefit from improvement. One area is the user-friendly integration of privacy-focused features."
"We have had some performance issues. Because of this, we had to redirect traffic to be analyzed by other appliances."
"Technical support is pretty delayed."
"Check Point Infinity's web application is sometimes a little slow."
"The UI needs to be more user-friendly."
"Several simulation options are available within 365, and the phishing simulation could be better."
"The XDR dashboard has room for improvement."
"Microsoft Defender for Office 365 should improve the troubleshooting tools. It's unclear whether the device is blocked at the firewall level or at the device itself. The granularity needed for troubleshooting is currently lacking. From my perspective, Microsoft should address this issue to benefit many users who likely share the same sentiment."
"The company should focus on adding threats that the solution is currently unable to detect."
"The visibility for the weaknesses in the system and unauthorized access can be improved."
"One area for improvement is support, in terms of being able to reach them and, especially, technical support for configuration."
"There needs to be an improvement in integrating the product to work across multiple operating systems, and to have better support for non-Microsoft file types."
More Microsoft Defender for Office 365 Pricing and Cost Advice →
Check Point Infinity is ranked 10th in Advanced Threat Protection (ATP) with 26 reviews while Microsoft Defender for Office 365 is ranked 1st in Advanced Threat Protection (ATP) with 41 reviews. Check Point Infinity is rated 8.8, while Microsoft Defender for Office 365 is rated 8.4. The top reviewer of Check Point Infinity writes "Provide unified threat prevention and response across our entire decentralized finance system". On the other hand, the top reviewer of Microsoft Defender for Office 365 writes "Allows for easy reporting of problems, valuable anti-phishing, and anti-malware support". Check Point Infinity is most compared with Cisco Secure Network Analytics, CyberArk Privileged Access Manager and Skybox Security Suite, whereas Microsoft Defender for Office 365 is most compared with Proofpoint Email Protection, Mimecast Email Security, Microsoft Exchange Online Protection (EOP), Cisco Secure Email and Barracuda Email Security Gateway. See our Check Point Infinity vs. Microsoft Defender for Office 365 report.
See our list of best Advanced Threat Protection (ATP) vendors.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.