Erick Chinchilla Mena - PeerSpot reviewer
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Real User
Top 5
Great protection with centralized segmentation and management
Pros and Cons
  • "Infinity has come to give us total protection."
  • "In the future, I would like to see new developments that allow us to centralize the cloud."

What is our primary use case?

Today we have the need to protect various infrastructures we have. We have infrastructure on-premise and in the cloud, and we have a variety of branches. All of the infrastructures has demanded greater security from us. We needed a new and evolved way of managing equipment and the security of our infrastructure. As a result of all these concerns, we have been adopting innovative security technologies, and this is where we have added additional value to the protection that we want to give to each of the places where we have hosted data and information. We have been adopting the themes of Infinity Cloud to have total protection.

How has it helped my organization?

Infinity has come to give us total protection. It has come to cover branches, devices, infrastructure, different clouds, and various types of sites where we host data, and we need to share it between the different regions we have a presence in. It has given us the protection that we did not have before.

The segmentation and management came in decentralized, which means that this has given us protection while providing the ability to centralize a single portal for our security teams so that each one of them can administer and manage everything. Infinity is of great value as it can centralize all those dashboards. Before we had them separate.

What is most valuable?

Everyone who uses Check Point products has been realizing that it has been innovating in immense ways. Before we had the perimeter network administration teams in one place, with the management of mobile devices or web browsing handled separately. Today, we have them in a centralized place and are managing (in different tabs) the security of each of its devices, branches, clouds, etc. It is a more efficient way to take advantage of all the computing power and intelligence behind it. And it has additional AI.

What needs improvement?

In the future, I would like to see new developments that allow us to centralize the cloud. Infinity Cloud is one of the most powerful clouds in security where a number of sites or technological capabilities have been established to protect our networks, our equipment, and our infrastructure, however, in the future what we could have is a comprehensive and novel way for new or additional features to protect services such as blockchain or web services3.

Buyer's Guide
Check Point Infinity
May 2024
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
771,157 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Systems Engineer at PGE
Real User
Top 5
Stable platform with good technical support services
Pros and Cons
  • "It is a scalable product."
  • "Check Point Infinity is not compatible with Windows 8."

What is most valuable?

It is a good tool. If we plan to change the password, we don't have to change the MX Points or SPF settings, as it works with Microsoft 365. It helps us prevent losing emails.

What needs improvement?

Check Point Infinity is not compatible with Windows 8.

For how long have I used the solution?

We have been using Check Point Infinity for two months. We did a POC for it.

What do I think about the stability of the solution?

It is a stable product. 

What do I think about the scalability of the solution?

It is a scalable product.

How are customer service and support?

The technical support services are good. We reach them regarding technical errors. They reply with the solutions in a few hours.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup process is complex.

What's my experience with pricing, setup cost, and licensing?

The product has good pricing considering the features and a global approach. I rate its pricing an eight out of ten.

What other advice do I have?

I rate Check Point Infinity a nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Infinity
May 2024
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
771,157 professionals have used our research since 2012.
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 5Leaderboard
Great analytics and AI with helpful centralizations capabilities
Pros and Cons
  • "It is one of the best brands and products in terms of centralization."
  • "We need improvement around the Smart-1 cloud solution."

What is our primary use case?

We were looking for a solution that would allow us to establish a configuration with the different security devices remotely while centralizing management and including other products available at the security level. 

We looked into different options and brands that allowed us to establish, achieve and fulfill this need. This was one of the solutions that met all of these aforementioned characteristics, thus giving us 360º protection and accommodation in terms of managing security services. 

How has it helped my organization?

This solution gave us the freedom to be an institution with its own security team, which has allowed us to establish ourselves. It is one of the best brands and products in terms of centralization. It allows us to establish all security products or security software under a single pane with a single view of a centralized dashboard. We are managing everything from there and have been able to handle threat prevention. It has allowed us, in a complete way, to handle expanded organizational scope. 

What is most valuable?

The portal gives us many advantages. 

It has great internal analytics, which contains artificial intelligence. It has the ability to be managed centrally and acquire and consume computing power from the cloud. This means that we will make a payment for the use of the services and a payment for the licensing. Additionally, computing power doesn't all come in a single license. We can take a single product and enable and facilitate it as necessary, making all of these capabilities and features available as needed. 

What needs improvement?

We need improvement around the Smart-1 cloud solution. It is included in the Infinity service, and it needs to be able to be restarted only from the background, with the brand's specialists - not done in an autonomous way. Developing this aspect and making it available to everyone consuming the services through the platform would help us manage many of the incidents due to cosmetic errors that can happen on the platform. 

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Top 5Leaderboard
Reliable, good at emulating threats, and is easy to manage
Pros and Cons
  • "For me, one of the best features of Check Point Infinity is to be able to have the possibility of emulating the activity of attached files with malicious content in such a short time."
  • "They need to update the guides."

What is our primary use case?

As we adapt to the changes left by the pandemic, we must adapt our technologies, our equipment, and the traditional scheme in which we worked must evolve.

As a result of these changes, we have been adopting security and much of the administration with fully cloud services to be able to adapt to these changes and give greater adaptability to our technologies.

With Check Point Infinity, we have the possibility of managing our platform from the cloud. It also offers us centralization and other solutions of the same portfolio in one place, taking advantage of great advantages; it is at this point where Check Point allows us to take advantage of a secure and centralized administration.

How has it helped my organization?

Check Point Infinity is one of the solutions that has given us more value, being able to adopt their cloud where they centralize many solutions. Taking advantage of all that computing power, we assure users inside or outside the organization are safe. After all, due to the changes produced by the pandemic, we have had to evolve with security and administration.

To have a cloud such as Check Point Infinity is to have an ally that puts at our disposal many solutions from a single portal. It offers great response at the level of security. 

What is most valuable?

For me, one of the best features of Check Point Infinity is to be able to have the possibility of emulating the activity of attached files with malicious content in such a short time. This capacity is of great value. Many times we want to know what an attack does and how an attack is exploited on our computers. With what we have learned from emulation we can reinforce our security lines or bases. You can learn a lot while always staying protected.

What needs improvement?

They need to update the guides. The product has improved a lot. However, its support guides are still the same as they were seven years ago. I say this from experience. For example, for configuration, it is necessary in some cases to consult these same guides and you see yourself looking at references the old information is still there. 

The support for Latin America is one of those that is also a bit neglected. We are without direct technicians speaking in Spanish. In some cases and their support is fast, however, this cultural shock makes interaction difficult, and when it comes to the escalation of the problems, mainly when the cases are urgent or escalated, the most experienced technicians only speak English.

For how long have I used the solution?

I've used the solution for around two years.

What do I think about the stability of the solution?

The solution is scalable and is very complete. It centralizes everything.

What do I think about the scalability of the solution?

It is a really complete solution. It manages to cover everything in the Infinity Check Point Portal.

Which solution did I use previously and why did I switch?

We did not previously use a different solution. 

What's my experience with pricing, setup cost, and licensing?

What Check Point currently does at the security level is very good. However, some prices in reference to licenses are a bit high. An example is how they sell SSL.

Which other solutions did I evaluate?

We did not evaluate other options. 

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Real User
Top 5Leaderboard
Centralizes the management of all our Check Point products in one place and offers robust stability
Pros and Cons
  • "I would rate the stability a ten out of ten. Stability is always important. I haven't faced any issues with the Infinity Portal in the last six or seven years."
  • "The updates could be less frequent."

What is our primary use case?

The Infinity Portal is primarily a management tool. It's a single pane of glass to access and control all our Check Point products from one central location.

I work extensively with the Infinity Portal. It's the central management interface for all our Check Point products.

How has it helped my organization?

It has brought value. For example, a customer already has Check Point solutions in place. Rather than opening a separate console for each product, they can use the Infinity Portal. Just open Infinity, and with a single click, they're redirected to the product they need – email security, Harmony Connect, Harmony Internet Access, for example. It eliminates the need to open multiple interfaces.

It's how we manage products like Harmony Mobile, which enhances our mobile security.

Infinity is a platform. The zero-day protection capabilities would come from the specific products we use within it. 

My primary work involves Check Point firewalls and the Harmony product portfolio. We've definitely seen a lot of focus and new business growth in areas like Harmony and Arbor.

What is most valuable?

It's very easy to access and works fine for me. Centralizing the management of all our Check Point products in one place saves our team a ton of time.

Infinity is a platform rather than a specific security feature. It provides a central access point for our purchased Check Point products like Harmony Email, Harmony Connect, Harmony Browser, Harmony VPN, etc.

The unified management console enhances security operations. We manage all our products through a single console instead of needing to open separate interfaces for each one.

What needs improvement?

The updates could be less frequent. 

For how long have I used the solution?

I have been using it for six years now. 

What do I think about the stability of the solution?

I would rate the stability a ten out of ten. Stability is always important. I haven't faced any issues with the Infinity Portal in the last six or seven years.

What do I think about the scalability of the solution?

There is no need for scalability as it is a ready-made and web-based product that we got from Check Point. Most of our customers use it, for example, firewalls, Harmony product portfolio, and cloud/network security. Most of these customers find the Infinity Portal beneficial because of its convenience.

There are easily over a hundred customers. Customers already using Check Point products are, by default, using the Infinity Portal to access them. Even I use it.

How are customer service and support?

The customer service and support are very good. It is very fast and customer friendly. It has been very friendly. 

How was the initial setup?

It's incredibly easy. Once you have a Check Point account, the portal is ready to use. All you need is the URL.

As a cloud-based platform, so, there wasn't easy to difficult. It is a one-minute job. There are no specific requirements for the platform. 

One of the benefits is that there's no deployment required for the Infinity Portal itself. It's accessible via a simple URL.

What's my experience with pricing, setup cost, and licensing?

There's no additional license requirement.

What other advice do I have?

Overall, I would rate the solution a ten out of ten. It's reliable, stable, and very easy for anyone to access from anywhere.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Java Developer at EROAD
User
Top 5
Secure with helpful support and good performance
Pros and Cons
  • "Powerful cyber security functionalities track workflows to block all threats that may arise and affect the workflow chain."
  • "The cost of maintaining and purchasing the security components is high."

What is our primary use case?

This is a full architecture suite that provides robust protection against cyber attacks. 

It resolves growing complex connectivity challenges and networking issues that affect performance. 

Check Point Infinity ascertains the security situation across the company infrastructure to design the best solution for evading ransomware attacks. It monitors the performance of cloud-hosted containers that carry sensitive information. 

Integration with mobile applications and desktop tools took place without any downtime indicators.

How has it helped my organization?

This product has centralized all the network security operations, giving the IT department less time to monitor data workflows. 

It provides security solutions to both cloud and on-premises with less cost as compared to other applications. 

Browsing across the internet sites has been secure with Infinity

It detects any threats across the company application systems that could bring harm and destroy useful data. 

It ensures that all the cloud-hosted applications comply with security policies to enhance the secure collaboration among apps.

What is most valuable?

The security services that are provided in the organization have given departments an opportunity to focus more on productive business activities. 

The complete security set of tools enables each sector to focus on threats that are directly proportional to engaged programs. 

Powerful cyber security functionalities track workflows to block all threats that may arise and affect the workflow chain. 

It has integrated all the components in the organization with the central control system that provides comprehensive reports on work processes.

What needs improvement?

There are a few cases that arise from the customer support staff regarding the setup and operations. 

The cost of maintaining and purchasing the security components is high. 

Familiarization with the security features and operations took time, however, we are now set to enjoy all the benefits. 

So far, we are satisfied with most functionalities. We have achieved the set goals and updated our systems to comply with international security policies. It has integrated effectively with modern tools across the organization.

For how long have I used the solution?

I have been using Infinity for seven months. 

What do I think about the stability of the solution?

The reliable security architecture has boosted performance.

What do I think about the scalability of the solution?

I like the general performance and productivity.

How are customer service and support?

The team cooperates fully when contacted in order to offer any assistance. I appreciate their patience and support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the only solution that I have used in this category.

How was the initial setup?

The setup was slightly complex - especially in terms of integrations with applications.

What about the implementation team?

The implementation process was handled in-house.

What was our ROI?

Increased security infrastructure has resulted in increased ROI.

What's my experience with pricing, setup cost, and licensing?

The cost is relatively high.

Which other solutions did I evaluate?

We are evaluating other options. That said, we have not discovered a more powerful solution yet.

What other advice do I have?

I totally recommend this solution to other enterprises.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Senior Manager at a financial services firm with 10,001+ employees
Real User
Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network
Pros and Cons
  • "The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."
  • "The licensing model for Check Point Infinity is not clear."

What is our primary use case?

We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors.

These sophisticated attacks are on mobile devices, endpoints, cloud, and various enterprise networks. They easily bypass the conventional, static detection-based systems used by organizations today.

The legacy perimeter-focused security approaches have become ineffective. The outdated assumption that everything inside the security perimeter can be trusted leaves organizations exposed for vulnerability and attack.

To protect the organization, we need to move up to the latest generation of cybersecurity tools. These combine real-time threat prevention, shared intelligence, and the most advanced zero-trust security across network, cloud, endpoint, and mobile devices.

How has it helped my organization?

Rebuilding security infrastructure around the Zero Trust approach, using disparate technologies might lead to complexities and inherent security gaps. To avoid errors and provide robust security, Check Point offers more practical and holistic approaches to implement Zero Trust. It is based on a single consolidated cybersecurity architecture, Check Point Infinity.

Check Point provides different solutions to protect organizations at each level. They have products that can work in a silo or can be integrated with other security solutions to enhance security by mitigating risk and providing a dashboard for monitoring.  

Generated logs can be sent to a SIEM solution, where a use case or action can be defined against raised alerts. Automated policies/processes can be created accordingly.

For example, if we need to block communication from a suspicious IP for which an alert has been raised, and send it to ServiceNow. We can create a playbook on the ServiceNow platform for raisings an alert, which will instruct the NGFW firewall to block the connection.

What is most valuable?

The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles.

Zero Trust Security, Check Point Infinity is an architecture provided by Check Point that includes a solution for protecting organizations at different levels. 

Zero Trust Networks: The Check Point Security Gateway enables micro-segmentation across the organization's network. Integration with Identity awareness and Application Control enables policy enforcement at a granular level.

Zero Trust Workloads: Protect workloads hosted in private and public clouds, enforce compliance, detect and remediate misconfiguration.

Zero Trust People: Identity awareness enables granting access to data for authorized users with SSO and MFA.

Zero Trust Devices: Sandblast Agent Endpoint and Check Point Sandblast Mobile protect employees' mobile devices and workstations from advanced attacks, Zero-day malware, malicious app installation, and more. Network-based threat prevention protects devices from threats that are coming from the network and vice versa.

Zero Trust Data: Protect data by performing full hard disk encryption on endpoint and external media encryption on all removable storage media. Data shared to external partners over the Internet is encrypted by site-to-site VPN and client-to-site VPN.

Visibility and Analytics: The Check Point attack dashboard allows for immediate response to security incidents and provides real-time forensics for investigating events.

Automation and Orchestration: Security architecture integration with organization border IT environment enhances speed and agility, incident response, policy accuracy, and task delegation.

What needs improvement?

The licensing model for Check Point Infinity is not clear. As infinity licenses are based on the number of users, it confuses larger organizations, where not every user needs every service. 

For example:

For an organization size of more than 100,000 users, where only a few users need to have access to SandBlast Mobile for protecting their BYOD devices against threats, and there are a few users that need Capsule to access corporate data, and in addition, if the organization needs to protect all of the user's email accounts using Check Point Email Security, then it creates issues in terms of the license count. It is confusing when it comes to figuring out how to fulfill the requirements.

What do I think about the stability of the solution?

Check Point solutions are stable.

What do I think about the scalability of the solution?

It's a framework, so it is scalable.

How are customer service and technical support?

The technical support is excellent.

Which solution did I use previously and why did I switch?

We are using this solution to provide having security at each level of the environment.

How was the initial setup?

Different solutions or products from Check Point are involved for creating complete this security framework.

What about the implementation team?

We deployed with an in-house team with OEM support.

What's my experience with pricing, setup cost, and licensing?

Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA).

Which other solutions did I evaluate?

We have worked with different products from Check Point and other security solutions.

What other advice do I have?

This is a security architecture. Organizations can use different Check Point solutions for protecting different environments, such as the network, email, endpoints, and more.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Presales Engineer at Vincacyber
Real User
Top 5Leaderboard
A solution for testing with high detection rate but lacks EDR features
Pros and Cons
  • "The detection and reaction rates are good."
  • "There is an issue with high agent size, which impacts performance."

What is our primary use case?

We use the solution for testing and conducting. For instance, we test this product using open-source samples containing different ransomware tools and another element.

What is most valuable?

The detection rate is good. It also has personal management that provides all the details on one dashboard. Depending upon the requirements, you can customize the dashboard. The visibility part is also very good. It can customised. The reaction rate is good.

What needs improvement?

There is an issue with high agent size, which impacts performance. The EDR part should provide more features.

For how long have I used the solution?

I have been using Check Point Infinity for 6 months.

What do I think about the scalability of the solution?

The solution’s scalability is good but complex to maintain. They need to provide technical training to the partners. Expanding the team to get expertise and hands-on solutions will be easy.

How are customer service and support?

Support is not that much good. Response time is very high. Some issues take a few days to resolve.

How was the initial setup?

The initial setup is neither easy nor complex. Any technical user can quickly deploy it. You need two to three resources to monitor and support the solution for a thousand assets. We use email deployment and data deployment. You don't use manual deployment. It is challenging for multiple users.

What was our ROI?

Check Point is a universal solution with multiple features that customers expect in one product to meet all the requirements.

What's my experience with pricing, setup cost, and licensing?

The product has moderate pricing depending on the devices. The OEM's services are quite high.

What other advice do I have?

We are a cybersecurity company providing solutions for our customers. We tested the Check Point solution, not just as a solution provider but also to assess cybersecurity for Check Point. We tested various products and have found that the Check Point endpoint protection offers multiple capabilities. It covers postal management, DDR capabilities, and many other features, such as cloud assessment and sandboxing in the cloud.

They should have a dedicated team or take services from third-party sources to maintain the solution. They can have this solution for endpoint protection and mobile protection.

We can customize the dashboard to meet our needs. We can tailor the dashboard to display the information we need depending on our requirements.

Overall, I rate the solution a seven out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Check Point Infinity Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2024
Buyer's Guide
Download our free Check Point Infinity Report and get advice and tips from experienced pros sharing their opinions.