We performed a comparison between Check Point Infinity and CyberArk Privileged Access Manager based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Palo Alto Networks, ESET and others in Advanced Threat Protection (ATP)."It is one of the best brands and products in terms of centralization."
"The initial implementation was accomplished easily and without deployment problems."
"It is a scalable product."
"The product, a cloud-based unified security solution, facilitates the automation of security threat detection and vulnerability management across various endpoints, including mobile and IoT devices. A notable feature is the centralized administration, allowing monitoring of existing solutions from web and mobile devices in a unified interface."
"Powerful cyber security functionalities track workflows to block all threats that may arise and affect the workflow chain."
"The detection and reaction rates are good."
"Our network security posture has improved significantly due to several factors. We've seen a 25% reduction in security incidents due to Infinity's advanced threat prevention capabilities. Additionally, the platform's automation features led to a 20% increase in operational efficiency, allowing our security teams to focus on more strategic tasks."
"The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."
"We have been able to manage application credentials in CyberArk, whether they come as a custom plugin or straight out-of-the-box."
"The threat analytics is an important feature."
"The most valuable feature is that it always provides flexibility, password quality and one-time user check-in and check-out."
"It supports lots of requirements in the privileged access management area."
"The product has allowed us to improve both the management and access to privileged credentials, while also creating a full audit trail of all activities happening within isolated sessions of all tasks and activities taking place within the solution."
"The key aspects of privileged access management are being able rotate passwords, make sure someone is accountable, and tie it back to a user (when the system is being used)."
"I find value in notifications from CyberArk when passwords fail verification and have other issues."
"We know when passwords will be expiring so we can force users to change their passwords, as well as requiring specific password requirements for length, complexity, etc."
"Technical support is something that needs improvement."
"We need improvement around the Smart-1 cloud solution."
"The portal is provisioned in AWS. They should improve the cloud to make it faster."
"The tool's technical support lags."
"The cost of maintaining and purchasing the security components is high."
"Check Point Infinity's web application is sometimes a little slow."
"There is an issue with high agent size, which impacts performance."
"It seems that the performance varies, likely influenced by the client's size and the provisioning of resources."
"The current interface is not very intuitive."
"I would like to see better usability for non-technical people."
"If you are an administrator or architect, then the solution is kind of complicated, as it is mostly focused on the end user. So, they need to also focus on the people who are implementing it."
"The continuous scanning of the assets is limited to Windows and Unix. We like to have the solution scan any databases, network devices, and security devices for privileged accounts. That would be very helpful."
"It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile."
"The lead product has a slow process. There are some reports and requirements from CyberArk which are not readily available as an applicable solution. We have made consistent management requests in the logs."
"Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server."
"Stability is a huge concern right now. We are on a version which is very unstable. We have to upgrade to stabilize it. It is fine, but the problem is we have to hire CyberArk to do the upgrade. This costs money, and it is their bug."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
Check Point Infinity is ranked 14th in Advanced Threat Protection (ATP) with 26 reviews while CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews. Check Point Infinity is rated 8.8, while CyberArk Privileged Access Manager is rated 8.8. The top reviewer of Check Point Infinity writes "Provide unified threat prevention and response across our entire decentralized finance system". On the other hand, the top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". Check Point Infinity is most compared with Cisco Secure Network Analytics, Skybox Security Suite, Proofpoint Email Protection and Microsoft Defender for Office 365, whereas CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.