Check Point Infinity Primary Use Case

Nuno Faria - PeerSpot reviewer
Managing Partner at NCSO

The use case involves managing various aspects, including endpoint security, SaaS interface, and firewall management within the Check Point Infinity architecture. The Infinity portal serves as a centralized hub for overseeing all components of the Check Point security suite. The architecture incorporates XDR and MDR, enabling automatic correlation of information. In scenarios where a security issue arises, the system can automatically analyze data from diverse platforms, such as endpoints, firewalls, and Office 365. T

View full review »
Ashish Upadhyay - PeerSpot reviewer
Founder at BlockMosiac

Check Point Infinity helps in developing centralized applications within an enterprise. Its primary use case is to enhance security and scalability in enterprise systems. It provides a robust framework for creating, managing, and securing centralized networks, ensuring data and transaction integrity. 

Check Point Infinity addresses scalability challenges by offering a solution capable of handling the growing volume of transactions while maintaining decentralization.

View full review »
Hendrik-Du Plooy - PeerSpot reviewer
Regional Manager at Saber1

My company's clients use Check Point Infinity to protect their data.

View full review »
Buyer's Guide
Check Point Infinity
April 2024
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited

As part of a large organization, this product gained the visibility of our security team thanks to its reputation of having the most advanced technology against the latest cyber threats. 

It protects everything, from cloud and company networks to endpoints and mobile devices, by adopting Check Point Infinity security architecture as a strategy to neutralize fifth-generation threats that spread fast and at a large scale through different vectors. 

We also saved money in our security implementation measures with this solution.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

At the end of 2020, the company was growing its staff. In addition, the pandemic was beginning, and as a result of these two factors, the company needed to protect the organization. It was there that the Check Point Infinity tool was used. 

It is characterized as a great tool against the latest generation of cyber attacks all these attacks are found on mobile devices, endpoints, etc. Always in the security part, companies must be aware of technologies since it is an essential part of organizations, and Check Point Infinity is an excellent tool for these functions.

View full review »
Erick Chinchilla Mena - PeerSpot reviewer
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana

Today we have the need to protect various infrastructures we have. We have infrastructure on-premise and in the cloud, and we have a variety of branches. All of the infrastructures has demanded greater security from us. We needed a new and evolved way of managing equipment and the security of our infrastructure. As a result of all these concerns, we have been adopting innovative security technologies, and this is where we have added additional value to the protection that we want to give to each of the places where we have hosted data and information. We have been adopting the themes of Infinity Cloud to have total protection.

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

We were looking for a solution that would allow us to establish a configuration with the different security devices remotely while centralizing management and including other products available at the security level. 

We looked into different options and brands that allowed us to establish, achieve and fulfill this need. This was one of the solutions that met all of these aforementioned characteristics, thus giving us 360º protection and accommodation in terms of managing security services. 

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

As we adapt to the changes left by the pandemic, we must adapt our technologies, our equipment, and the traditional scheme in which we worked must evolve.

As a result of these changes, we have been adopting security and much of the administration with fully cloud services to be able to adapt to these changes and give greater adaptability to our technologies.

With Check Point Infinity, we have the possibility of managing our platform from the cloud. It also offers us centralization and other solutions of the same portfolio in one place, taking advantage of great advantages; it is at this point where Check Point allows us to take advantage of a secure and centralized administration.

View full review »
CZ
Java Developer at EROAD

This is a full architecture suite that provides robust protection against cyber attacks. 

It resolves growing complex connectivity challenges and networking issues that affect performance. 

Check Point Infinity ascertains the security situation across the company infrastructure to design the best solution for evading ransomware attacks. It monitors the performance of cloud-hosted containers that carry sensitive information. 

Integration with mobile applications and desktop tools took place without any downtime indicators.

View full review »
BD
Senior Manager at a financial services firm with 10,001+ employees

We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors.

These sophisticated attacks are on mobile devices, endpoints, cloud, and various enterprise networks. They easily bypass the conventional, static detection-based systems used by organizations today.

The legacy perimeter-focused security approaches have become ineffective. The outdated assumption that everything inside the security perimeter can be trusted leaves organizations exposed for vulnerability and attack.

To protect the organization, we need to move up to the latest generation of cybersecurity tools. These combine real-time threat prevention, shared intelligence, and the most advanced zero-trust security across network, cloud, endpoint, and mobile devices.

View full review »
OP
Senior Network/Security Engineer at Skywind Group

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

View full review »
Michael Mugagga - PeerSpot reviewer
Systems Integrator at a tech services company with 11-50 employees

We required a first line of defense to protect, monitor, and ensure that no confidential information leaves the internal network. We also required a device that can segment our network so that different subnets like the DMZ, Production network, and testing environments. Threat prevention that required AI and ML capabilities was another reason to acquire the Check Point Quantum Spark NGFW. Finally, it offers an all-in-one solution that was a necessity where the same instance could manage and monitor VPNs, application control, web filtering, intrusion detection, and email security.

View full review »
LD
Cloud Support at a tech company with 1-10 employees

Our vendor told us about the solution. It was not required to use a management server since this portal provided the same service of free or licensed with the same logic already obtained from our GWs.             

View full review »
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees

When validating the centralized environment, we began to use other tools of the Check Point family that are available through the portal.

Some licenses already bring what is required to be able to manage.

The tool complies with the mobility issue since it can be used from anywhere.

The initial implementation was accomplished easily and without deployment problems.

Its quite intuitive dashboard helped us a lot with the administration.

View full review »
NG
Support at a security firm with 51-200 employees

We needed to handle the administration of the tools that we have with Check Point without the use of administration servers and from the cloud. With this product, we can centrally manage our security environments for the company through a web portal.

It is really easy to do it this way as the portal is managed directly by Check Point. We can detach ourselves from the portal and focus on the security of the infrastructure itself. The portal is extremely intuitive for admins.

View full review »
SK
Presales Engineer at Vincacyber

We use the solution for testing and conducting. For instance, we test this product using open-source samples containing different ransomware tools and another element.

View full review »
Kabelo Lamola - PeerSpot reviewer
Cyber Security trainee at Chimera

Check Point Infinity is used to protect information that is moved to the cloud. For example, when you upload your documents to the cloud wherever you are, that document can be encrypted so that no one can access it outside that domain. If they try to impersonate a user they won't be able to access it. There is verification that takes place if they are requesting to access a document with a password and a username to gain access.

View full review »
JH
Senior Network Engineer at a tech services company with 201-500 employees

We primarily implement the solution for our clients.

View full review »
Buyer's Guide
Check Point Infinity
April 2024
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.