PeerSpot user
Senior Network/Security Engineer at Skywind Group
Real User
Offers a unified security approach that provides full control over users and what they can do
Pros and Cons
  • "We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure."
  • "I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

How has it helped my organization?

The "Infinity" is not some standalone security solution, but the way you plan and implement the whole security infrastructure of your company. It contains all the modern components from Check Point. 

In our company, we use the hardware appliances, Next-Generation Firewalls, with a bunch of blades activated (DLP, IPS, VPN, etc.) to protect the data centers. Our data centers are controlled by the Check Point Security management, with the current version being R80.10. These are the basic building blocks of Check Point Infinity, and they work just great together. They also allow for the future extension and we are thinking about adding the Anti-DDOS protection on the edge of our environments. 

We are fully satisfied with the abilities it provides and the general approach of the Check Point solutions.

What is most valuable?

The Check Point Infinity architecture is the unified approach for building the unified security infrastructure of our company. I like that it covers all the pieces of the modern enterprise organization security needs including offices and data centers, public cloud environments, and the interconnects between them. It also protects end-user devices such as laptops, smartphones, and tablets.

We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure. I also like that all of the components are tightly integrated and there is a single endpoint to control all the elements. This is called the Smart Console.

What needs improvement?

Even though we have had several support cases opened for the components of the Check Point Infinity architecture, as an administrator, I'm satisfied with the solution and the abilities it provides. I can't describe any disadvantages at the moment, except for the overall price of purchasing and maintaining the entire set of components.

I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain. Maintenance requires that the licenses and the support services be prolonged regularly.

Alternatively, they should create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers.

Buyer's Guide
Check Point Infinity
May 2024
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
770,458 professionals have used our research since 2012.

For how long have I used the solution?

We have been using the Check Point Infinity for about three years, starting in late 2017.

What do I think about the stability of the solution?

All of the components in Check Point Infinity are mature and stable and we have not encountered any issue with that.

What do I think about the scalability of the solution?

The solution scales well with the hardware we have, and we see that scalability, the Active-Active HA mode, doesn't affect the overall performance much after activation.

How are customer service and support?

We have had several support cases opened, but none of them were connected with the Check Point Mobile Access Software Blade. Some of the issues were resolved by installing the latest recommended JumoHotfix, whereas some required additional configuration at the OS kernel level.

The longest issue took about one month to be resolved, which we consider too long.

Which solution did I use previously and why did I switch?

We have not used any solution of this kind before.

How was the initial setup?

The setup was straightforward. The configuration was easy and understandable, and we relied heavily on built-in objects and groups.

What about the implementation team?

Our deployment was completed by our in-house team. We have a Check Point Certified engineer working in the engineering team.

What's my experience with pricing, setup cost, and licensing?

Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.

Which other solutions did I evaluate?

We decided to stick to the Check Point Infinity after the demo with the vendor.

What other advice do I have?

The Check Point Infinity security architecture is a robust and modern security solution for organizations of any size, but make sure that you have a dedicated budget to maintain it. It is really not cheap.

Also, it is better to have a dedicated and certified Check Point specialist in your engineering team, since the solution is complex.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Michael Mugagga - PeerSpot reviewer
Systems Integrator at a tech services company with 11-50 employees
User
Top 20
Easy to deploy with a nice GUI and good AI
Pros and Cons
  • "The sandblast threat emulation is great."
  • "We'd like to see support for fiber connections."

What is our primary use case?

We required a first line of defense to protect, monitor, and ensure that no confidential information leaves the internal network. We also required a device that can segment our network so that different subnets like the DMZ, Production network, and testing environments. Threat prevention that required AI and ML capabilities was another reason to acquire the Check Point Quantum Spark NGFW. Finally, it offers an all-in-one solution that was a necessity where the same instance could manage and monitor VPNs, application control, web filtering, intrusion detection, and email security.

How has it helped my organization?

With Check Point Quantum Spark, we have a first line of defense in our environment, seated just after the router that connects to the ISP's endpoint, all traffic entering and leaving the network is monitored, and filtered depending on the different rules created. 

The functionality of AI helps further in the threat detection field. This NGFW is able to support a large number of VPN connections and at the same time monitor these connections for any anomaly. 

Finally, for any flagged threats, a sandbox functionality is also provided making it even more robust in detecting zero-day attacks.

What is most valuable?

The sandblast threat emulation is great. We are able to visualize the extent of specific threats without necessarily having them deployed in our environment. The Sandbox feature is able to virtualize an environment that can mirror what we have in the internal environment.

The quality of Service for different traffic types is excellent. We are able to prioritize business-critical traffic over other types of traffic like streaming.

Artificial intelligence threat profiling has helped a lot in detecting and protecting the internal network from zero-day, DNS, and DDoS attacks. 

What needs improvement?

We'd like to see support for fiber connections. With the growth of the network, we would expect that more and more traffic is going through this device and soon enough, the bottleneck will be the type of connection being used to transfer data to the router and further to the ISP. A throughput of 1GBPS will hinder performance on the network.

Configuring fault tolerance for specific features, for example, power sources would ensure that the chances of the system shutting down due to a power surge are highly limited. This can further increase the SLA to 99.99%

For how long have I used the solution?

We've used the solution for three years and we just recently upgraded to the 1535 series.

What do I think about the stability of the solution?

The system is stable and able to perform with the advised load without fail. 

What do I think about the scalability of the solution?

Quantum Spark is designed for small to medium businesses. With this in mind, the scalability is perfect and will support up to a firewall throughput of 1GBPS which is favorable for an SMB.

How are customer service and support?

The Check Point customer service is prompt and with their knowledge base, the majority of the issues incurred are already cleared noted with a list of multiple solutions. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously we used the Sophos XGS series. The Sophos XGS firewall no longer met the business' growing needs as it further led to a slowness in the performance of the network hence the search for a new system that would fix this.

How was the initial setup?

The initial setup was straightforward. Check Point's GUI interfaces are user-friendly, and it also provides a lot of information on setting up their devices.

What about the implementation team?

This was an in-house deployment. 

What was our ROI?

With the increased internal network performance and a decrease in the threats being exposed to the network; the return on investment for this is roughly in the range of 40% to 60%.

What's my experience with pricing, setup cost, and licensing?

Quantum Spark has different subscription models where you can add more functionality as required. For a constrained budget, you can specifically pick out the functionalities you want, and pay for that.

Which other solutions did I evaluate?

We also considered:

  • Cisco ASA 5500 series
  • Cisco FirePower 1000s

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Infinity
May 2024
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
770,458 professionals have used our research since 2012.
Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
Great infinity portal, modern, intuitive.
Pros and Cons
  • "New Check Point technologies can be found via this portal."
  • "The portal is provisioned in AWS. They should improve the cloud to make it faster."

What is our primary use case?

Our vendor told us about the solution. It was not required to use a management server since this portal provided the same service of free or licensed with the same logic already obtained from our GWs.             

How has it helped my organization?

Check Point Infinity Portal has given us an excellent complete solution where we can use many security plugins integrated into a single console and is providing that centralized security environment that all companies look for, including logs, monitoring, and security from the same part.

This portal is extremely intuitive as well as versatile and accessible from anywhere, providing all this control and business security in an easy way.

New Check Point technologies can be found via this portal.

Check Point Infinity is a great tool.

What is most valuable?

One of the most important features is the simple access. It's easy from anywhere, it's safe, and you can even use MFA to have a security layer for administrator users.

It is a centralized portal that provides all the features required for cloud environments, to manage our gateways developed in Microsoft Azure.

This portal also has an incredible availability since I've been using it I haven't had log in problems or service outages, quite useful to integrate all the new products.

Its costs are quite accessible.

What needs improvement?

In general, Check Point can improve its documentation. Sometimes they are very old. They could include more examples to guide customers in their implementations.

I have noticed that new technologies are more difficult to find guides. Without them, the objective to implement them correctly is not always achieved.

On the other hand, I think it is good to improve the support service since it is somewhat slow for cloud issues, they are resolved, but after several weeks, I think the solution SLA should be improved.

The portal is provisioned in AWS. They should improve the cloud to make it faster.

For how long have I used the solution?

Check Point Infinity is a completely innovative security solution that we have used for the administrative use of both Check Point Harmony and Check Point SmartCloud to manage our gateways. It is a solution that does not use a server provisioned by the client. It is located in a web portal in which you can incorporate many of these features like the ones we currently use. We have been using it for more than two years.

Which solution did I use previously and why did I switch?

We did not previously use a solution as complete as Check Point Infinity Portal.

What's my experience with pricing, setup cost, and licensing?

It is important to have access to licensing consultations with a direct Check Point vendor to determine needs. In addition, the costs are not always public, which is why it is very helpful to have someone to assist.

Which other solutions did I evaluate?

We have previously evaluated other technologies and manufacturers. However, the most complete is Check Point.

What other advice do I have?

I recommend this security tool. However, it is important to validate with your Check Point partner if it fits your business needs.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
portal very automated, modern
Pros and Cons
  • "The initial implementation was accomplished easily and without deployment problems."
  • "The console at the beginning also has the section on where to save the logs, however, if by mistake we choose a very remote area, this detail cannot be corrected unless the change of data center where the logs are housed, which is requested through support, which can become a management difficulty."

What is our primary use case?

When validating the centralized environment, we began to use other tools of the Check Point family that are available through the portal.

Some licenses already bring what is required to be able to manage.

The tool complies with the mobility issue since it can be used from anywhere.

The initial implementation was accomplished easily and without deployment problems.

Its quite intuitive dashboard helped us a lot with the administration.

How has it helped my organization?

At the company level, we managed not to have to depend on a server that was implemented together with the company's infrastructure. Still, really it is only necessary to join the portal.

The license was included for its use.

By also providing a fairly intuitive portal, it allows security administrator users to carry out their tasks in a simple way. For example, it is only necessary to switch to the Harmony Blade to be able to manage policies and controls over them.

The monitoring theme is quite efficient.

What is most valuable?

Check Point Infinity Portal achieved many of the company's requirements, including:

1- An easy and fast implementation of the portal.

2- Licensing is already included in some Check Point tools, such as the Check Point gateways.

3- Accessibility from anywhere.

4- Use of MFA to ensure the identity of the user.

5- An automated, modern, and simple portal for security administrators.

This is a very good management tool, which saves logs depending on the policy implemented from the beginning to have portal information that can be used later.

What needs improvement?

Some points of improvement of the centralized management tool may be the latency that is rarely provided when managing, for example, the smart cloud of Check Point for gateways.

The console at the beginning also has the section on where to save the logs, however, if by mistake we choose a very remote area, this detail cannot be corrected unless the change of data center where the logs are housed, which is requested through support, which can become a management difficulty.

As for support for modern and cloud-based tools, they are somewhat more difficult to solve quickly.

For how long have I used the solution?

This is an excellent centralizing tool. We started using it to manage our Check Point gateways.

What do I think about the stability of the solution?

This is a quite stable solution and does not require maintenance by the client.

It has some performance problems, however, they are few. In itself the tool is quite interesting and powerful.

Which solution did I use previously and why did I switch?

We have not used a cloud management tool before. Some are similar yet do not meet what Check Point can offer.

What's my experience with pricing, setup cost, and licensing?

The issue of licensing is not required since some solutions already include management with this portal. Similarly, it is essential to register with a partner who can delve into the manufacturer's options for the client's benefit.

Which other solutions did I evaluate?

Of course, validation of the available documentation of the tools is always carried out, however, Check Point was adjusted to what is required by the company.

What other advice do I have?

I recommend the use of this administration portal.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Support at a security firm with 51-200 employees
User
Top 5Leaderboard
Infinity Porta is a secure environment and has good overall functionality
Pros and Cons
  • "We can add our environments and can configure and manage them easily which is why administrators are happy with this tool."
  • "Check Point Infinity's web application is sometimes a little slow."

What is our primary use case?

We needed to handle the administration of the tools that we have with Check Point without the use of administration servers and from the cloud. With this product, we can centrally manage our security environments for the company through a web portal.

It is really easy to do it this way as the portal is managed directly by Check Point. We can detach ourselves from the portal and focus on the security of the infrastructure itself. The portal is extremely intuitive for admins.

How has it helped my organization?

We like the Check Point Infinity Portal's functionality. It provides us, within the license, the use of a secure environment for the administration of various manufacturer tools and we can easily, intuitively, and safely work from the web browser without having to have our own server and additional licensing to manage. In addition, this console complies with all identity security tools that prevent us from being violated by losing control of the console.

From the portal, we manage our FWs in addition to using Harmony Connect.

What is most valuable?

This web tool, or the web administration server included in the license, is really intuitive. We can add our environments and can configure and manage them easily which is why administrators are happy with this tool.

There are no additional costs, which is why it is really important for the company.

And finally, it is managed by Check Point in terms of access, availability, and security. Connecting to the portal is secure which is really providing the company with administration security.

What needs improvement?

Check Point Infinity's web application is sometimes a little slow. It really is only a little slow, however, it is perceived that it is not normal to be that way. The performance of the site could be improved depending on the capabilities it has at the moment.

There should be more documentation on these new technologies and administrative portals, in addition to including more tools from the manufacturer to finally have them all centralized to facilitate the client's administration from the same place without having any connectivity problems.

For how long have I used the solution?

We have used Check Point Infinity Portal for at least a year and have had great results. It is a centrally managed environment for many of the other Check Point tools.

Which solution did I use previously and why did I switch?

I have not previously used a solution similar to Check Point Infinity.

What's my experience with pricing, setup cost, and licensing?

The tool comes licensed with the required security tools. I recommend that new users try it as a test mode to determine if their infrastructure and the administration functionality work for them.

Which other solutions did I evaluate?

We always try to validate the competence of manufacturers in our organization in order to determine the best option. In this case, Check Point is the best option for us.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Technical Support at Hitachi Systems, Ltd.
Real User
Top 5
Has centralized management console but technical support lags
Pros and Cons
  • "The tool's most valuable feature for threat prevention is the encryption alarm. I find the centralized management console, including the log analyzer and reports in Check Point Infinity, extremely beneficial for enhancing security and operations efficiency in our enterprise. I would rate it a perfect ten out of ten, as it effectively helps us analyze logs, and detect potential attacks."
  • "The tool's technical support lags."

What is most valuable?

The tool's most valuable feature for threat prevention is the encryption alarm. 
I find the centralized management console, including the log analyzer and reports in Check Point Infinity, extremely beneficial for enhancing security and operations efficiency in our enterprise. I would rate it a perfect ten out of ten, as it effectively helps us analyze logs,  and detect potential attacks. 

What needs improvement?

The tool's technical support lags. 

For how long have I used the solution?

I have been using the product for six to seven months. 

What do I think about the stability of the solution?

I rate the solution's stability a nine out of ten. 

What do I think about the scalability of the solution?

I rate the tool's scalability an eight point five out of ten. 

Which solution did I use previously and why did I switch?

We used Trend Mico before Check Point Infinity.We currently have approximately 500 endpoints deployed. So far, the system is working seamlessly, and we haven't encountered any security issues. I'm confident in the product's security features. We are currently the documentation, and the support portal has been reliable, providing us with ample resources to troubleshoot any issues.


What's my experience with pricing, setup cost, and licensing?

When it comes to price, the paramount consideration is the strength of the security. If the security measures provided by the product, such as Check Point Infinity, are robust and meet our requirements, price becomes a secondary concern.

What other advice do I have?

For those considering Check Point Infinity, my advice is to gain hands-on experience and acquire a foundational understanding of the product before diving into the implementation process. I rate it a nine out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Flag as inappropriate
PeerSpot user
Anuraj Nair - PeerSpot reviewer
Presales Engineer at SNSIN
Real User
Top 5Leaderboard
We can navigate to all the products very easily because it is written in a normal installation
Pros and Cons
  • "Infinity is a technical console where we have to log in, and we can navigate to all the products very easily because it is written in a normal installation. People who know about the product can click and take care of their activity."
  • "Technical support is pretty delayed."

What is our primary use case?

Infinity is a single platform where you can integrate all the Check Point solutions such as Check Point Email Security, Check Point Endpoint Protection, Check Point SaaS, Check Point web proxy solutions, and Check Point Firewall. It can be integrated into the Infinity portal, and we can manage and configure it from the Infiniti portal.

What is most valuable?

Infinity is a technical console where we have to log in, and we can navigate to all the products very easily because it is written in a normal installation. People who know about the product can click and take care of their activity.

What needs improvement?

Technical support is pretty delayed. It's very slow, and they have not yet received their IT. Compared to other OEMs, Check Point's response is a bit slow but could have been improved. There are two areas to improve: The latency of the sandboxing and the technical support efficacy.

For how long have I used the solution?

I have been using Check Point Infinity for five years.

What do I think about the stability of the solution?

I never felt any downtime or any login issues. Whenever I try to log in, it happens properly and normally.

I rate the solution’s stability a nine out of ten.

What do I think about the scalability of the solution?

5,000 end users are using the solution.

I rate the solution’s scalability a nine out of ten.

How was the initial setup?

The initial setup is very straightforward. Also, the OEM vendor will help you with the login, configure the authentication, get into the login, or get into the console, load your device, and start configuring it.

What was our ROI?

Check Point Infinity offers numerous benefits. It provides peace of mind by simplifying security management. It is responsible for on-premises security, allowing users to configure it anywhere. Additionally, it enables seamless remote connection, even if the user is away from the central point. It's the latest in security technology, offering immense value.

What's my experience with pricing, setup cost, and licensing?

Customers need to pay yearly.

What other advice do I have?

Infiniti is a portal that integrates multiple products.

It's a unified management console. I'm able to manage all the solutions and products from my single Infinity console regardless of multiple branches across the globe, anywhere in the world, and they can be controlled from a single console. The major benefit is the SaaS offering. So, customers don't have to manage everything or keep any infrastructure on-premises; it's completely provided by Check Point, with data centers integrated into Infinity. Thus, there are no data integration problems.

Check Point Infinity is well known for its CDR (Content Disarm and Reconstruction) technology rather than CRO (Customer Revenue Optimization) debt protection. This technology is primarily associated with its sandboxing capabilities. However, there is room for improvement in terms of latency when scanning and delivering attachments, links, or files. Although the delay is often negligible, competitors may offer faster results with their sandboxing solutions.

For customers prioritizing robust security, performance, and stability, Check Point can be an excellent choice. Their extensive technical expertise and global deployments contribute to the reliability of their products. With the Infinity architecture, which facilitates comprehensive threat coverage, Check Point offers scalability, reliability, and expandability across various infrastructure needs.

Overall, I rate the solution a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:
Flag as inappropriate
PeerSpot user
Kabelo Lamola - PeerSpot reviewer
Cyber Security trainee at Chimera
Real User
Top 10
Simple navigation, flexible scalability, and excellent support
Pros and Cons
  • "The most valuable feature of Check Point Infinity is the ease of use and navigation."
  • "Check Point Infinity price could improve."

What is our primary use case?

Check Point Infinity is used to protect information that is moved to the cloud. For example, when you upload your documents to the cloud wherever you are, that document can be encrypted so that no one can access it outside that domain. If they try to impersonate a user they won't be able to access it. There is verification that takes place if they are requesting to access a document with a password and a username to gain access.

What is most valuable?

The most valuable feature of Check Point Infinity is the ease of use and navigation.

What needs improvement?

Check Point Infinity price could improve.

For how long have I used the solution?

I have been using Check Point Infinity for approximately one year.

What do I think about the stability of the solution?

Check Point Infinity is stable.

What do I think about the scalability of the solution?

The scalability of Check Point Infinity is good. If you want to scale the capacity it is easy to do, it is flexible.

We have approximately 50 people using this solution in my company. We have plans to increase the usage.

How are customer service and support?

I have used the support from the technical support and they are good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used another solution prior to Check Point Infinity.

How was the initial setup?

The initial setup of Check Point Infinity is straightforward. I had a few challenges with my system but the time it should take to implement is approximately less than one hour.

What about the implementation team?

The implementation of the solution can be done in-house.

What's my experience with pricing, setup cost, and licensing?

The pricing of Check Point Infinity could be better. There is a license needed to use the solution and we pay annually.

What other advice do I have?

I recommend this solution to others.

I rate Check Point Infinity a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Infinity Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2024
Buyer's Guide
Download our free Check Point Infinity Report and get advice and tips from experienced pros sharing their opinions.