We performed a comparison between Check Point Infinity and CyberArk Privileged Access Manager based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Palo Alto Networks, ESET and others in ATP (Advanced Threat Protection)."The solution is very stable. I would estimate it's 99.9% stable, if not more."
"The most valuable features of the solution stem from factors like ease of use, visibility, and cost to the enterprise."
"It provides fantastic visibility of security incidents through deconstructing and dissecting the threat's infection protocol."
"Powerful cyber security functionalities track workflows to block all threats that may arise and affect the workflow chain."
"New Check Point technologies can be found via this portal."
"The sandblast threat emulation is great."
"The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."
"We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure."
"The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five."
"It is a central repository. Therefore, if someone needs to access a server, then they go through CyberArk PAM. It provides a secure way to do this and CyberArk PAM records everything. For example, if you are connecting to a Linux server, then once you get into the Linux server and if it is integrated with CyberArk, it will automatically start recording everything that is being done. In most banks, seeing the recordings is very useful. If there are any gaps or something has happened which shouldn't have happened, then we can check the logs and videos. So, it gives security, in a robust manner, to the organization."
"It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components."
"Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too."
"All the features of CyberArk are useful for me, but the biggest one is that CyberArk has logs for all the features. That is important when there is a problem. You know where to look and you have the information. In cyber security, the most important aspect is information."
"Helped us meet our standards and requirements to help us comply with industry standards and banking regulations."
"It provides an accountability to the individuals who are using it, knowing that it is audited and tracked."
"It is one of the best solutions in the market. Ever since I started using this solution, there has not been any compromise when it comes to our lab."
"In the future, I would like to see new developments that allow us to centralize the cloud."
"They need to update the guides."
"The tool's technical support lags."
"We'd like to see support for fiber connections."
"It seems that the performance varies, likely influenced by the client's size and the provisioning of resources."
"The licensing model for Check Point Infinity is not clear."
"The endpoint solutions offered by Check Point are not prominent enough in the market due to Check Point's poor marketing efforts."
"The portal is provisioned in AWS. They should improve the cloud to make it faster."
"The lead product has a slow process. There are some reports and requirements from CyberArk which are not readily available as an applicable solution. We have made consistent management requests in the logs."
"There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
"Report creation could be improved. The policies could be more customized."
"Stability is a huge concern right now. We are on a version which is very unstable. We have to upgrade to stabilize it. It is fine, but the problem is we have to hire CyberArk to do the upgrade. This costs money, and it is their bug."
"The web access piece needs improvement. We have version 9.5 or 9.9.5, and now we have to upgrade to version 10."
"They can do a better job in the PSM space."
"Their post-sale support area requires a big improvement. Customers cannot automate tickets directly with CyberArk. They have to come through the distributor or bring in partners who have access to the support portal. Basically, the support for post-sales implementation is there, but the role of CyberArk is very minimal. Customers have to rely on partners, which sometimes creates issues. Some of the vendors help you during the implementation process, but the CyberArk support team does not do that. They have 24/7 support for our region, but they help only if there is an emergency or there is a problem with their system. If the password vault is down or the system is down, they provide immediate attention. For almost everything else, they take more time to respond. They give low priority to service-related or migration-related questions."
"As they grow, the technical support is having growing pains. One of the things is just being able to get somebody on the phone sometimes."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
Check Point Infinity is ranked 13th in ATP (Advanced Threat Protection) with 20 reviews while CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews. Check Point Infinity is rated 8.8, while CyberArk Privileged Access Manager is rated 8.8. The top reviewer of Check Point Infinity writes "Provides robust cybersecurity with a comprehensive suite of features, expert support, and scalable cloud-based architecture, ensuring effective threat detection and continuous improvement ". On the other hand, the top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". Check Point Infinity is most compared with Cisco Secure Network Analytics, Skybox Security Suite, Palo Alto Networks WildFire, Proofpoint Email Protection and Microsoft Defender for Office 365, whereas CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard.
We monitor all ATP (Advanced Threat Protection) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.