Compare Check Point Infinity vs. CyberArk PAS

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Anonymous User
Find out what your peers are saying about Palo Alto Networks, Check Point, FireEye and others in Advanced Threat Protection. Updated: November 2020.
448,775 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The solution is very stable. I would estimate it's 99.9% stable, if not more.""We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure."

More Check Point Infinity Pros »

"This solution is quite stable.""We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant.""We are able to know who is accessing what and when; having accountability.""There are no issues with scalability. Our clients are very happy to use the product.""For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks.""The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task.""When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution.""Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control."

More CyberArk PAS Pros »

Cons
"Technical support is something that needs improvement.""I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."

More Check Point Infinity Cons »

"I think having a distributed architecture would certainly help this solution.""Make it easier to deploy.""The initial setup of CyberArk is a challenge if you do not have prior experience with it.""Integration with the ticketing system should allow any number of fields to be used for validation before allowing a user to be evaluated and able to access a server.""Currently, in Secure Connect, an end user is required to enter account information manually, and cannot save any of this information for future use.""The one place where we found that this product really needs to improve is the cloud. Simple integrations don't exist, even today. We don't have anything specific on CyberArk for managing, SaaS products, SaaS vendors, SaaS credentials. I understand it's a vendor-based thing and that they have to coordinate with the other vendors to be able to do that, and there are integrations coming. But these are the major places where CyberArk definitely needs to invest some more time.""It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers.""CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms."

More CyberArk PAS Cons »

Pricing and Cost Advice
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."

More Check Point Infinity Pricing and Cost Advice »

"In comparison to other products on the market, CyberArk is a more costly product."

More CyberArk PAS Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Advanced Threat Protection solutions are best for your needs.
448,775 professionals have used our research since 2012.
Questions from the Community
Top Answer: The solution is very stable. I would estimate it's 99.9% stable, if not more.
Top Answer: We recently upgraded to the latest release of the new version, IP40. Since it is new, whatever features that were not there in the IP30 version, have been added to IP40. Right now, we are gradually… more »
Top Answer: We primarily implement the solution for our clients.
Top Answer: Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control.
Top Answer: Privileged Access Management is a business transformation program. It forces business to look at their overall operating model for system administrative and application based access, and develop a… more »
Top Answer: We're pretty excited about Alero, the third-party access management. As a small company we lean on vendors quite a bit and we do that in multiple areas. That's going to be a big one for us. It's just… more »
Ranking
Views
608
Comparisons
419
Reviews
2
Average Words per Review
587
Avg. Rating
9.5
Views
38,409
Comparisons
18,275
Reviews
22
Average Words per Review
533
Avg. Rating
9.1
Popular Comparisons
Also Known As
R80, InfinityCyberArk Privileged Access Security, CyberArk Privileged Account Security, SSH Key Manager, Privileged Session Manager, Privileged Threat Analytics, Application Identity Manager, On-Demand Privileges Manager, Endpoint Privilege Manager
Learn
Check Point
CyberArk
Overview

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity

CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry's most comprehensive Privileged Account Security Solution.

Offer
Learn more about Check Point Infinity
Learn more about CyberArk PAS
Sample Customers
Edel AGRockwell Automation
Top Industries
No Data Available
REVIEWERS
Financial Services Firm25%
Insurance Company15%
Energy/Utilities Company10%
Comms Service Provider8%
VISITORS READING REVIEWS
Computer Software Company33%
Comms Service Provider19%
Financial Services Firm7%
Government5%
Company Size
No Data Available
REVIEWERS
Small Business18%
Midsize Enterprise10%
Large Enterprise72%
VISITORS READING REVIEWS
Small Business16%
Midsize Enterprise9%
Large Enterprise76%
Find out what your peers are saying about Palo Alto Networks, Check Point, FireEye and others in Advanced Threat Protection. Updated: November 2020.
448,775 professionals have used our research since 2012.

Check Point Infinity is ranked 9th in Advanced Threat Protection with 2 reviews while CyberArk PAS is ranked 1st in Privileged Access Management with 22 reviews. Check Point Infinity is rated 9.6, while CyberArk PAS is rated 9.0. The top reviewer of Check Point Infinity writes "Offers a unified security approach that provides full control over users and what they can do". On the other hand, the top reviewer of CyberArk PAS writes "Provides simplicity and ease of implementation for the right level of security controls". Check Point Infinity is most compared with Cisco Stealthwatch, Palo Alto Networks VM-Series and Skybox Security Suite, whereas CyberArk PAS is most compared with BeyondTrust Endpoint Privilege Management, Thycotic Secret Server, Microsoft Azure Active Directory Premium, Cisco ISE (Identity Services Engine) and SailPoint IdentityIQ.

See our list of .

We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.