We performed a comparison between Check Point Infinity and CyberArk Privileged Access Manager based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Palo Alto Networks, ESET and others in Advanced Threat Protection (ATP)."The most valuable feature of Check Point Infinity is the ease of use and navigation."
"New Check Point technologies can be found via this portal."
"The product's excellent scalability features have allowed our organization to seamlessly adapt to the growing demand. The consensus mechanism and smart contract capabilities have optimized our workflow, resulting in an overall reduction in the complexity of our organization."
"A notable aspect that I appreciate is their ongoing effort to redesign the portal, giving it a fresh and centralized appearance."
"The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."
"The solution is very stable. I would estimate it's 99.9% stable, if not more."
"Infinity has come to give us total protection."
"We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure."
"It provides an accountability to the individuals who are using it, knowing that it is audited and tracked."
"It has helped from an auditing perspective identify who has access to privileged accounts."
"We are able to centrally manage credentials, touch applications, and rotate passwords."
"Our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage."
"It is useful for protecting passwords. If you need to do access security management, you can first use the CyberArk console, and after that, you can connect the firewall interface or firewall command line. Similarly, if you need to do an RDP session, you need to first log in to CyberArk before connecting to the Windows RDP session. This way, the admin doesn't know the password, and that password is changed immediately. To change the password, you first discover the old password in the network, and after that, you can change the password."
"Ensures accounts are managed according to corporate policies."
"CyberArk Privileged Access Manager is stable."
"It is one of the best solutions in the market. Ever since I started using this solution, there has not been any compromise when it comes to our lab."
"The portal is provisioned in AWS. They should improve the cloud to make it faster."
"There is an issue with high agent size, which impacts performance."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"The management console has given us some trouble, and the documentation is a little bit rigid in its solution paths."
"In the future, I would like to see new developments that allow us to centralize the cloud."
"The console at the beginning also has the section on where to save the logs, however, if by mistake we choose a very remote area, this detail cannot be corrected unless the change of data center where the logs are housed, which is requested through support, which can become a management difficulty."
"The licensing model for Check Point Infinity is not clear."
"It seems that the performance varies, likely influenced by the client's size and the provisioning of resources."
"The initial setup was somewhat complex."
"The PTA could be improved. Currently, companies often have multiple domains and sometimes it's difficult to implement CyberArk in this kind of infrastructure. For example, you can add CPM (Central Policy Manager) and PSM (Privileged Session Manager and PVWA (Password Vault Web Access) for access, but if you want to add PTA (Privileged Threat Analysis) to scan Vault logs, it is difficult because this component may be adding multiple domain environments."
"We don't often contact technical support, but when we do it, the response could be faster and better."
"It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile."
"Sometimes the infrastructure team is hesitant to provide more resources."
"It is very complex and difficult to set up the solution."
"The Vault's disaster recovery features need improvement."
"The major pain point that we have is the capacity of CyberArk due to the sheer volume of NPAs that we are managing. We are a large organization and we have hundreds of thousands of non-personal accounts to manage. We have already found out that there are certain capacity limitations within CyberArk that might introduce performance issues. From my perspective, something that would be valuable would be if the vault could hold more passwords and be more scalable."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
Check Point Infinity is ranked 14th in Advanced Threat Protection (ATP) with 21 reviews while CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews. Check Point Infinity is rated 8.6, while CyberArk Privileged Access Manager is rated 8.8. The top reviewer of Check Point Infinity writes "Provides robust cybersecurity with a comprehensive suite of features, expert support, and scalable cloud-based architecture, ensuring effective threat detection and continuous improvement ". On the other hand, the top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". Check Point Infinity is most compared with Cisco Secure Network Analytics, Skybox Security Suite, Proofpoint Email Protection and Microsoft Defender for Office 365, whereas CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.