We performed a comparison between Check Point Infinity and CyberArk Privileged Access Manager based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Palo Alto Networks, ESET and others in Advanced Threat Protection (ATP)."We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure."
"It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security."
"The product's excellent scalability features have allowed our organization to seamlessly adapt to the growing demand. The consensus mechanism and smart contract capabilities have optimized our workflow, resulting in an overall reduction in the complexity of our organization."
"It is a scalable product."
"New Check Point technologies can be found via this portal."
"The detection and reaction rates are good."
"Powerful cyber security functionalities track workflows to block all threats that may arise and affect the workflow chain."
"The solution is very stable. I would estimate it's 99.9% stable, if not more."
"The most valuable feature is Special Monitoring."
"The most important feature is managing the credentials and implementing those policies which rotate the credentials. Session Manager is also key in not letting the users have access to those credentials. Instead, CyberArk actually manages everything by itself."
"It is a scalable product."
"When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution."
"The regulation of accounts is by far the most needed and valuable part of the application."
"We also use CyberArk’s Secrets Manager. Because AWS is the biggest area for us, we have accounts in AWS that are being rotated by CyberArk. We also have a manual process for the most sensitive of our AWS accounts, like root accounts. We've used Secrets Manager on those and that has resulted in a significant risk reduction, as well."
"We have accomplished our security goals. We have two-factor authenticated and vaulted our important accounts, so people can't just steal stuff from us."
"CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts."
"The console at the beginning also has the section on where to save the logs, however, if by mistake we choose a very remote area, this detail cannot be corrected unless the change of data center where the logs are housed, which is requested through support, which can become a management difficulty."
"The updates could be less frequent."
"We need improvement around the Smart-1 cloud solution."
"The portal is provisioned in AWS. They should improve the cloud to make it faster."
"The licensing model for Check Point Infinity is not clear."
"Check Point Infinity price could improve."
"Alert fatigue is a common issue with platforms that have strong detection capabilities. Implementing more filtering and prioritization mechanisms can help address this issue, ensuring that security teams can focus on the most critical threats."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"It should be easy to use for non-technical people. Its interface can be a bit difficult. Some parts of its interface are not very intuitive. Some of the controls are hidden, and instead of having a screen with all the controls for that account on it, you have to use menus and other similar things."
"Our DevOps team is looking in the direction of cloud, because we are not in it today. We are hoping to build it with Conjur from the ground up."
"More additional features as far as the REST is concerned, because we have something which was the predecessor to REST. A lot of the features which were in the predecessor have not necessarily been ported over to REST yet."
"There were a lot of manual steps in the initial setup which could have been automated. I read the 10.4 release that was sent out about a month or two ago, and I saw the steps required for upgrade have been reduced by about 90%. That was a big thing for me, but I still haven't seen that yet because we have not upgrade past 9.9.5."
"I'm not a fan of technical support with CyberArk. It's like jumping through red tape and hoops. Quite frankly, it's almost like when you call CyberArk you get the Help Desk or the level-one. I'm a level-one. I got the CCD, I know how to do the initial troubleshooting. When I call CyberArk it's because I can't figure the problem out. So I need a level-two, three, four. I don't need you to tell me, "Hey, open a ticket and then give me logs.""
"It's a big program. To scale excessively, locally, on an on-prem application, takes a lot of servers."
"One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible."
"I would love them to improve their UI customizing features."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
Check Point Infinity is ranked 14th in Advanced Threat Protection (ATP) with 23 reviews while CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews. Check Point Infinity is rated 8.6, while CyberArk Privileged Access Manager is rated 8.8. The top reviewer of Check Point Infinity writes "Provides robust cybersecurity with a comprehensive suite of features, expert support, and scalable cloud-based architecture, ensuring effective threat detection and continuous improvement ". On the other hand, the top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". Check Point Infinity is most compared with Cisco Secure Network Analytics, Skybox Security Suite, Proofpoint Email Protection and Microsoft Defender for Office 365, whereas CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.