Compare Check Point Infinity vs. Digital Guardian

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Check Point Infinity vs. Digital Guardian and other solutions. Updated: May 2021.
511,521 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The solution is very stable. I would estimate it's 99.9% stable, if not more.""We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure.""The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."

More Check Point Infinity Pros »

"The technical support is really terrific.""In Digital Guardian, they have the cloud correlation servers that give you visibility work like EBR and the correlation server works very well for security analysis.""It can scale from 100 to 10,000. There's no problem with the scalability.""The feature we call desktop recording is the most valuable aspect of the solution. Not only can we collect data from the user's usage, but we also capture his screenshots when he is trying to steal the data."

More Digital Guardian Pros »

Cons
"Technical support is something that needs improvement.""I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain.""The licensing model for Check Point Infinity is not clear."

More Check Point Infinity Cons »

"I would like to see the workflow, to get all the rules and policies set up, be less complicated.""The room for improvement with Digital Guardian is that it will be better with the Linux agent because it is the only DLP solution for Linux workstations. It still needs to upgrade the agents to the latest version for the Linux kernel.""There are a lot of issues with the current version of the Endpoint agent. It's not stable, it's resource-consuming, and there are some performance issues. If they could improve the stability of the agent it would be great.""Some features on Mac and Linux are not complete currently. For example, some device control features haven't been transferred over to the other systems. If they could have their Windows features also available on Mac and Linux, that would be perfect. Some of our customers have a Mac environment for their RD environment. Having the solution fully capable of handling everything in a Mac environment is crucial."

More Digital Guardian Cons »

Pricing and Cost Advice
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.""Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."

More Check Point Infinity Pricing and Cost Advice »

"Digital Guardian has both, subscription and perpetual licenses, but I think when everything (all technologies) will go to the cloud they will only offer subscriptions.""If I compare Digital Guardian with Symantec, the license cost is lower, but McAfee can be cheaper than Digital Guardian. It depends on how many licenses you plan to buy and how big the project is. The cost is not so high as Symantec, but not as cheap as McAfee. They can easily sell the solution for price."

More Digital Guardian Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Advanced Threat Protection solutions are best for your needs.
511,521 professionals have used our research since 2012.
Questions from the Community
Top Answer: The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles.
Top Answer: The licensing model for Check Point Infinity is not clear. As infinity licenses are based on the number of users, it confuses larger organizations, where not every user needs every service. For… more »
Top Answer: We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors. These… more »
Top Answer: The feature we call desktop recording is the most valuable aspect of the solution. Not only can we collect data from the user's usage, but we also capture his screenshots when he is trying to steal… more »
Top Answer: For the price in the market, it is a little bit higher than Symantec and Forcepoint. However, I believe, especially in the manufacturing industry, it is the only solution that makes sense for them. If… more »
Top Answer: We're a distributor of the solution. I personally handle pre-sales. Some web upload actions need to be improved due to the fact that DG is a very strong technology on the endpoint. For the network DLP… more »
Ranking
Views
687
Comparisons
385
Reviews
3
Average Words per Review
683
Rating
9.0
Views
5,590
Comparisons
3,820
Reviews
2
Average Words per Review
869
Rating
7.0
Popular Comparisons
Also Known As
R80, Infinity
Learn More
Overview

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity

Digital Guardian Endpoint Data Loss Prevention (DLP) protects sensitive data on all your endpoints. It protects intellectual property and personal information. An endpoint agent that captures and records all system, user and data events on or off the network. It has a granular control of all data movement that can be configured to automatically block, justify or encrypt sensitive data in or attached to email, files moved to removable drives, cloud storage, or web - malware and malware-free - before sensitive data is lost. It has a built-in advanced data classification that creates and modifies classification and usage policies through content inspection, context-awareness and user classification. It provides design policies with controls that won't block actions that comply with corporate policy so employees remain productive while the data stays safe.

Offer
Learn more about Check Point Infinity
Learn more about Digital Guardian
Sample Customers
Edel AG
The Fifth Avenue Theatre, Jabil Circuit
Top Industries
VISITORS READING REVIEWS
Computer Software Company55%
Comms Service Provider16%
Financial Services Firm5%
Manufacturing Company4%
VISITORS READING REVIEWS
Computer Software Company25%
Comms Service Provider24%
Financial Services Firm8%
Manufacturing Company5%
Find out what your peers are saying about Check Point Infinity vs. Digital Guardian and other solutions. Updated: May 2021.
511,521 professionals have used our research since 2012.

Check Point Infinity is ranked 10th in Advanced Threat Protection with 3 reviews while Digital Guardian is ranked 11th in Advanced Threat Protection with 4 reviews. Check Point Infinity is rated 9.0, while Digital Guardian is rated 7.0. The top reviewer of Check Point Infinity writes "Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network". On the other hand, the top reviewer of Digital Guardian writes "The classification engine enables you to set up inspection rules to determine whether data has PII". Check Point Infinity is most compared with CyberArk Privileged Access Manager, Cisco Stealthwatch, Palo Alto Networks VM-Series and Skybox Security Suite, whereas Digital Guardian is most compared with Forcepoint Data Loss Prevention, Symantec Data Loss Prevention, CrowdStrike Falcon, Microsoft Defender for Endpoint and Carbon Black CB Defense. See our Check Point Infinity vs. Digital Guardian report.

See our list of best Advanced Threat Protection vendors.

We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.