Basil DangeSenior Manager at a financial services firm
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The solution is very stable. I would estimate it's 99.9% stable, if not more."
"We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure."
"The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."
"The technical support is really terrific."
"In Digital Guardian, they have the cloud correlation servers that give you visibility work like EBR and the correlation server works very well for security analysis."
"It can scale from 100 to 10,000. There's no problem with the scalability."
"The feature we call desktop recording is the most valuable aspect of the solution. Not only can we collect data from the user's usage, but we also capture his screenshots when he is trying to steal the data."
"Technical support is something that needs improvement."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"The licensing model for Check Point Infinity is not clear."
"I would like to see the workflow, to get all the rules and policies set up, be less complicated."
"The room for improvement with Digital Guardian is that it will be better with the Linux agent because it is the only DLP solution for Linux workstations. It still needs to upgrade the agents to the latest version for the Linux kernel."
"There are a lot of issues with the current version of the Endpoint agent. It's not stable, it's resource-consuming, and there are some performance issues. If they could improve the stability of the agent it would be great."
"Some features on Mac and Linux are not complete currently. For example, some device control features haven't been transferred over to the other systems. If they could have their Windows features also available on Mac and Linux, that would be perfect. Some of our customers have a Mac environment for their RD environment. Having the solution fully capable of handling everything in a Mac environment is crucial."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."
"Digital Guardian has both, subscription and perpetual licenses, but I think when everything (all technologies) will go to the cloud they will only offer subscriptions."
"If I compare Digital Guardian with Symantec, the license cost is lower, but McAfee can be cheaper than Digital Guardian. It depends on how many licenses you plan to buy and how big the project is. The cost is not so high as Symantec, but not as cheap as McAfee. They can easily sell the solution for price."
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
Digital Guardian Endpoint Data Loss Prevention (DLP) protects sensitive data on all your endpoints. It protects intellectual property and personal information. An endpoint agent that captures and records all system, user and data events on or off the network. It has a granular control of all data movement that can be configured to automatically block, justify or encrypt sensitive data in or attached to email, files moved to removable drives, cloud storage, or web - malware and malware-free - before sensitive data is lost. It has a built-in advanced data classification that creates and modifies classification and usage policies through content inspection, context-awareness and user classification. It provides design policies with controls that won't block actions that comply with corporate policy so employees remain productive while the data stays safe.
Check Point Infinity is ranked 10th in Advanced Threat Protection with 3 reviews while Digital Guardian is ranked 11th in Advanced Threat Protection with 4 reviews. Check Point Infinity is rated 9.0, while Digital Guardian is rated 7.0. The top reviewer of Check Point Infinity writes "Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network". On the other hand, the top reviewer of Digital Guardian writes "The classification engine enables you to set up inspection rules to determine whether data has PII". Check Point Infinity is most compared with CyberArk Privileged Access Manager, Cisco Stealthwatch, Palo Alto Networks VM-Series and Skybox Security Suite, whereas Digital Guardian is most compared with Forcepoint Data Loss Prevention, Symantec Data Loss Prevention, CrowdStrike Falcon, Microsoft Defender for Endpoint and Carbon Black CB Defense. See our Check Point Infinity vs. Digital Guardian report.
See our list of best Advanced Threat Protection vendors.
We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.