Check Point Infinity vs Trellix Network Detection and Response comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Infinity and Trellix Network Detection and Response based on real PeerSpot user reviews.

Find out in this report how the two Advanced Threat Protection (ATP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Check Point Infinity vs. Trellix Network Detection and Response Report (Updated: March 2024).
770,394 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure.""The detection and reaction rates are good.""Check Point Infinity's threat prevention capabilities benefitted our organization.""The solution is very stable. I would estimate it's 99.9% stable, if not more.""The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles.""The most valuable features of the solution stem from factors like ease of use, visibility, and cost to the enterprise.""A notable aspect that I appreciate is their ongoing effort to redesign the portal, giving it a fresh and centralized appearance.""The product, a cloud-based unified security solution, facilitates the automation of security threat detection and vulnerability management across various endpoints, including mobile and IoT devices. A notable feature is the centralized administration, allowing monitoring of existing solutions from web and mobile devices in a unified interface."

More Check Point Infinity Pros →

"The most valuable feature of the solution stems from how it allows users to do the investigation part. Another important part of the product that is valuable is associated with how it gives information to users in the form of a storyline.""The product is very easy to configure.""Support is very helpful and responsive.""Its ability to find zero-day threats, malware and anything malicious has greatly improved my customer's organization, especially for protecting the users' browser.""I also like its logging method. Its logging is very powerful and useful for forensic purposes. You can see the traffic or a specific activity or how something entered your network and where it went.""Application categorization is the most valuable feature for us. Application filtering is very interesting because other products don't give you full application filtering capabilities.""We see ROI in the sense that we don't have to react because it stops anything from hurting the network. We can stop it before we have a bigger mess to clean up.""Improved our systems and our customers' by providing better malware protection, defense against zero-day threats, and improved network security."

More Trellix Network Detection and Response Pros →

Cons
"Check Point Infinity price could improve.""We have had some performance issues. Because of this, we had to redirect traffic to be analyzed by other appliances.""The console at the beginning also has the section on where to save the logs, however, if by mistake we choose a very remote area, this detail cannot be corrected unless the change of data center where the logs are housed, which is requested through support, which can become a management difficulty.""The updates could be less frequent.""Alert fatigue is a common issue with platforms that have strong detection capabilities. Implementing more filtering and prioritization mechanisms can help address this issue, ensuring that security teams can focus on the most critical threats.""We need improvement around the Smart-1 cloud solution.""It seems that the performance varies, likely influenced by the client's size and the provisioning of resources.""The management console has given us some trouble, and the documentation is a little bit rigid in its solution paths."

More Check Point Infinity Cons →

"The problem with FireEye is that they don't allow VM or sandbox customization. The user doesn't have control of the VMs that are inside the box. It comes from the vendor as-is. Some users like to have control of it. Like what type of Windows and what type of applications and they have zero control over this.""Stability issues manifested in terms of throughput maximization.""It would be great if we could create granular reports based on the protocols, types of attacks, regions of attack, etc. Also we would like to easily be able to add exceptions to rules in cases of false positives.""It is an expensive solution.""If you want to search the hashes in the environment, you need to put in IOCs one by one, making it a very hectic job.""A better depth of view, being able to see deeper into the management process, is what I'd like to see.""Management of the appliance could be greatly improved.""It is very expensive, the price could be better."

More Trellix Network Detection and Response Cons →

Pricing and Cost Advice
  • "Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
  • "Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."
  • "The pricing of Check Point Infinity could be better. There is a license needed to use the solution and we pay annually."
  • "The product has good pricing considering the features and a global approach."
  • "I rate the product's price a six on a scale of one to ten, where one is cheap, and ten is expensive."
  • "The flexibility in pricing is advantageous, and being a special partner allows for negotiating special rates based on the project requirements."
  • "While the initial payment might be perceived as relatively higher, the absence of hidden supplementing charges contributes to a straightforward and clear pricing model. The pricing is cheap and moderate."
  • "When it comes to price, the paramount consideration is the strength of the security. If the security measures provided by the product, such as Check Point Infinity, are robust and meet our requirements, price becomes a secondary concern."
  • More Check Point Infinity Pricing and Cost Advice →

  • "Pricing and licensing are reasonable compared to competitors."
  • "The pricing is a little high."
  • "Because of what the FireEye product does, it has significantly decreased our mean time in being able to identify and detect malicious threats. The company that I work with is a very mature organization, and we have seen the meantime to analysis decrease by at least tenfold."
  • "There are some additional services that I understand the vendor provides, but our approach was to package all of the features that we were looking to use into the product."
  • "We're partners with Cisco so we get a reasonable price. It's cheaper than Palo Alto in terms of licensing."
  • "FireEye is comparable to other products, such as HX, but seems expensive. It may cause us to look at other products in the market."
  • "When I compare this solution to its competitors in the market, I find that it is a little expensive."
  • "The user fee is not as high but the maintenance fee is expensive."
  • More Trellix Network Detection and Response Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
    770,394 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The detection and reaction rates are good.
    Top Answer:There is an issue with high agent size, which impacts performance. The EDR part should provide more features.
    Top Answer:We use the solution for testing and conducting. For instance, we test this product using open-source samples containing different ransomware tools and another element.
    Top Answer:Over the thirteen years of using the product, we have not experienced a single compromise in our environment. During the COVID period, we faced numerous DDoS attacks, and the tool proved highly… more »
    Top Answer:Certain features in Trellix Network Detection and Response, such as using AL-type commands, may initially pose a challenge for those unfamiliar with such commands. However, once users become… more »
    Ranking
    Views
    406
    Comparisons
    149
    Reviews
    19
    Average Words per Review
    570
    Rating
    8.6
    Views
    1,917
    Comparisons
    1,335
    Reviews
    6
    Average Words per Review
    562
    Rating
    8.5
    Comparisons
    Also Known As
    R80, Infinity
    FireEye Network Security, FireEye
    Learn More
    Overview

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity

    Detect the undetectable and stop evasive attacks. Trellix Network Detection and Response (NDR) helps your team focus on real attacks, contain intrusions with speed and intelligence, and eliminate your cybersecurity weak points.

    Sample Customers
    Edel AG
    FFRDC, Finansbank, Japan Advanced Institute of Science and Technology, Investis, Kelsey-Seybold Clinic, Bank of Thailand, City of Miramar, Citizens National Bank, D-Wave Systems
    Top Industries
    REVIEWERS
    Security Firm25%
    Financial Services Firm15%
    Cloud Solution Provider10%
    Manufacturing Company10%
    VISITORS READING REVIEWS
    Security Firm23%
    Financial Services Firm14%
    Computer Software Company12%
    Government10%
    REVIEWERS
    Financial Services Firm22%
    Computer Software Company13%
    Government9%
    University9%
    VISITORS READING REVIEWS
    Financial Services Firm19%
    Computer Software Company9%
    Manufacturing Company8%
    Government7%
    Company Size
    REVIEWERS
    Small Business64%
    Midsize Enterprise15%
    Large Enterprise21%
    VISITORS READING REVIEWS
    Small Business49%
    Midsize Enterprise10%
    Large Enterprise41%
    REVIEWERS
    Small Business39%
    Midsize Enterprise18%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business19%
    Midsize Enterprise12%
    Large Enterprise69%
    Buyer's Guide
    Check Point Infinity vs. Trellix Network Detection and Response
    March 2024
    Find out what your peers are saying about Check Point Infinity vs. Trellix Network Detection and Response and other solutions. Updated: March 2024.
    770,394 professionals have used our research since 2012.

    Check Point Infinity is ranked 14th in Advanced Threat Protection (ATP) with 25 reviews while Trellix Network Detection and Response is ranked 9th in Advanced Threat Protection (ATP) with 37 reviews. Check Point Infinity is rated 8.8, while Trellix Network Detection and Response is rated 8.4. The top reviewer of Check Point Infinity writes "Provides robust cybersecurity with a comprehensive suite of features, expert support, and scalable cloud-based architecture, ensuring effective threat detection and continuous improvement ". On the other hand, the top reviewer of Trellix Network Detection and Response writes "Offers in-depth investigation capabilities, integrates well and smoothly transitioned from a lower-capacity appliance to a higher one". Check Point Infinity is most compared with CyberArk Privileged Access Manager, Cisco Secure Network Analytics, Skybox Security Suite, Proofpoint Email Protection and Microsoft Defender for Office 365, whereas Trellix Network Detection and Response is most compared with Fortinet FortiSandbox, Palo Alto Networks WildFire, Zscaler Internet Access, Fortinet FortiGate and Vectra AI. See our Check Point Infinity vs. Trellix Network Detection and Response report.

    See our list of best Advanced Threat Protection (ATP) vendors.

    We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.