Basil DangeSenior Manager at a financial services firm
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."
Earn 20 points
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
ThreatARMOR enhances security performance across your network, removing known bad IP addresses and traffic from not trusted countries.
By eliminating unwanted traffic, ThreatARMOR boosts the performance of your network security infrastructure.
Check Point Infinity is ranked 10th in Advanced Threat Protection with 3 reviews while Ixia ThreatARMOR is ranked 16th in Advanced Threat Protection. Check Point Infinity is rated 9.0, while Ixia ThreatARMOR is rated 0.0. The top reviewer of Check Point Infinity writes "Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network". On the other hand, Check Point Infinity is most compared with CyberArk Privileged Access Manager, Cisco Stealthwatch, Palo Alto Networks VM-Series and Skybox Security Suite, whereas Ixia ThreatARMOR is most compared with ThreatConnect, FireEye Network Security and Cisco Stealthwatch.
See our list of best Advanced Threat Protection vendors.
We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.