Basil DangeSenior Manager at a financial services firm
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The solution is very stable. I would estimate it's 99.9% stable, if not more."
"We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure."
"The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."
"The most valuable features are the administration console and its detection and response module."
"Its greatest strength is the DXL client which can rapidly disseminate attack information to all clients via the McAfee Agent instead of going through the ePO server."
"Technical support is something that needs improvement."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"The licensing model for Check Point Infinity is not clear."
"I would like to see future versions of the solution incorporate artificial intelligence technology."
"Make the ATD system a part of the whole product and take the whole thing onto the cloud. While it is there already, it is not to the same level as the on-premise version."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."
Earn 20 points
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
McAfee Advanced Threat Defense enables organizations to detect advanced, evasive malware and convert threat information into immediate action and protection. Unlike traditional sandboxes, it includes additional inspection capabilities that broaden detection and expose evasive threats. Tight integration between security solutions - from network and endpoint to investigation - enables instant sharing of threat information across the environment, enhancing protection and investigation. Flexible deployment options support every network.
Check Point Infinity is ranked 10th in Advanced Threat Protection with 3 reviews while McAfee Advanced Threat Defense is ranked 14th in Advanced Threat Protection with 2 reviews. Check Point Infinity is rated 9.0, while McAfee Advanced Threat Defense is rated 8.0. The top reviewer of Check Point Infinity writes "Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network". On the other hand, the top reviewer of McAfee Advanced Threat Defense writes "Can rapidly disseminate attack information to all clients". Check Point Infinity is most compared with CyberArk Privileged Access Manager, Cisco Stealthwatch, Palo Alto Networks VM-Series and Skybox Security Suite, whereas McAfee Advanced Threat Defense is most compared with Fortinet FortiSandbox, FireEye Network Security, Palo Alto Networks WildFire, SonicWall Capture Advanced Threat Protection and Proofpoint Targeted Attack Protection. See our Check Point Infinity vs. McAfee Advanced Threat Defense report.
See our list of best Advanced Threat Protection vendors.
We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.