Compare Check Point Infinity vs. Microsoft Defender for Identity

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Palo Alto Networks, RSA, FireEye and others in Advanced Threat Protection. Updated: May 2021.
509,641 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The solution is very stable. I would estimate it's 99.9% stable, if not more.""We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure.""The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."

More Check Point Infinity Pros »

"This solution has advanced a lot over the last few years."

More Microsoft Defender for Identity Pros »

Cons
"Technical support is something that needs improvement.""I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain.""The licensing model for Check Point Infinity is not clear."

More Check Point Infinity Cons »

"When the data leaves the cloud, there are security issues."

More Microsoft Defender for Identity Cons »

Pricing and Cost Advice
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.""Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."

More Check Point Infinity Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Advanced Threat Protection solutions are best for your needs.
509,641 professionals have used our research since 2012.
Questions from the Community
Top Answer: The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles.
Top Answer: The licensing model for Check Point Infinity is not clear. As infinity licenses are based on the number of users, it confuses larger organizations, where not every user needs every service. For… more »
Top Answer: We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors. These… more »
Top Answer: This solution has advanced a lot over the last few years.
Top Answer: When the data leaves the cloud, there are security issues. The cloud security services and the integration with on-prem applications like SIEM, needs to be improved.
Top Answer: We are looking at this solution as a trusted tenant for our network. This way, all of the data that goes through is trusted and the communication between our on-prem system and the Azure Cloud remains… more »
Ranking
Views
687
Comparisons
385
Reviews
3
Average Words per Review
683
Rating
9.0
Views
439
Comparisons
143
Reviews
1
Average Words per Review
381
Rating
9.0
Popular Comparisons
Also Known As
R80, Infinity
Azure Advanced Threat Protection, Azure ATP, MS Defender for Identity, MS Defender for Identity, MS Defender for Identity
Learn More
Overview

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity

Microsoft Defender for Identity is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. With Microsoft Defender for Identity, you can:

- Monitor users, entity behavior, and activities with learning-based analytics

- Protect user identities and credentials stored in Active Directory

- Identify and investigate suspicious user activities and advanced attacks throughout the kill chain

- Provide clear incident information on a simple timeline for fast triage

    To learn more about our solution, ask questions, and share feedback, join our Microsoft Defender for Identity Community.

    Offer
    Learn more about Check Point Infinity
    Learn more about Microsoft Defender for Identity
    Sample Customers
    Edel AG
    Microsoft Defender for Identity is trusted by companies such as St. Luke’s University Health Network, Ansell, and more.
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company55%
    Comms Service Provider17%
    Financial Services Firm5%
    Manufacturing Company4%
    VISITORS READING REVIEWS
    Computer Software Company48%
    Comms Service Provider18%
    Financial Services Firm8%
    Government5%
    Find out what your peers are saying about Palo Alto Networks, RSA, FireEye and others in Advanced Threat Protection. Updated: May 2021.
    509,641 professionals have used our research since 2012.

    Check Point Infinity is ranked 10th in Advanced Threat Protection with 3 reviews while Microsoft Defender for Identity is ranked 13th in Advanced Threat Protection with 1 review. Check Point Infinity is rated 9.0, while Microsoft Defender for Identity is rated 9.0. The top reviewer of Check Point Infinity writes "Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network". On the other hand, the top reviewer of Microsoft Defender for Identity writes "Identifies, detects, and investigates advanced threats". Check Point Infinity is most compared with CyberArk Privileged Access Manager, Cisco Stealthwatch, Palo Alto Networks VM-Series and Skybox Security Suite, whereas Microsoft Defender for Identity is most compared with Microsoft Defender for Office 365 and Palo Alto Networks WildFire.

    See our list of best Advanced Threat Protection vendors.

    We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.