Basil DangeSenior Manager at a financial services firm
Anonymous UserPrincipal Consultant at a tech services company
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The solution is very stable. I would estimate it's 99.9% stable, if not more."
"We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure."
"The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."
"The good part is that you don't have to configure it, which is very convenient."
"Some of the valuable features on the email side are anti-phishing, anti-malware, and Safe Links."
"Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features."
"Technical support is something that needs improvement."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"The licensing model for Check Point Infinity is not clear."
"We need a separate license and we don't know how to get the license that is required."
"There needs to be an improvement in integrating the product to work across multiple operating systems, and to have better support for non-Microsoft file types."
"In some situations, it has not been able to pick impersonated emails having no attachments. Technical support definitely has a scope for improvement."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."
"It's a user-base subscription."
"From the pricing point of view, like any other product in the market, there is scope for negotiation."
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
Microsoft Defender for Office 365 protects all of Office 365 against advanced threats like business email compromise and credential phishing, and automatically investigates and remediates attacks. With Defender for O365 you get Integrated threat protection for all of Office 365 that gives you:
- Native protection for Office 365 with built-in protection that simplifies administration, lowers total cost of ownership, and boosts productivity.
- Unparalleled scale and effectiveness with powerful automated workflows to improve SecOps efficiency.
- A complete solution for collaboration that protects you from attacks across the kill chain.
To learn more about our solution, ask questions, and share feedback, join our Microsoft Security and Compliance Community.
Check Point Infinity is ranked 10th in Advanced Threat Protection with 3 reviews while Microsoft Defender for Office 365 is ranked 9th in Advanced Threat Protection with 3 reviews. Check Point Infinity is rated 9.0, while Microsoft Defender for Office 365 is rated 8.4. The top reviewer of Check Point Infinity writes "Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network". On the other hand, the top reviewer of Microsoft Defender for Office 365 writes "Essential security capabilities, plenty of email protection, and enhanced data loss prevention". Check Point Infinity is most compared with CyberArk Privileged Access Manager, Cisco Stealthwatch, Palo Alto Networks VM-Series and Skybox Security Suite, whereas Microsoft Defender for Office 365 is most compared with Mimecast Email Security with Targeted Threat Protection, Proofpoint Email Protection, Microsoft Exchange Online Protection, Barracuda Email Security Gateway and Fortinet FortiMail. See our Check Point Infinity vs. Microsoft Defender for Office 365 report.
See our list of best Advanced Threat Protection vendors.
We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.