Compare Check Point Infinity vs. RSA NetWitness Logs and Packets (RSA SIEM)

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Check Point Infinity vs. RSA NetWitness Logs and Packets (RSA SIEM) and other solutions. Updated: May 2021.
512,221 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The solution is very stable. I would estimate it's 99.9% stable, if not more.""We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure.""The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."

More Check Point Infinity Pros »

"It's fully scalable. There is no limit. Of course, the license limits per day the number of terabytes. In my opinion, it's very flexible.""The most valuable features are the packet decoder, log decoder, and concentrator.""The most valuable feature is that we can create our own connectors for any application, and NetWitness provides the training and tools to do it.""The most valuable features are the integration and ease of use.""Performance and reporting are very good.""The most valuable features are the threat prediction and network forensics.""The most valuable feature is the security that it provides.""What we are mainly using are the RSA concentrator, RSA Decoder, Archiver, Broker, and Log Decoder."

More RSA NetWitness Logs and Packets (RSA SIEM) Pros »

Cons
"Technical support is something that needs improvement.""I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain.""The licensing model for Check Point Infinity is not clear."

More Check Point Infinity Cons »

"They should implement algorithms to digest that data and produce additional, more advanced reporting, alerting and support of internal security teams.""Log aggregation is an issue with this solution because there are a huge number of alerts in a single instance.""The initial setup is very complex and should be simplified.""The documentation is not as structured as I would like, personally, and I think that it can be improved and made much more user-friendly.""The user interface is a little bit difficult for new users and it needs to be improved.""Lots of competing products have vulnerability protection built into their products, and this solution would be improved by including that support.""It is not so easy to customize this product.""Security needs improvement."

More RSA NetWitness Logs and Packets (RSA SIEM) Cons »

Pricing and Cost Advice
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.""Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."

More Check Point Infinity Pricing and Cost Advice »

"We have a perpetual license, so the total cost of ownership is not very expensive. It's a good investment.""Many clients are not able to purchase the packet capability because there is a huge amount of data, and the cost depends on the number of EPS (Events per second), as well as the number of gigabytes of data per day.""Our license is for one year."

More RSA NetWitness Logs and Packets (RSA SIEM) Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Advanced Threat Protection solutions are best for your needs.
512,221 professionals have used our research since 2012.
Questions from the Community
Top Answer: The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles.
Top Answer: The licensing model for Check Point Infinity is not clear. As infinity licenses are based on the number of users, it confuses larger organizations, where not every user needs every service. For… more »
Top Answer: We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors. These… more »
Top Answer: It would help if they could provide the malware analytics in the core package as that would make the cost more reasonable. Licensing is paid annually and I believe the cost is somewhere between 12,000… more »
Top Answer: I believe they could improve their support, there are often delays. The price of the solution could be reduced, it's very costly.
Ranking
Views
687
Comparisons
385
Reviews
3
Average Words per Review
683
Rating
9.0
Views
6,414
Comparisons
4,227
Reviews
10
Average Words per Review
502
Rating
7.7
Popular Comparisons
Also Known As
R80, Infinity
RSA Security Analytics
Learn More
Overview

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity

If you’re relying on log data to detect and prevent cyber threats, you’re in trouble. Attackers increasingly evade detection of log-centric security and network monitoring tools. But logs combined with full packet, endpoint NetFlow data are proven to provide the essential details for early threat detection. Here’s a closer look at our solution.

Offer
Learn more about Check Point Infinity
Learn more about RSA NetWitness Logs and Packets (RSA SIEM)
Sample Customers
Edel AG
Los Angeles World Airports, Reply
Top Industries
VISITORS READING REVIEWS
Computer Software Company54%
Comms Service Provider16%
Financial Services Firm5%
Manufacturing Company4%
REVIEWERS
Comms Service Provider30%
Financial Services Firm30%
Computer Software Company20%
Healthcare Company10%
VISITORS READING REVIEWS
Computer Software Company32%
Comms Service Provider23%
Government7%
Financial Services Firm6%
Company Size
No Data Available
REVIEWERS
Small Business26%
Midsize Enterprise16%
Large Enterprise58%
Find out what your peers are saying about Check Point Infinity vs. RSA NetWitness Logs and Packets (RSA SIEM) and other solutions. Updated: May 2021.
512,221 professionals have used our research since 2012.

Check Point Infinity is ranked 10th in Advanced Threat Protection with 3 reviews while RSA NetWitness Logs and Packets (RSA SIEM) is ranked 3rd in Advanced Threat Protection with 11 reviews. Check Point Infinity is rated 9.0, while RSA NetWitness Logs and Packets (RSA SIEM) is rated 7.8. The top reviewer of Check Point Infinity writes "Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network". On the other hand, the top reviewer of RSA NetWitness Logs and Packets (RSA SIEM) writes "Good support, powerful decoders and concentrator, but the dashboard is not reflecting events in real-time ". Check Point Infinity is most compared with CyberArk Privileged Access Manager, Cisco Stealthwatch, Palo Alto Networks VM-Series and Skybox Security Suite, whereas RSA NetWitness Logs and Packets (RSA SIEM) is most compared with Splunk, IBM QRadar, LogRhythm NextGen SIEM, RSA enVision and ArcSight Enterprise Security Manager (ESM). See our Check Point Infinity vs. RSA NetWitness Logs and Packets (RSA SIEM) report.

See our list of best Advanced Threat Protection vendors.

We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.