Compare Check Point Infinity vs. Zscaler Cloud Sandbox

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Palo Alto Networks, RSA, FireEye and others in Advanced Threat Protection. Updated: May 2021.
511,607 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.""Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."

More Check Point Infinity Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Advanced Threat Protection solutions are best for your needs.
511,607 professionals have used our research since 2012.
Questions from the Community
Top Answer: The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles.
Top Answer: The licensing model for Check Point Infinity is not clear. As infinity licenses are based on the number of users, it confuses larger organizations, where not every user needs every service. For… more »
Top Answer: We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors. These… more »
Ask a question

Earn 20 points

Ranking
Views
687
Comparisons
385
Reviews
3
Average Words per Review
683
Rating
9.0
Views
413
Comparisons
301
Reviews
0
Average Words per Review
0
Rating
N/A
Popular Comparisons
Also Known As
R80, Infinity
Learn More
Overview

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity

Today’s appliance-based sandboxing solutions are expensive and, therefore, typically installed only in the data center. When users leave the network, they become exposed to new threats because sandbox protection can’t follow them. Traditional sandboxes usually operate out of line, allowing traffic through while inspecting suspicious files in TAP mode. If a threat is detected in the sandbox, it sends alerts, but they can arrive too late. Traditional sandboxes also lack the ability to fully inspect SSL traffic due to hardware limitations—and many malware authors are exploiting those limitations to distribute their malicious payloads. In order to provide sandbox protection, organizations have bolted sandboxing solutions onto their existing security stacks. It helps, but achieving a fully integrated threat platform across multiple products is nearly impossible.

For more details: https://www.zscaler.com/produc...

Offer
Learn more about Check Point Infinity
Learn more about Zscaler Cloud Sandbox
Sample Customers
Edel AG
Zenith Live, Azure, Carlsberg Group
Top Industries
VISITORS READING REVIEWS
Computer Software Company54%
Comms Service Provider16%
Financial Services Firm5%
Manufacturing Company4%
VISITORS READING REVIEWS
Computer Software Company24%
Comms Service Provider20%
Energy/Utilities Company11%
Manufacturing Company8%
Find out what your peers are saying about Palo Alto Networks, RSA, FireEye and others in Advanced Threat Protection. Updated: May 2021.
511,607 professionals have used our research since 2012.

Check Point Infinity is ranked 10th in Advanced Threat Protection with 3 reviews while Zscaler Cloud Sandbox is ranked 17th in Advanced Threat Protection. Check Point Infinity is rated 9.0, while Zscaler Cloud Sandbox is rated 0.0. The top reviewer of Check Point Infinity writes "Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network". On the other hand, Check Point Infinity is most compared with CyberArk Privileged Access Manager, Cisco Stealthwatch, Palo Alto Networks VM-Series and Skybox Security Suite, whereas Zscaler Cloud Sandbox is most compared with Microsoft Defender for Office 365, FireEye Network Security, Fortinet FortiEDR and Palo Alto Networks WildFire.

See our list of best Advanced Threat Protection vendors.

We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.