2020-03-16T06:56:14Z

What is your primary use case for Check Point Infinity?


How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

Guest
33 Answers

author avatar
Top 5LeaderboardReal User

We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors. These sophisticated attacks are on mobile devices, endpoints, cloud, and various enterprise networks. They easily bypass the conventional, static detection-based systems used by organizations today. The legacy perimeter-focused security approaches have become ineffective. The outdated assumption that everything inside the security perimeter can be trusted leaves organizations exposed for vulnerability and attack. To protect the organization, we need to move up to the latest generation of cybersecurity tools. These combine real-time threat prevention, shared intelligence, and the most advanced zero-trust security across network, cloud, endpoint, and mobile devices.

2021-03-30T06:29:00Z
author avatar
Top 5LeaderboardReal User

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

2020-08-23T19:52:00Z
author avatar
Real User

We primarily implement the solution for our clients.

2020-03-16T06:56:14Z
Find out what your peers are saying about Check Point, Palo Alto Networks, RSA and others in Advanced Threat Protection. Updated: May 2021.
509,641 professionals have used our research since 2012.