Check Point Infinity's most valuable features include centralized management, comprehensive security, and ease of use. It facilitates managing firewalls, cloud environments, and devices from one platform. Its unified security approach covers Zero Trust principles, ensuring robust protection across networks, workloads, users, and data. Infinity's automation, visibility, and AI components enhance threat detection and response. Its seamless integration with existing tools improves efficiency, reduces costs, and offers flexibility for various enterprise needs.
- "The Threat Prevention technology in Check Point Infinity has enhanced my security posture; that's very great, excellent, and helpful."
- "One of the valuable aspects of Check Point Infinity is that I can use one unified portal for the administration of all these tools."
- "I recommend Check Point Infinity to other customers due to its notable benefits and positive experiences with a major financial institution."
Check Point Infinity's pricing structure is complex and expensive. Its technical support is slow. Licensing models confuse larger organizations. Documentation is outdated, lacking clear guides for new technologies. Performance issues occur with latency and usability. Integration and user-friendly privacy features require enhancement. Reports can take time to master, and frequent updates are disruptive. Marketing efforts for endpoint solutions are insufficient. Improvements in blockchain protection, fiber connectivity compatibility, and analytics integration are needed.
- "In terms of pricing, I find Check Point Infinity to be an expensive product. In fact, we are evaluating even the spam filter for emails from Check Point, but it was prohibitively costly, so we dropped it and are using Microsoft Defender."
- "If Check Point continues reforms of AI and takes more information from different origins, not only from its database but also from other brands, it can complete this information and make it stronger."
- "I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity."