IT Central Station is now PeerSpot: Here's why

Check Point Infinity OverviewUNIXBusinessApplication

Check Point Infinity is #11 ranked solution in top Advanced Threat Protection (ATP) tools. PeerSpot users give Check Point Infinity an average rating of 10 out of 10. Check Point Infinity is most commonly compared to CyberArk Privileged Access Manager: Check Point Infinity vs CyberArk Privileged Access Manager. Check Point Infinity is popular among the large enterprise segment, accounting for 45% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a computer software company, accounting for 44% of all views.
Buyer's Guide

Download the Advanced Threat Protection (ATP) Buyer's Guide including reviews and more. Updated: July 2022

What is Check Point Infinity?

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity

Check Point Infinity was previously known as R80, Infinity.

Check Point Infinity Customers

Edel AG

Check Point Infinity Video

Check Point Infinity Pricing Advice

What users are saying about Check Point Infinity pricing:
  • "Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."
  • "Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
  • Check Point Infinity Reviews

    Filter by:
    Filter Reviews
    Industry
    Loading...
    Filter Unavailable
    Company Size
    Loading...
    Filter Unavailable
    Job Level
    Loading...
    Filter Unavailable
    Rating
    Loading...
    Filter Unavailable
    Considered
    Loading...
    Filter Unavailable
    Order by:
    Loading...
    • Date
    • Highest Rating
    • Lowest Rating
    • Review Length
    Search:
    Showingreviews based on the current filters. Reset all filters
    Basil Dange - PeerSpot reviewer
    Senior Manager at a financial services firm with 10,001+ employees
    Real User
    Top 5Leaderboard
    Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network
    Pros and Cons
    • "The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."
    • "The licensing model for Check Point Infinity is not clear."

    What is our primary use case?

    We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors. These sophisticated attacks are on mobile devices, endpoints, cloud, and various enterprise networks. They easily bypass the conventional, static detection-based systems used by organizations today. The legacy perimeter-focused security approaches have become ineffective. The outdated assumption that everything inside the security perimeter can be trusted leaves organizations exposed for vulnerability and attack. To protect the organization, we need to move up to the latest generation of cybersecurity tools. These combine real-time threat prevention, shared intelligence, and the most advanced zero-trust security across network, cloud, endpoint, and mobile devices.

    How has it helped my organization?

    Rebuilding security infrastructure around the Zero Trust approach, using disparate technologies might lead to complexities and inherent security gaps. To avoid errors and provide robust security, Check Point offers more practical and holistic approaches to implement Zero Trust. It is based on a single consolidated cybersecurity architecture, Check Point Infinity. Check Point provides different solutions to protect organizations at each level. They have products that can work in a silo or can be integrated with other security solutions to enhance security by mitigating risk and providing a dashboard for monitoring.   Generated logs can be sent to a SIEM solution, where a use case or action can be defined against raised alerts. Automated policies/processes can be created accordingly. For example, if we need to block communication from a suspicious IP for which an alert has been raised, and send it to ServiceNow. We can create a playbook on the ServiceNow platform for raisings an alert, which will instruct the NGFW firewall to block the connection.

    What is most valuable?

    The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles. Zero Trust Security, Check Point Infinity is an architecture provided by Check Point that includes a solution for protecting organizations at different levels.  Zero Trust Networks: The Check Point Security Gateway enables micro-segmentation across the organization's network. Integration with Identity awareness and Application Control enables policy enforcement at a granular level. Zero Trust Workloads: Protect workloads hosted in private and public clouds, enforce compliance, detect and remediate misconfiguration. Zero Trust People: Identity awareness enables granting access to data for authorized users with SSO and MFA. Zero Trust Devices: Sandblast Agent Endpoint and Check Point Sandblast Mobile protect employees' mobile devices and workstations from advanced attacks, Zero-day malware, malicious app installation, and more. Network-based threat prevention protects devices from threats that are coming from the network and vice versa. Zero Trust Data: Protect data by performing full hard disk encryption on endpoint and external media encryption on all removable storage media. Data shared to external partners over the Internet is encrypted by site-to-site VPN and client-to-site VPN. Visibility and Analytics: The Check Point attack dashboard allows for immediate response to security incidents and provides real-time forensics for investigating events. Automation and Orchestration: Security architecture integration with organization border IT environment enhances speed and agility, incident response, policy accuracy, and task delegation.

    What needs improvement?

    The licensing model for Check Point Infinity is not clear. As infinity licenses are based on the number of users, it confuses larger organizations, where not every user needs every service.  For example: For an organization size of more than 100,000 users, where only a few users need to have access to SandBlast Mobile for protecting their BYOD devices against threats, and there are a few users that need Capsule to access corporate data, and in addition, if the organization needs to protect all of the user's email accounts using Check Point Email Security, then it creates issues in terms of the license count. It is confusing when it comes to figuring out how to fulfill the requirements.
    Buyer's Guide
    Advanced Threat Protection (ATP)
    July 2022
    Find out what your peers are saying about Check Point, Palo Alto Networks, RSA and others in Advanced Threat Protection (ATP). Updated: July 2022.
    610,190 professionals have used our research since 2012.

    What do I think about the stability of the solution?

    Check Point solutions are stable.

    What do I think about the scalability of the solution?

    It's a framework, so it is scalable.

    How are customer service and support?

    The technical support is excellent.

    Which solution did I use previously and why did I switch?

    We are using this solution to provide having security at each level of the environment.

    How was the initial setup?

    Different solutions or products from Check Point are involved for creating complete this security framework.

    What about the implementation team?

    We deployed with an in-house team with OEM support.

    What's my experience with pricing, setup cost, and licensing?

    Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA).

    Which other solutions did I evaluate?

    We have worked with different products from Check Point and other security solutions.

    What other advice do I have?

    This is a security architecture. Organizations can use different Check Point solutions for protecting different environments, such as the network, email, endpoints, and more.

    Which deployment model are you using for this solution?

    Hybrid Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Oleg Pekar - PeerSpot reviewer
    Senior Network/Security Engineer at Skywind Group
    Real User
    Top 5Leaderboard
    Offers a unified security approach that provides full control over users and what they can do
    Pros and Cons
    • "We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure."
    • "I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."

    What is our primary use case?

    Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment located in Asia (Taiwan).

    The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

    How has it helped my organization?

    The "Infinity" is not some standalone security solution, but the way you plan and implement the whole security infrastructure of your company. It contains all the modern components from Check Point. 

    In our company, we use the hardware appliances, Next-Generation Firewalls, with a bunch of blades activated (DLP, IPS, VPN, etc.) to protect the data centers. Our data centers are controlled by the Check Point Security management, with the current version being R80.10. These are the basic building blocks of Check Point Infinity, and they work just great together. They also allow for the future extension and we are thinking about adding the Anti-DDOS protection on the edge of our environments. 

    We are fully satisfied with the abilities it provides and the general approach of the Check Point solutions.

    What is most valuable?

    The Check Point Infinity architecture is the unified approach for building the unified security infrastructure of our company. I like that it covers all the pieces of the modern enterprise organization security needs including offices and data centers, public cloud environments, and the interconnects between them. It also protects end-user devices such as laptops, smartphones, and tablets.

    We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure. I also like that all of the components are tightly integrated and there is a single endpoint to control all the elements. This is called the Smart Console.

    What needs improvement?

    Even though we have had several support cases opened for the components of the Check Point Infinity architecture, as an administrator, I'm satisfied with the solution and the abilities it provides. I can't describe any disadvantages at the moment, except for the overall price of purchasing and maintaining the entire set of components.

    I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain. Maintenance requires that the licenses and the support services be prolonged regularly.

    Alternatively, they should create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers.

    For how long have I used the solution?

    We have been using the Check Point Infinity for about three years, starting in late 2017.

    What do I think about the stability of the solution?

    All of the components in Check Point Infinity are mature and stable and we have not encountered any issue with that.

    What do I think about the scalability of the solution?

    The solution scales well with the hardware we have, and we see that scalability, the Active-Active HA mode, doesn't affect the overall performance much after activation.

    How are customer service and technical support?

    We have had several support cases opened, but none of them were connected with the Check Point Mobile Access Software Blade. Some of the issues were resolved by installing the latest recommended JumoHotfix, whereas some required additional configuration at the OS kernel level.

    The longest issue took about one month to be resolved, which we consider too long.

    Which solution did I use previously and why did I switch?

    We have not used any solution of this kind before.

    How was the initial setup?

    The setup was straightforward. The configuration was easy and understandable, and we relied heavily on built-in objects and groups.

    What about the implementation team?

    Our deployment was completed by our in-house team. We have a Check Point Certified engineer working in the engineering team.

    What's my experience with pricing, setup cost, and licensing?

    Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.

    Which other solutions did I evaluate?

    We decided to stick to the Check Point Infinity after the demo with the vendor.

    What other advice do I have?

    The Check Point Infinity security architecture is a robust and modern security solution for organizations of any size, but make sure that you have a dedicated budget to maintain it. It is really not cheap.

    Also, it is better to have a dedicated and certified Check Point specialist in your engineering team, since the solution is complex.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Buyer's Guide
    Advanced Threat Protection (ATP)
    July 2022
    Find out what your peers are saying about Check Point, Palo Alto Networks, RSA and others in Advanced Threat Protection (ATP). Updated: July 2022.
    610,190 professionals have used our research since 2012.
    Cloud Support Leader at a tech company with 51-200 employees
    User
    Top 5Leaderboard
    Easy to integrate, prevents threats, and is flexible
    Pros and Cons
    • "It is very easy to integrate new features."
    • "They can improve the latency of the portal."

    What is our primary use case?

    We have used the Infinity Check Point portal to use two edges, Harmony Connect, and the SmartConsole.

    We have managed our Check Point gateways through the web SmartConsole administration, which helps us not to have or depend on virtual or physical management, the licensing is included with the gateway license.

    On the other hand, we have also used the functionality of Check Point Harmony connect, all these functionalities integrated into a portal that has many more to complement all security departments.

    How has it helped my organization?

    It has improved or helped us by not having to implement separate solutions and not having to depend on a physical server to manage our Check Point gateways.

    On the other hand, the use of another of its characteristics, such as Check Point Harmony Connect, has helped us a lot with the teleworking of our collaborators, providing us with an external security layer for equipment outside the perimeter, avoiding vulnerabilities in said equipment through the web gateway. 

    In addition, all the administration is web-based, which makes it a very flexible solution.

    What is most valuable?

    It seems to us that one of the best advantages or characteristics that Check Point Infinity has is the integration of many services to complement security for any company, the implementation of this portal is extremely easy, you can have all the characteristics in a simple way.

    The prevention of threats in real-time and with continuous updates is one of the most important items of all Check Point solutions, it is highly valued and of taking advantage of it for our organizations.

    It is very easy to integrate new features.

    What needs improvement?

    They can improve the latency of the portal. Sometimes it takes a while to respond. It is not a good image for the client, however, with all the functionalities that this application has, almost all of us forget the slowness of the portal.

    We would like to have more documentation for the new Check Point services which are very good but would be easier to implement.

    Licensing is sometimes complex to understand, a good partner is needed to help us with the issue.

    For how long have I used the solution?

    We have been using Check Point Infinity Portal for eight months now. We have Harmony Connect in addition to using it to manage our gateways through SmartConsole.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    Buyer's Guide
    Download our free Advanced Threat Protection (ATP) Report and find out what your peers are saying about Check Point, Palo Alto Networks, RSA, and more!
    Updated: July 2022
    Buyer's Guide
    Download our free Advanced Threat Protection (ATP) Report and find out what your peers are saying about Check Point, Palo Alto Networks, RSA, and more!