Check Point Infinity OverviewUNIXBusinessApplication

Check Point Infinity is the #9 ranked solution in top ATP (Advanced Threat Protection) tools. PeerSpot users give Check Point Infinity an average rating of 8.8 out of 10. Check Point Infinity is most commonly compared to CyberArk Privileged Access Manager: Check Point Infinity vs CyberArk Privileged Access Manager. Check Point Infinity is popular among the large enterprise segment, accounting for 45% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a computer software company, accounting for 34% of all views.
Check Point Infinity Buyer's Guide

Download the Check Point Infinity Buyer's Guide including reviews and more. Updated: December 2022

What is Check Point Infinity?

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity

Check Point Infinity was previously known as R80, Infinity.

Check Point Infinity Customers

Edel AG

Check Point Infinity Video

Check Point Infinity Pricing Advice

What users are saying about Check Point Infinity pricing:
  • "Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."
  • "The pricing of Check Point Infinity could be better. There is a license needed to use the solution and we pay annually."
  • Check Point Infinity Reviews

    Filter by:
    Filter Reviews
    Industry
    Loading...
    Filter Unavailable
    Company Size
    Loading...
    Filter Unavailable
    Job Level
    Loading...
    Filter Unavailable
    Rating
    Loading...
    Filter Unavailable
    Considered
    Loading...
    Filter Unavailable
    Order by:
    Loading...
    • Date
    • Highest Rating
    • Lowest Rating
    • Review Length
    Search:
    Showingreviews based on the current filters. Reset all filters
    Basil Dange - PeerSpot reviewer
    Senior Manager at a financial services firm with 10,001+ employees
    Real User
    Top 5Leaderboard
    Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network
    Pros and Cons
    • "The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."
    • "The licensing model for Check Point Infinity is not clear."

    What is our primary use case?

    We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors.

    These sophisticated attacks are on mobile devices, endpoints, cloud, and various enterprise networks. They easily bypass the conventional, static detection-based systems used by organizations today.

    The legacy perimeter-focused security approaches have become ineffective. The outdated assumption that everything inside the security perimeter can be trusted leaves organizations exposed for vulnerability and attack.

    To protect the organization, we need to move up to the latest generation of cybersecurity tools. These combine real-time threat prevention, shared intelligence, and the most advanced zero-trust security across network, cloud, endpoint, and mobile devices.

    How has it helped my organization?

    Rebuilding security infrastructure around the Zero Trust approach, using disparate technologies might lead to complexities and inherent security gaps. To avoid errors and provide robust security, Check Point offers more practical and holistic approaches to implement Zero Trust. It is based on a single consolidated cybersecurity architecture, Check Point Infinity.

    Check Point provides different solutions to protect organizations at each level. They have products that can work in a silo or can be integrated with other security solutions to enhance security by mitigating risk and providing a dashboard for monitoring.  

    Generated logs can be sent to a SIEM solution, where a use case or action can be defined against raised alerts. Automated policies/processes can be created accordingly.

    For example, if we need to block communication from a suspicious IP for which an alert has been raised, and send it to ServiceNow. We can create a playbook on the ServiceNow platform for raisings an alert, which will instruct the NGFW firewall to block the connection.

    What is most valuable?

    The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles.

    Zero Trust Security, Check Point Infinity is an architecture provided by Check Point that includes a solution for protecting organizations at different levels. 

    Zero Trust Networks: The Check Point Security Gateway enables micro-segmentation across the organization's network. Integration with Identity awareness and Application Control enables policy enforcement at a granular level.

    Zero Trust Workloads: Protect workloads hosted in private and public clouds, enforce compliance, detect and remediate misconfiguration.

    Zero Trust People: Identity awareness enables granting access to data for authorized users with SSO and MFA.

    Zero Trust Devices: Sandblast Agent Endpoint and Check Point Sandblast Mobile protect employees' mobile devices and workstations from advanced attacks, Zero-day malware, malicious app installation, and more. Network-based threat prevention protects devices from threats that are coming from the network and vice versa.

    Zero Trust Data: Protect data by performing full hard disk encryption on endpoint and external media encryption on all removable storage media. Data shared to external partners over the Internet is encrypted by site-to-site VPN and client-to-site VPN.

    Visibility and Analytics: The Check Point attack dashboard allows for immediate response to security incidents and provides real-time forensics for investigating events.

    Automation and Orchestration: Security architecture integration with organization border IT environment enhances speed and agility, incident response, policy accuracy, and task delegation.

    What needs improvement?

    The licensing model for Check Point Infinity is not clear. As infinity licenses are based on the number of users, it confuses larger organizations, where not every user needs every service. 

    For example:

    For an organization size of more than 100,000 users, where only a few users need to have access to SandBlast Mobile for protecting their BYOD devices against threats, and there are a few users that need Capsule to access corporate data, and in addition, if the organization needs to protect all of the user's email accounts using Check Point Email Security, then it creates issues in terms of the license count. It is confusing when it comes to figuring out how to fulfill the requirements.

    Buyer's Guide
    Check Point Infinity
    December 2022
    Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: December 2022.
    657,397 professionals have used our research since 2012.

    What do I think about the stability of the solution?

    Check Point solutions are stable.

    What do I think about the scalability of the solution?

    It's a framework, so it is scalable.

    How are customer service and support?

    The technical support is excellent.

    Which solution did I use previously and why did I switch?

    We are using this solution to provide having security at each level of the environment.

    How was the initial setup?

    Different solutions or products from Check Point are involved for creating complete this security framework.

    What about the implementation team?

    We deployed with an in-house team with OEM support.

    What's my experience with pricing, setup cost, and licensing?

    Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA).

    Which other solutions did I evaluate?

    We have worked with different products from Check Point and other security solutions.

    What other advice do I have?

    This is a security architecture. Organizations can use different Check Point solutions for protecting different environments, such as the network, email, endpoints, and more.

    Which deployment model are you using for this solution?

    Hybrid Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Adriamcam - PeerSpot reviewer
    Consultant at ITQS
    Reseller
    Top 5Leaderboard
    Helps with monitoring, reinforces security architecture, and allows for real-time threat prevention
    Pros and Cons
    • "It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security."
    • "One of the main improvements that can be made is the latency in the portal."

    What is our primary use case?

    At the end of 2020, the company was growing its staff. In addition, the pandemic was beginning, and as a result of these two factors, the company needed to protect the organization. It was there that the Check Point Infinity tool was used. 

    It is characterized as a great tool against the latest generation of cyber attacks all these attacks are found on mobile devices, endpoints, etc. Always in the security part, companies must be aware of technologies since it is an essential part of organizations, and Check Point Infinity is an excellent tool for these functions.

    How has it helped my organization?

    The Check Point Infinity tool came in to reinforce security in the organization since a basic security had been implemented that put our data at risk. Using these new technologies, it has also focused on zero-trust and is able to generate complexity and security gaps in the platform of the organization so we can avoid future attacks and errors and be able to provide a quick solution. 

    Infinity contains all the modern Check Point components like DLP, IPS, VPN, etc. We currently use R80.10 and it helped us a lot with security and implementations.

    What is most valuable?

    It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security, those characteristics that it has that different cover devices regardless of the brand, also to help us maintain full control of our employees' devices and thus be able to monitor and ensure more and more security breaches. Infinity helped us a lot in real-time threat prevention, and with continuous updates, it is one of the most important points of all Check Point solutions.

    What needs improvement?

    One of the main improvements that can be made is the latency in the portal. It is one of the most common errors of the Check Point tools, another of the improvements is that the unlimited licenses are based on the number of users. This confuses larger organizations, where not all users need all services. 

    Finally, they must improve the technical support they provide to users since we have opened several cases and they take time to attend to them or contact us, and in certain cases, they do not provide a quick solution. They take a long time to solve the error problem in question, which is worrying since, due to this inefficiency, they could attack the organization since there may be a gap in the infrastructure of the organization.

    For how long have I used the solution?

    The tool was implemented three years ago.

    What do I think about the stability of the solution?

    In recent years, the stabilized one has done very well. The only thing is the latency to the portal, however, in general, it has behaved very well.

    What do I think about the scalability of the solution?

    Regarding the scalability of the tool, it is very scalable depending on your implementation.

    How are customer service and support?

    The experience with support has not been very good since we have had problems with support. It took a long time to answer or solve a problem.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We did not have any professional security tools.

    How was the initial setup?

    The implementation was very simple and fast. All you have to do is meet the primary requirements.

    What about the implementation team?

    The implementation was done in conjunction with the supplier and an internal engineer. The experience was very good; he knew how to do his job.

    What's my experience with pricing, setup cost, and licensing?

    Check Point maintains competitive prices in the market. It must be taken into account that for the security of an organization is very important to invest in.

    Which other solutions did I evaluate?

    Check Point Infinity was one of the first options we had in mind due to its great reach in the security market.

    What other advice do I have?

    The only thing would be to improve the latency in the graphical interface and technical support.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    Buyer's Guide
    Check Point Infinity
    December 2022
    Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: December 2022.
    657,397 professionals have used our research since 2012.
    Jonathan Ramos G. - PeerSpot reviewer
    Cloud Engineer at ITQS
    Real User
    Top 5Leaderboard
    Reliable, good at emulating threats, and is easy to manage
    Pros and Cons
    • "For me, one of the best features of Check Point Infinity is to be able to have the possibility of emulating the activity of attached files with malicious content in such a short time."
    • "They need to update the guides."

    What is our primary use case?

    As we adapt to the changes left by the pandemic, we must adapt our technologies, our equipment, and the traditional scheme in which we worked must evolve.

    As a result of these changes, we have been adopting security and much of the administration with fully cloud services to be able to adapt to these changes and give greater adaptability to our technologies.

    With Check Point Infinity, we have the possibility of managing our platform from the cloud. It also offers us centralization and other solutions of the same portfolio in one place, taking advantage of great advantages; it is at this point where Check Point allows us to take advantage of a secure and centralized administration.

    How has it helped my organization?

    Check Point Infinity is one of the solutions that has given us more value, being able to adopt their cloud where they centralize many solutions. Taking advantage of all that computing power, we assure users inside or outside the organization are safe. After all, due to the changes produced by the pandemic, we have had to evolve with security and administration.

    To have a cloud such as Check Point Infinity is to have an ally that puts at our disposal many solutions from a single portal. It offers great response at the level of security. 

    What is most valuable?

    For me, one of the best features of Check Point Infinity is to be able to have the possibility of emulating the activity of attached files with malicious content in such a short time. This capacity is of great value. Many times we want to know what an attack does and how an attack is exploited on our computers. With what we have learned from emulation we can reinforce our security lines or bases. You can learn a lot while always staying protected.

    What needs improvement?

    They need to update the guides. The product has improved a lot. However, its support guides are still the same as they were seven years ago. I say this from experience. For example, for configuration, it is necessary in some cases to consult these same guides and you see yourself looking at references the old information is still there. 

    The support for Latin America is one of those that is also a bit neglected. We are without direct technicians speaking in Spanish. In some cases and their support is fast, however, this cultural shock makes interaction difficult, and when it comes to the escalation of the problems, mainly when the cases are urgent or escalated, the most experienced technicians only speak English.

    For how long have I used the solution?

    I've used the solution for around two years.

    What do I think about the stability of the solution?

    The solution is scalable and is very complete. It centralizes everything.

    What do I think about the scalability of the solution?

    It is a really complete solution. It manages to cover everything in the Infinity Check Point Portal.

    Which solution did I use previously and why did I switch?

    We did not previously use a different solution. 

    What's my experience with pricing, setup cost, and licensing?

    What Check Point currently does at the security level is very good. However, some prices in reference to licenses are a bit high. An example is how they sell SSL.

    Which other solutions did I evaluate?

    We did not evaluate other options. 

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    Security Admin at a tech company with 1-10 employees
    User
    Top 5Leaderboard
    CKPoint Infinity - Excellent Security Portal
    Pros and Cons
    • "New Check Point technologies can be found via this portal."
    • "The portal is provisioned in AWS. They should improve the cloud to make it faster."

    What is our primary use case?

    The first use we had of this portal with these characteristics was Check Point Smart Cloud to manage our approved gateways in Microsoft Azure. Our vendor told us about the solution. It was not required to use a management server since this portal provided the same service of free or licensed with the same licenses already obtained from our gateways. It is really very easy to implement and offers very versatile usage, giving us economy since we do not have to use a server to be able to administer it. We are really happy with the service.

    How has it helped my organization?

    Check Point Infinity Portal has given us an excellent complete solution where we can use many security plugins integrated into a single console and is providing that centralized security environment that all companies look for, including logs, monitoring, and security from the same part.

    This portal is extremely intuitive as well as versatile and accessible from anywhere, providing all this control and business security in an easy way.

    New Check Point technologies can be found via this portal.

    Check Point Infinity is a great tool.

    What is most valuable?

    One of the most important features is the simple access. It's easy from anywhere, it's safe, and you can even use MFA to have a security layer for administrator users,

    It is a centralized portal that provides all the features required for cloud environments, to manage our gateways developed in Microsoft Azure,

    This portal also has an incredible availability since I've been using it I haven't had log in problems or service outages, quite useful to integrate all the new products.

    Its costs are quite accessible.

    What needs improvement?

    In general, Check Point can improve its documentation. Sometimes they are very old. They could include more examples to guide customers in their implementations.

    I have noticed that new technologies are more difficult to find guides. Without them, the objective to implement them correctly is not always achieved.

    On the other hand, I think it is good to improve the support service since it is somewhat slow for cloud issues, they are resolved, but after several weeks, I think the solution SLA should be improved.

    The portal is provisioned in AWS. They should improve the cloud to make it faster.

    For how long have I used the solution?

    Check Point Infinity is a completely innovative security solution that we have used for the administrative use of both Check Point Harmony and Check Point SmartCloud to manage our gateways. It is a solution that does not use a server provisioned by the client. It is located in a web portal in which you can incorporate many of these features like the ones we currently use. We have been using it for more than two years.

    Which solution did I use previously and why did I switch?

    We did not previously use a solution as complete as Check Point Infinity Portal.

    What's my experience with pricing, setup cost, and licensing?

    It is important to have access to licensing consultations with a direct Check Point vendor to determine needs. In addition, the costs are not always public, which is why it is very helpful to have someone to assist.

    Which other solutions did I evaluate?

    We have previously evaluated other technologies and manufacturers. However, the most complete is Check Point.

    What other advice do I have?

    I recommend this security tool. However, it is important to validate with your Check Point partner if it fits your business needs.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    PeerSpot user
    Support at a tech services company with 51-200 employees
    Real User
    Top 5Leaderboard
    An automated, modern, and simple portal
    Pros and Cons
    • "The initial implementation was accomplished easily and without deployment problems."
    • "The console at the beginning also has the section on where to save the logs, however, if by mistake we choose a very remote area, this detail cannot be corrected unless the change of data center where the logs are housed, which is requested through support, which can become a management difficulty."

    What is our primary use case?

    When validating the centralized environment, we began to use other tools of the Check Point family that are available through the portal.

    Some licenses already bring what is required to be able to manage.

    The tool complies with the mobility issue since it can be used from anywhere.

    The initial implementation was accomplished easily and without deployment problems.

    Its quite intuitive dashboard helped us a lot with the administration.

    How has it helped my organization?

    At the company level, we managed not to have to depend on a server that was implemented together with the company's infrastructure. Still, really it is only necessary to join the portal.

    The license was included for its use.

    By also providing a fairly intuitive portal, it allows security administrator users to carry out their tasks in a simple way. For example, it is only necessary to switch to the Harmony Blade to be able to manage policies and controls over them.

    The monitoring theme is quite efficient.

    What is most valuable?

    Check Point Infinity Portal achieved many of the company's requirements, including:

    1- An easy and fast implementation of the portal.

    2- Licensing is already included in some Check Point tools, such as the Check Point gateways.

    3- Accessibility from anywhere.

    4- Use of MFA to ensure the identity of the user.

    5- An automated, modern, and simple portal for security administrators.

    This is a very good management tool, which saves logs depending on the policy implemented from the beginning to have portal information that can be used later.

    What needs improvement?

    Some points of improvement of the centralized management tool may be the latency that is rarely provided when managing, for example, the smart cloud of Check Point for gateways.

    The console at the beginning also has the section on where to save the logs, however, if by mistake we choose a very remote area, this detail cannot be corrected unless the change of data center where the logs are housed, which is requested through support, which can become a management difficulty.

    As for support for modern and cloud-based tools, they are somewhat more difficult to solve quickly.

    For how long have I used the solution?

    This is an excellent centralizing tool. We started using it to manage our Check Point gateways.

    What do I think about the stability of the solution?

    This is a quite stable solution and does not require maintenance by the client.

    It has some performance problems, however, they are few. In itself the tool is quite interesting and powerful.

    Which solution did I use previously and why did I switch?

    We have not used a cloud management tool before. Some are similar yet do not meet what Check Point can offer.

    What's my experience with pricing, setup cost, and licensing?

    The issue of licensing is not required since some solutions already include management with this portal. Similarly, it is essential to register with a partner who can delve into the manufacturer's options for the client's benefit.

    Which other solutions did I evaluate?

    Of course, validation of the available documentation of the tools is always carried out, however, Check Point was adjusted to what is required by the company.

    What other advice do I have?

    I recommend the use of this administration portal.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    Erick Chinchilla Mena - PeerSpot reviewer
    Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
    Real User
    Top 5
    Great protection with centralized segmentation and management
    Pros and Cons
    • "Infinity has come to give us total protection."
    • "In the future, I would like to see new developments that allow us to centralize the cloud."

    What is our primary use case?

    Today we have the need to protect various infrastructures we have. We have infrastructure on-premise and in the cloud, and we have a variety of branches. All of the infrastructures has demanded greater security from us. We needed a new and evolved way of managing equipment and the security of our infrastructure. As a result of all these concerns, we have been adopting innovative security technologies, and this is where we have added additional value to the protection that we want to give to each of the places where we have hosted data and information. We have been adopting the themes of Infinity Cloud to have total protection.

    How has it helped my organization?

    Infinity has come to give us total protection. It has come to cover branches, devices, infrastructure, different clouds, and various types of sites where we host data, and we need to share it between the different regions we have a presence in. It has given us the protection that we did not have before.

    The segmentation and management came in decentralized, which means that this has given us protection while providing the ability to centralize a single portal for our security teams so that each one of them can administer and manage everything. Infinity is of great value as it can centralize all those dashboards. Before we had them separate.

    What is most valuable?

    Everyone who uses Check Point products has been realizing that it has been innovating in immense ways. Before we had the perimeter network administration teams in one place, with the management of mobile devices or web browsing handled separately. Today, we have them in a centralized place and are managing (in different tabs) the security of each of its devices, branches, clouds, etc. It is a more efficient way to take advantage of all the computing power and intelligence behind it. And it has additional AI.

    What needs improvement?

    In the future, I would like to see new developments that allow us to centralize the cloud. Infinity Cloud is one of the most powerful clouds in security where a number of sites or technological capabilities have been established to protect our networks, our equipment, and our infrastructure, however, in the future what we could have is a comprehensive and novel way for new or additional features to protect services such as blockchain or web services3.

    For how long have I used the solution?

    I've used the solution for one year.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    alvarado - PeerSpot reviewer
    Cloud Support Leader at a tech company with 51-200 employees
    User
    Top 5Leaderboard
    Easy to integrate, prevents threats, and is flexible
    Pros and Cons
    • "It is very easy to integrate new features."
    • "They can improve the latency of the portal."

    What is our primary use case?

    We have used the Infinity Check Point portal to use two edges, Harmony Connect, and the SmartConsole.

    We have managed our Check Point gateways through the web SmartConsole administration, which helps us not to have or depend on virtual or physical management, the licensing is included with the gateway license.

    On the other hand, we have also used the functionality of Check Point Harmony connect, all these functionalities integrated into a portal that has many more to complement all security departments.

    How has it helped my organization?

    It has improved or helped us by not having to implement separate solutions and not having to depend on a physical server to manage our Check Point gateways.

    On the other hand, the use of another of its characteristics, such as Check Point Harmony Connect, has helped us a lot with the teleworking of our collaborators, providing us with an external security layer for equipment outside the perimeter, avoiding vulnerabilities in said equipment through the web gateway. 

    In addition, all the administration is web-based, which makes it a very flexible solution.

    What is most valuable?

    It seems to us that one of the best advantages or characteristics that Check Point Infinity has is the integration of many services to complement security for any company, the implementation of this portal is extremely easy, you can have all the characteristics in a simple way.

    The prevention of threats in real-time and with continuous updates is one of the most important items of all Check Point solutions, it is highly valued and of taking advantage of it for our organizations.

    It is very easy to integrate new features.

    What needs improvement?

    They can improve the latency of the portal. Sometimes it takes a while to respond. It is not a good image for the client, however, with all the functionalities that this application has, almost all of us forget the slowness of the portal.

    We would like to have more documentation for the new Check Point services which are very good but would be easier to implement.

    Licensing is sometimes complex to understand, a good partner is needed to help us with the issue.

    For how long have I used the solution?

    We have been using Check Point Infinity Portal for eight months now. We have Harmony Connect in addition to using it to manage our gateways through SmartConsole.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    Kabelo Lamola - PeerSpot reviewer
    Cyber Security trainee at Chimera
    Real User
    Top 10
    Simple navigation, flexible scalability, and excellent support

    What is our primary use case?

    Check Point Infinity is used to protect information that is moved to the cloud. For example, when you upload your documents to the cloud wherever you are, that document can be encrypted so that no one can access it outside that domain. If they try to impersonate a user they won't be able to access it. There is verification that takes place if they are requesting to access a document with a password and a username to gain access.

    What is most valuable?

    The most valuable feature of Check Point Infinity is the ease of use and navigation.

    What needs improvement?

    Check Point Infinity price could improve.

    For how long have I used the solution?

    I have been using Check Point Infinity for approximately one year.

    What do I think about the stability of the solution?

    Check Point Infinity is stable.

    What do I think about the scalability of the solution?

    The scalability of Check Point Infinity is good. If you want to scale the capacity it is easy to do, it is flexible.

    We have approximately 50 people using this solution in my company. We have plans to increase the usage.

    How are customer service and support?

    I have used the support from the technical support and they are good.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have not used another solution prior to Check Point Infinity.

    How was the initial setup?

    The initial setup of Check Point Infinity is straightforward. I had a few challenges with my system but the time it should take to implement is approximately less than one hour.

    What about the implementation team?

    The implementation of the solution can be done in-house.

    What's my experience with pricing, setup cost, and licensing?

    The pricing of Check Point Infinity could be better. There is a license needed to use the solution and we pay annually.

    What other advice do I have?

    I recommend this solution to others.

    I rate Check Point Infinity a nine out of ten.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user