What is our primary use case?
We have main offices in Brazil and branch offices in each of our state capitals. So, we have 26 branch offices in total. Each branch office used to have a small Check Point appliance. We're moving away from that model; they won't access the internet directly anymore. Instead, they'll pass through a central kind of star network.
We use two levels of firewalls: an external firewall and an internal firewall. We have a DMZ between these two firewall clusters with high availability. Each firewall has IPS, web content filtering, bot protection, and antivirus enabled. We'll contract some of those features as part of an MSSP service. We don't buy products or appliances directly.
Our procurement requirements allow other manufacturers to participate. The decision isn't ours or the integrator's – it's how we buy in Brazil. The vendor offering the lowest price for a product that meets the requirements wins. We cannot choose a specific brand or product name.
How has it helped my organization?
Before contracting the MSSP, we had an IPS (I don't remember if it was Check Point). However, we only detected signatures; we weren't confident enough to block them due to false positives. For the past 10 years, we have had a procedure where we get new signatures weekly, test for false positives, and set exclusions. Most relevant signatures are now in use, so the IPS is an important layer of protection for us. So, Check Point Infinity's threat prevention capabilities benefitted our organization.
We haven't had any problems with integration, but we don't need many integrations. The main one is with SIEM. The bigger issue is that we use ArcSight as our SIEM. It's very difficult to migrate from one SIEM solution to another.
We are on the journey of moving to the cloud right now. We had on-premises services, but we are going to move to a cloud environment where we have Azure and AWS Cloud. Because of this, the new solution will have virtual firewalls at the edge of each cloud.
What is most valuable?
I like all the features because within the suite we use, it's sometimes hard to know exactly which features are being used and where they come from.
But, the main feature is the integration with Active Directory, where you can allow or deny traffic based on users or groups of users from Active Directory.
What needs improvement?
We have had some performance issues. Because of this, we had to redirect traffic to be analyzed by other appliances. I'm not sure if higher-end appliances would still have this problem.
We also experienced issues with deploying new configuration versions to all branch appliances, but we won't be using this setup anymore. We don't know exactly how the virtual appliances will work to protect the cloud. It's a new thing for us.
Buyer's Guide
Check Point Infinity
June 2025
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
For how long have I used the solution?
I have been using it for 14 years now.
What do I think about the stability of the solution?
I would rate the stability an eight out of ten. We've had some problems in the past.
What do I think about the scalability of the solution?
We had an issue with scalability before. We think the technology changes caused by mobile traffic impacted our appliances. Since we're buying a bigger solution now, I think we won't have this problem this time.
Check Point engineers were involved, and they suggested we use a virtual appliance to remove this traffic from our physical appliance.
How are customer service and support?
We've had some difficult experiences sometimes, such as we have to send again files and information.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We had another solution a long time ago. It was a small, free solution, very difficult to compare. We've used Check Point for a long time, so it's impossible to make a fair comparison.
We also use Azure Sentinel, but we do not receive logs from security solutions. It's possible we'll migrate to Azure Sentinel in the future. Nowadays, it's difficult to use a SIEM that is local and not cloud-based.
How was the initial setup?
The initial setup will be done by the MSSP provider, not us. They'll handle the appliances, configuration, and integration. When we pay, everything must be working perfectly, and the documentation must be delivered to us.
The first deployment took about nine months because we changed the active tool. The second deployment was a bit different and took about six months. This timeline includes everything: equipment and features, but it also has solutions that aren't exactly Check Point firewalls, like the WAF (Web Application Firewall) or integration with SIEMs—also, the implementation of use cases in the SIEM.
What about the implementation team?
There are two teams involved in the deployment: our team and the supplier's team. Usually, there are three or four people from the supplier and the same number from us.
It's maintained by the supplier. We have an SLA (Service Level Agreement) in place. They install, maintain, and manage the entire solution. We are a user of the solution; we open tickets to them, and they make the configurations. They're also responsible for availability and other aspects.
What other advice do I have?
I would recommend it. However, Check Point could improve its tech support systems. If they had more engineers in Brazil, I think it would be good.
Overall, I would rate the solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.