Try our new research platform with insights from 80,000+ expert users
Geraldo Freitas - PeerSpot reviewer
Analista de TI - suporte a redes e segurança at Tribunal de Contas da União
Real User
Top 5
Offers integration with Active Directory, where you can allow or deny traffic based on users or groups of users from Active Directory
Pros and Cons
  • "Check Point Infinity's threat prevention capabilities benefitted our organization."
  • "We have had some performance issues. Because of this, we had to redirect traffic to be analyzed by other appliances."

What is our primary use case?

We have main offices in Brazil and branch offices in each of our state capitals. So, we have 26 branch offices in total. Each branch office used to have a small Check Point appliance. We're moving away from that model; they won't access the internet directly anymore. Instead, they'll pass through a central kind of star network.

We use two levels of firewalls: an external firewall and an internal firewall. We have a DMZ between these two firewall clusters with high availability. Each firewall has IPS, web content filtering, bot protection, and antivirus enabled. We'll contract some of those features as part of an MSSP service. We don't buy products or appliances directly.

Our procurement requirements allow other manufacturers to participate. The decision isn't ours or the integrator's – it's how we buy in Brazil. The vendor offering the lowest price for a product that meets the requirements wins. We cannot choose a specific brand or product name.

How has it helped my organization?

Before contracting the MSSP, we had an IPS (I don't remember if it was Check Point). However, we only detected signatures; we weren't confident enough to block them due to false positives. For the past 10 years, we have had a procedure where we get new signatures weekly, test for false positives, and set exclusions. Most relevant signatures are now in use, so the IPS is an important layer of protection for us. So, Check Point Infinity's threat prevention capabilities benefitted our organization.

We haven't had any problems with integration, but we don't need many integrations. The main one is with SIEM. The bigger issue is that we use ArcSight as our SIEM. It's very difficult to migrate from one SIEM solution to another.

We are on the journey of moving to the cloud right now. We had on-premises services, but we are going to move to a cloud environment where we have Azure and AWS Cloud. Because of this, the new solution will have virtual firewalls at the edge of each cloud.

What is most valuable?

I like all the features because within the suite we use, it's sometimes hard to know exactly which features are being used and where they come from. 

But, the main feature is the integration with Active Directory, where you can allow or deny traffic based on users or groups of users from Active Directory.

What needs improvement?

We have had some performance issues. Because of this, we had to redirect traffic to be analyzed by other appliances. I'm not sure if higher-end appliances would still have this problem. 

We also experienced issues with deploying new configuration versions to all branch appliances, but we won't be using this setup anymore. We don't know exactly how the virtual appliances will work to protect the cloud. It's a new thing for us.

Buyer's Guide
Check Point Infinity
June 2025
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.

For how long have I used the solution?

I have been using it for 14 years now.

What do I think about the stability of the solution?

I would rate the stability an eight out of ten. We've had some problems in the past.

What do I think about the scalability of the solution?

We had an issue with scalability before. We think the technology changes caused by mobile traffic impacted our appliances. Since we're buying a bigger solution now, I think we won't have this problem this time. 

Check Point engineers were involved, and they suggested we use a virtual appliance to remove this traffic from our physical appliance.

How are customer service and support?

We've had some difficult experiences sometimes, such as we have to send again files and information.  

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We had another solution a long time ago. It was a small, free solution, very difficult to compare. We've used Check Point for a long time, so it's impossible to make a fair comparison.

We also use Azure Sentinel, but we do not receive logs from security solutions. It's possible we'll migrate to Azure Sentinel in the future. Nowadays, it's difficult to use a SIEM that is local and not cloud-based.

How was the initial setup?

The initial setup will be done by the MSSP provider, not us. They'll handle the appliances, configuration, and integration. When we pay, everything must be working perfectly, and the documentation must be delivered to us.

The first deployment took about nine months because we changed the active tool. The second deployment was a bit different and took about six months. This timeline includes everything: equipment and features, but it also has solutions that aren't exactly Check Point firewalls, like the WAF (Web Application Firewall) or integration with SIEMs—also, the implementation of use cases in the SIEM.

What about the implementation team?

There are two teams involved in the deployment: our team and the supplier's team. Usually, there are three or four people from the supplier and the same number from us.

It's maintained by the supplier. We have an SLA (Service Level Agreement) in place. They install, maintain, and manage the entire solution. We are a user of the solution; we open tickets to them, and they make the configurations. They're also responsible for availability and other aspects.

What other advice do I have?

I would recommend it. However, Check Point could improve its tech support systems. If they had more engineers in Brazil, I think it would be good.

Overall, I would rate the solution a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hendrik-Du Plooy - PeerSpot reviewer
Regional Manager at Saber1
Real User
Top 5
An easy-to-use tool that provides visibility and offers protection to data
Pros and Cons
  • "The most valuable features of the solution stem from factors like ease of use, visibility, and cost to the enterprise."
  • "The endpoint solutions offered by Check Point are not prominent enough in the market due to Check Point's poor marketing efforts."

What is our primary use case?

My company's clients use Check Point Infinity to protect their data.

What is most valuable?

The most valuable features of the solution stem from factors like ease of use, visibility, and cost to the enterprise.

What needs improvement?

Endpoints are an area of concern when it comes to Check Point Infinity. There are some issues around the marketing of the endpoint solution, because of which it is not as prominent as other players in the market. The endpoint solutions offered by Check Point are not prominent enough in the market due to Check Point's poor marketing efforts. If the marketing for the endpoint solutions offered by Check Point is done properly, then Check Point can get a more thorough positioning in the marketplace.

For how long have I used the solution?

I have been using Check Point Infinity for two years. My company is a reseller of products from Check Point and Palo Alto. I have experience with the solution's latest version.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a nine out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution an eight out of ten.

My company's clients who use Check Point Infinity are mostly enterprise-sized companies.

How are customer service and support?

I rate the technical support a nine out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The deployment process of the tool can be completed in a few hours.

The solution is deployed on the cloud and on-premises.

What's my experience with pricing, setup cost, and licensing?

I rate the product's price a six on a scale of one to ten, where one is cheap, and ten is expensive.

A payment of 15,000 USD needs to be made towards the licensing costs attached to the solution. There are no costs in addition to the standard licensing costs attached to the solution.

What other advice do I have?

I recommend the solution to those who plan to use it.

I rate the overall solution an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
Buyer's Guide
Check Point Infinity
June 2025
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
Anuraj Nair - PeerSpot reviewer
Presales Engineer at SNSIN
Reseller
Top 5Leaderboard
We can navigate to all the products very easily because it is written in a normal installation
Pros and Cons
  • "Infinity is a technical console where we have to log in, and we can navigate to all the products very easily because it is written in a normal installation. People who know about the product can click and take care of their activity."
  • "Technical support is pretty delayed."

What is our primary use case?

Infinity is a single platform where you can integrate all the Check Point solutions such as Check Point Email Security, Check Point Endpoint Protection, Check Point SaaS, Check Point web proxy solutions, and Check Point Firewall. It can be integrated into the Infinity portal, and we can manage and configure it from the Infiniti portal.

What is most valuable?

Infinity is a technical console where we have to log in, and we can navigate to all the products very easily because it is written in a normal installation. People who know about the product can click and take care of their activity.

What needs improvement?

Technical support is pretty delayed. It's very slow, and they have not yet received their IT. Compared to other OEMs, Check Point's response is a bit slow but could have been improved. There are two areas to improve: The latency of the sandboxing and the technical support efficacy.

For how long have I used the solution?

I have been using Check Point Infinity for five years.

What do I think about the stability of the solution?

I never felt any downtime or any login issues. Whenever I try to log in, it happens properly and normally.

I rate the solution’s stability a nine out of ten.

What do I think about the scalability of the solution?

5,000 end users are using the solution.

I rate the solution’s scalability a nine out of ten.

How was the initial setup?

The initial setup is very straightforward. Also, the OEM vendor will help you with the login, configure the authentication, get into the login, or get into the console, load your device, and start configuring it.

What was our ROI?

Check Point Infinity offers numerous benefits. It provides peace of mind by simplifying security management. It is responsible for on-premises security, allowing users to configure it anywhere. Additionally, it enables seamless remote connection, even if the user is away from the central point. It's the latest in security technology, offering immense value.

What's my experience with pricing, setup cost, and licensing?

Customers need to pay yearly.

What other advice do I have?

Infiniti is a portal that integrates multiple products.

It's a unified management console. I'm able to manage all the solutions and products from my single Infinity console regardless of multiple branches across the globe, anywhere in the world, and they can be controlled from a single console. The major benefit is the SaaS offering. So, customers don't have to manage everything or keep any infrastructure on-premises; it's completely provided by Check Point, with data centers integrated into Infinity. Thus, there are no data integration problems.

Check Point Infinity is well known for its CDR (Content Disarm and Reconstruction) technology rather than CRO (Customer Revenue Optimization) debt protection. This technology is primarily associated with its sandboxing capabilities. However, there is room for improvement in terms of latency when scanning and delivering attachments, links, or files. Although the delay is often negligible, competitors may offer faster results with their sandboxing solutions.

For customers prioritizing robust security, performance, and stability, Check Point can be an excellent choice. Their extensive technical expertise and global deployments contribute to the reliability of their products. With the Infinity architecture, which facilitates comprehensive threat coverage, Check Point offers scalability, reliability, and expandability across various infrastructure needs.

Overall, I rate the solution a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Systems Engineer at PGE
Real User
Top 5
Stable platform with good technical support services
Pros and Cons
  • "It is a scalable product."
  • "Check Point Infinity is not compatible with Windows 8."

What is most valuable?

It is a good tool. If we plan to change the password, we don't have to change the MX Points or SPF settings, as it works with Microsoft 365. It helps us prevent losing emails.

What needs improvement?

Check Point Infinity is not compatible with Windows 8.

For how long have I used the solution?

We have been using Check Point Infinity for two months. We did a POC for it.

What do I think about the stability of the solution?

It is a stable product. 

What do I think about the scalability of the solution?

It is a scalable product.

How are customer service and support?

The technical support services are good. We reach them regarding technical errors. They reply with the solutions in a few hours.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup process is complex.

What's my experience with pricing, setup cost, and licensing?

The product has good pricing considering the features and a global approach. I rate its pricing an eight out of ten.

What other advice do I have?

I rate Check Point Infinity a nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Helps with monitoring, reinforces security architecture, and allows for real-time threat prevention
Pros and Cons
  • "It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security."
  • "One of the main improvements that can be made is the latency in the portal."

What is our primary use case?

At the end of 2020, the company was growing its staff. In addition, the pandemic was beginning, and as a result of these two factors, the company needed to protect the organization. It was there that the Check Point Infinity tool was used. 

It is characterized as a great tool against the latest generation of cyber attacks all these attacks are found on mobile devices, endpoints, etc. Always in the security part, companies must be aware of technologies since it is an essential part of organizations, and Check Point Infinity is an excellent tool for these functions.

How has it helped my organization?

The Check Point Infinity tool came in to reinforce security in the organization since a basic security had been implemented that put our data at risk. Using these new technologies, it has also focused on zero-trust and is able to generate complexity and security gaps in the platform of the organization so we can avoid future attacks and errors and be able to provide a quick solution. 

Infinity contains all the modern Check Point components like DLP, IPS, VPN, etc. We currently use R80.10 and it helped us a lot with security and implementations.

What is most valuable?

It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security, those characteristics that it has that different cover devices regardless of the brand, also to help us maintain full control of our employees' devices and thus be able to monitor and ensure more and more security breaches. Infinity helped us a lot in real-time threat prevention, and with continuous updates, it is one of the most important points of all Check Point solutions.

What needs improvement?

One of the main improvements that can be made is the latency in the portal. It is one of the most common errors of the Check Point tools, another of the improvements is that the unlimited licenses are based on the number of users. This confuses larger organizations, where not all users need all services. 

Finally, they must improve the technical support they provide to users since we have opened several cases and they take time to attend to them or contact us, and in certain cases, they do not provide a quick solution. They take a long time to solve the error problem in question, which is worrying since, due to this inefficiency, they could attack the organization since there may be a gap in the infrastructure of the organization.

For how long have I used the solution?

The tool was implemented four years ago.

What do I think about the stability of the solution?

In recent years, the stabilized one has done very well. The only thing is the latency to the portal, however, in general, it has behaved very well.

What do I think about the scalability of the solution?

Regarding the scalability of the tool, it is very scalable depending on your implementation.

How are customer service and support?

The experience with support has not been very good since we have had problems with support. It took a long time to answer or solve a problem.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not have any professional security tools.

How was the initial setup?

The implementation was very simple and fast. All you have to do is meet the primary requirements.

What about the implementation team?

The implementation was done in conjunction with the supplier and an internal engineer. The experience was very good; he knew how to do his job.

What was our ROI?

The director of the company will be continuity since if it were not safe there would have been losses.

What's my experience with pricing, setup cost, and licensing?

Check Point maintains competitive prices in the market. It must be taken into account that for the security of an organization is very important to invest in.

Which other solutions did I evaluate?

Check Point Infinity was one of the first options we had in mind due to its great reach in the security market.

What other advice do I have?

The only thing would be to improve the latency in the graphical interface and technical support.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Great analytics and AI with helpful centralizations capabilities
Pros and Cons
  • "It is one of the best brands and products in terms of centralization."
  • "We need improvement around the Smart-1 cloud solution."

What is our primary use case?

We were looking for a solution that would allow us to establish a configuration with the different security devices remotely while centralizing management and including other products available at the security level. 

We looked into different options and brands that allowed us to establish, achieve and fulfill this need. This was one of the solutions that met all of these aforementioned characteristics, thus giving us 360º protection and accommodation in terms of managing security services. 

How has it helped my organization?

This solution gave us the freedom to be an institution with its own security team, which has allowed us to establish ourselves. It is one of the best brands and products in terms of centralization. It allows us to establish all security products or security software under a single pane with a single view of a centralized dashboard. We are managing everything from there and have been able to handle threat prevention. It has allowed us, in a complete way, to handle expanded organizational scope. 

What is most valuable?

The portal gives us many advantages. 

It has great internal analytics, which contains artificial intelligence. It has the ability to be managed centrally and acquire and consume computing power from the cloud. This means that we will make a payment for the use of the services and a payment for the licensing. Additionally, computing power doesn't all come in a single license. We can take a single product and enable and facilitate it as necessary, making all of these capabilities and features available as needed. 

What needs improvement?

We need improvement around the Smart-1 cloud solution. It is included in the Infinity service, and it needs to be able to be restarted only from the background, with the brand's specialists - not done in an autonomous way. Developing this aspect and making it available to everyone consuming the services through the platform would help us manage many of the incidents due to cosmetic errors that can happen on the platform. 

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Erick Chinchilla Mena - PeerSpot reviewer
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Real User
Great protection with centralized segmentation and management
Pros and Cons
  • "Infinity has come to give us total protection."
  • "In the future, I would like to see new developments that allow us to centralize the cloud."

What is our primary use case?

Today we have the need to protect various infrastructures we have. We have infrastructure on-premise and in the cloud, and we have a variety of branches. All of the infrastructures has demanded greater security from us. We needed a new and evolved way of managing equipment and the security of our infrastructure. As a result of all these concerns, we have been adopting innovative security technologies, and this is where we have added additional value to the protection that we want to give to each of the places where we have hosted data and information. We have been adopting the themes of Infinity Cloud to have total protection.

How has it helped my organization?

Infinity has come to give us total protection. It has come to cover branches, devices, infrastructure, different clouds, and various types of sites where we host data, and we need to share it between the different regions we have a presence in. It has given us the protection that we did not have before.

The segmentation and management came in decentralized, which means that this has given us protection while providing the ability to centralize a single portal for our security teams so that each one of them can administer and manage everything. Infinity is of great value as it can centralize all those dashboards. Before we had them separate.

What is most valuable?

Everyone who uses Check Point products has been realizing that it has been innovating in immense ways. Before we had the perimeter network administration teams in one place, with the management of mobile devices or web browsing handled separately. Today, we have them in a centralized place and are managing (in different tabs) the security of each of its devices, branches, clouds, etc. It is a more efficient way to take advantage of all the computing power and intelligence behind it. And it has additional AI.

What needs improvement?

In the future, I would like to see new developments that allow us to centralize the cloud. Infinity Cloud is one of the most powerful clouds in security where a number of sites or technological capabilities have been established to protect our networks, our equipment, and our infrastructure, however, in the future what we could have is a comprehensive and novel way for new or additional features to protect services such as blockchain or web services3.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited
Real User
Well tested with good security and threat protection
Pros and Cons
  • "It provides fantastic visibility of security incidents through deconstructing and dissecting the threat's infection protocol."
  • "The management console has given us some trouble, and the documentation is a little bit rigid in its solution paths."

What is our primary use case?

As part of a large organization, this product gained the visibility of our security team thanks to its reputation of having the most advanced technology against the latest cyber threats. 

It protects everything, from cloud and company networks to endpoints and mobile devices, by adopting Check Point Infinity security architecture as a strategy to neutralize fifth-generation threats that spread fast and at a large scale through different vectors. 

We also saved money in our security implementation measures with this solution.

How has it helped my organization?

Check Point Infinity's security framework requires all users to be authorized and authenticated regardless they're from within or outside the organization. In order to maintain or gain more access to applications and data, the users have to be continuously validated by posture and security checkpoints as if there was no traditional network edge. Whether the network's in the cloud, local, both, or hybrid, and regardless of the location of the worker, the solution is comprehensive to the digital transformation taking place. It opens lots of backdoors and exposes gaps consequence of non-stop data sharing.

What is most valuable?

You can tell this product's standards have gone through heavy validation and testing; it's always verifying access from all resources at all times. If a breach happens, it minimizes its impact, which is a determining factor of its efficiency (worst-case scenario behavior), and incorporates the data to strategize on the best possible responses with the most accurate neutralizing actions. It provides fantastic visibility of security incidents through deconstructing and dissecting the threat's infection protocol.

What needs improvement?

The management console has given us some trouble, and the documentation is a little bit rigid in its solution paths. We could use more audiovisual material with more examples of setups and configurations to minimize the need to discover the information we need in the extensive documents we have available. 

The support team is great. However, we don't want to be constantly on the phone with a technician for Q&A or even to open tickets to design our protocols the way the company requests them.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Infinity Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Check Point Infinity Report and get advice and tips from experienced pros sharing their opinions.