Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
Great infinity portal, modern, intuitive.
Pros and Cons
  • "New Check Point technologies can be found via this portal."
  • "The portal is provisioned in AWS. They should improve the cloud to make it faster."

What is our primary use case?

Our vendor told us about the solution. It was not required to use a management server since this portal provided the same service of free or licensed with the same logic already obtained from our GWs.             

How has it helped my organization?

Check Point Infinity Portal has given us an excellent complete solution where we can use many security plugins integrated into a single console and is providing that centralized security environment that all companies look for, including logs, monitoring, and security from the same part.

This portal is extremely intuitive as well as versatile and accessible from anywhere, providing all this control and business security in an easy way.

New Check Point technologies can be found via this portal.

Check Point Infinity is a great tool.

What is most valuable?

One of the most important features is the simple access. It's easy from anywhere, it's safe, and you can even use MFA to have a security layer for administrator users.

It is a centralized portal that provides all the features required for cloud environments, to manage our gateways developed in Microsoft Azure.

This portal also has an incredible availability since I've been using it I haven't had log in problems or service outages, quite useful to integrate all the new products.

Its costs are quite accessible.

What needs improvement?

In general, Check Point can improve its documentation. Sometimes they are very old. They could include more examples to guide customers in their implementations.

I have noticed that new technologies are more difficult to find guides. Without them, the objective to implement them correctly is not always achieved.

On the other hand, I think it is good to improve the support service since it is somewhat slow for cloud issues, they are resolved, but after several weeks, I think the solution SLA should be improved.

The portal is provisioned in AWS. They should improve the cloud to make it faster.

Buyer's Guide
Check Point Infinity
April 2024
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,924 professionals have used our research since 2012.

For how long have I used the solution?

Check Point Infinity is a completely innovative security solution that we have used for the administrative use of both Check Point Harmony and Check Point SmartCloud to manage our gateways. It is a solution that does not use a server provisioned by the client. It is located in a web portal in which you can incorporate many of these features like the ones we currently use. We have been using it for more than two years.

Which solution did I use previously and why did I switch?

We did not previously use a solution as complete as Check Point Infinity Portal.

What's my experience with pricing, setup cost, and licensing?

It is important to have access to licensing consultations with a direct Check Point vendor to determine needs. In addition, the costs are not always public, which is why it is very helpful to have someone to assist.

Which other solutions did I evaluate?

We have previously evaluated other technologies and manufacturers. However, the most complete is Check Point.

What other advice do I have?

I recommend this security tool. However, it is important to validate with your Check Point partner if it fits your business needs.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
portal very automated, modern
Pros and Cons
  • "The initial implementation was accomplished easily and without deployment problems."
  • "The console at the beginning also has the section on where to save the logs, however, if by mistake we choose a very remote area, this detail cannot be corrected unless the change of data center where the logs are housed, which is requested through support, which can become a management difficulty."

What is our primary use case?

When validating the centralized environment, we began to use other tools of the Check Point family that are available through the portal.

Some licenses already bring what is required to be able to manage.

The tool complies with the mobility issue since it can be used from anywhere.

The initial implementation was accomplished easily and without deployment problems.

Its quite intuitive dashboard helped us a lot with the administration.

How has it helped my organization?

At the company level, we managed not to have to depend on a server that was implemented together with the company's infrastructure. Still, really it is only necessary to join the portal.

The license was included for its use.

By also providing a fairly intuitive portal, it allows security administrator users to carry out their tasks in a simple way. For example, it is only necessary to switch to the Harmony Blade to be able to manage policies and controls over them.

The monitoring theme is quite efficient.

What is most valuable?

Check Point Infinity Portal achieved many of the company's requirements, including:

1- An easy and fast implementation of the portal.

2- Licensing is already included in some Check Point tools, such as the Check Point gateways.

3- Accessibility from anywhere.

4- Use of MFA to ensure the identity of the user.

5- An automated, modern, and simple portal for security administrators.

This is a very good management tool, which saves logs depending on the policy implemented from the beginning to have portal information that can be used later.

What needs improvement?

Some points of improvement of the centralized management tool may be the latency that is rarely provided when managing, for example, the smart cloud of Check Point for gateways.

The console at the beginning also has the section on where to save the logs, however, if by mistake we choose a very remote area, this detail cannot be corrected unless the change of data center where the logs are housed, which is requested through support, which can become a management difficulty.

As for support for modern and cloud-based tools, they are somewhat more difficult to solve quickly.

For how long have I used the solution?

This is an excellent centralizing tool. We started using it to manage our Check Point gateways.

What do I think about the stability of the solution?

This is a quite stable solution and does not require maintenance by the client.

It has some performance problems, however, they are few. In itself the tool is quite interesting and powerful.

Which solution did I use previously and why did I switch?

We have not used a cloud management tool before. Some are similar yet do not meet what Check Point can offer.

What's my experience with pricing, setup cost, and licensing?

The issue of licensing is not required since some solutions already include management with this portal. Similarly, it is essential to register with a partner who can delve into the manufacturer's options for the client's benefit.

Which other solutions did I evaluate?

Of course, validation of the available documentation of the tools is always carried out, however, Check Point was adjusted to what is required by the company.

What other advice do I have?

I recommend the use of this administration portal.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Infinity
April 2024
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,924 professionals have used our research since 2012.
Support at a security firm with 51-200 employees
User
Top 5Leaderboard
Infinity Porta is a secure environment and has good overall functionality
Pros and Cons
  • "We can add our environments and can configure and manage them easily which is why administrators are happy with this tool."
  • "Check Point Infinity's web application is sometimes a little slow."

What is our primary use case?

We needed to handle the administration of the tools that we have with Check Point without the use of administration servers and from the cloud. With this product, we can centrally manage our security environments for the company through a web portal.

It is really easy to do it this way as the portal is managed directly by Check Point. We can detach ourselves from the portal and focus on the security of the infrastructure itself. The portal is extremely intuitive for admins.

How has it helped my organization?

We like the Check Point Infinity Portal's functionality. It provides us, within the license, the use of a secure environment for the administration of various manufacturer tools and we can easily, intuitively, and safely work from the web browser without having to have our own server and additional licensing to manage. In addition, this console complies with all identity security tools that prevent us from being violated by losing control of the console.

From the portal, we manage our FWs in addition to using Harmony Connect.

What is most valuable?

This web tool, or the web administration server included in the license, is really intuitive. We can add our environments and can configure and manage them easily which is why administrators are happy with this tool.

There are no additional costs, which is why it is really important for the company.

And finally, it is managed by Check Point in terms of access, availability, and security. Connecting to the portal is secure which is really providing the company with administration security.

What needs improvement?

Check Point Infinity's web application is sometimes a little slow. It really is only a little slow, however, it is perceived that it is not normal to be that way. The performance of the site could be improved depending on the capabilities it has at the moment.

There should be more documentation on these new technologies and administrative portals, in addition to including more tools from the manufacturer to finally have them all centralized to facilitate the client's administration from the same place without having any connectivity problems.

For how long have I used the solution?

We have used Check Point Infinity Portal for at least a year and have had great results. It is a centrally managed environment for many of the other Check Point tools.

Which solution did I use previously and why did I switch?

I have not previously used a solution similar to Check Point Infinity.

What's my experience with pricing, setup cost, and licensing?

The tool comes licensed with the required security tools. I recommend that new users try it as a test mode to determine if their infrastructure and the administration functionality work for them.

Which other solutions did I evaluate?

We always try to validate the competence of manufacturers in our organization in order to determine the best option. In this case, Check Point is the best option for us.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Technical Support at Hitachi Systems, Ltd.
Real User
Top 5
Has centralized management console but technical support lags
Pros and Cons
  • "The tool's most valuable feature for threat prevention is the encryption alarm. I find the centralized management console, including the log analyzer and reports in Check Point Infinity, extremely beneficial for enhancing security and operations efficiency in our enterprise. I would rate it a perfect ten out of ten, as it effectively helps us analyze logs, and detect potential attacks."
  • "The tool's technical support lags."

What is most valuable?

The tool's most valuable feature for threat prevention is the encryption alarm. 
I find the centralized management console, including the log analyzer and reports in Check Point Infinity, extremely beneficial for enhancing security and operations efficiency in our enterprise. I would rate it a perfect ten out of ten, as it effectively helps us analyze logs,  and detect potential attacks. 

What needs improvement?

The tool's technical support lags. 

For how long have I used the solution?

I have been using the product for six to seven months. 

What do I think about the stability of the solution?

I rate the solution's stability a nine out of ten. 

What do I think about the scalability of the solution?

I rate the tool's scalability an eight point five out of ten. 

Which solution did I use previously and why did I switch?

We used Trend Mico before Check Point Infinity.We currently have approximately 500 endpoints deployed. So far, the system is working seamlessly, and we haven't encountered any security issues. I'm confident in the product's security features. We are currently the documentation, and the support portal has been reliable, providing us with ample resources to troubleshoot any issues.


What's my experience with pricing, setup cost, and licensing?

When it comes to price, the paramount consideration is the strength of the security. If the security measures provided by the product, such as Check Point Infinity, are robust and meet our requirements, price becomes a secondary concern.

What other advice do I have?

For those considering Check Point Infinity, my advice is to gain hands-on experience and acquire a foundational understanding of the product before diving into the implementation process. I rate it a nine out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Flag as inappropriate
PeerSpot user
Kabelo Lamola - PeerSpot reviewer
Cyber Security trainee at Chimera
Real User
Top 10
Simple navigation, flexible scalability, and excellent support
Pros and Cons
  • "The most valuable feature of Check Point Infinity is the ease of use and navigation."
  • "Check Point Infinity price could improve."

What is our primary use case?

Check Point Infinity is used to protect information that is moved to the cloud. For example, when you upload your documents to the cloud wherever you are, that document can be encrypted so that no one can access it outside that domain. If they try to impersonate a user they won't be able to access it. There is verification that takes place if they are requesting to access a document with a password and a username to gain access.

What is most valuable?

The most valuable feature of Check Point Infinity is the ease of use and navigation.

What needs improvement?

Check Point Infinity price could improve.

For how long have I used the solution?

I have been using Check Point Infinity for approximately one year.

What do I think about the stability of the solution?

Check Point Infinity is stable.

What do I think about the scalability of the solution?

The scalability of Check Point Infinity is good. If you want to scale the capacity it is easy to do, it is flexible.

We have approximately 50 people using this solution in my company. We have plans to increase the usage.

How are customer service and support?

I have used the support from the technical support and they are good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used another solution prior to Check Point Infinity.

How was the initial setup?

The initial setup of Check Point Infinity is straightforward. I had a few challenges with my system but the time it should take to implement is approximately less than one hour.

What about the implementation team?

The implementation of the solution can be done in-house.

What's my experience with pricing, setup cost, and licensing?

The pricing of Check Point Infinity could be better. There is a license needed to use the solution and we pay annually.

What other advice do I have?

I recommend this solution to others.

I rate Check Point Infinity a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Ashish Upadhyay - PeerSpot reviewer
Founder at BlockMosiac
Real User
Top 5Leaderboard
Provide unified threat prevention and response across our entire decentralized finance system
Pros and Cons
  • "Our network security posture has improved significantly due to several factors. We've seen a 25% reduction in security incidents due to Infinity's advanced threat prevention capabilities. Additionally, the platform's automation features led to a 20% increase in operational efficiency, allowing our security teams to focus on more strategic tasks."
  • "Alert fatigue is a common issue with platforms that have strong detection capabilities. Implementing more filtering and prioritization mechanisms can help address this issue, ensuring that security teams can focus on the most critical threats."

What is our primary use case?

It's for the detection of various attacks and malfunctions. It provides more insights. We use the full Check Point Infinity suite, including Horizon.

So, my company uses this product to protect thousands of critical components within our enterprise. It provides us with a comprehensive security operations platform that integrates directly into our logging architecture. 

It leverages extended detection and response (XDR) and endpoint protection functionalities, which enhance our security posture by unifying threat prevention, detection, and response across various attack vectors.

Also, integrating Infinity with our blockchain environment and other third-party products offers a holistic approach to security. This ensures that potential threats are identified in blockchain networks, endpoints, mobile devices, and various cloud environments. 

Additionally, AI-powered security features are leveraged to correlate information from different security products within our platform to identify and mitigate complex threats effectively. 

So, this is particularly crucial in our decentralized space, where there is a high chance of tech breaches. By automating response mechanisms, Horizon enables threats to be mitigated promptly, minimizing the impact on the blockchain ecosystem. 

How has it helped my organization?

Our network security posture has improved significantly due to several factors. We've seen a 25% reduction in security incidents due to Infinity's advanced threat prevention capabilities. 

Additionally, the platform's automation features led to a 20% increase in operational efficiency, allowing our security teams to focus on more strategic tasks. 

The centralized view provided by Infinity also helps us identify and mitigate potential risks more effectively, resulting in a 15% reduction in overall security-related costs.

By implementing Check Point Infinity for our mobile and cloud environments, we've simplified security management. Before, we'd find vulnerabilities or glitches in our apps after release, making it difficult and costly to release patches. 

After implementing Check Point Infinity, it highlights vulnerabilities beforehand. Also, we've seen a decrease in the amount of false positives, which is good for our company.

By implementing unified security management, it has streamlined our operations across our diverse infrastructure. The time we previously spent identifying issues and vulnerabilities has significantly reduced, saving us valuable time. 

As a result, we can focus more on core aspects of our company. Additionally, the platform has streamlined our processes, making the delivery of tasks smoother thanks to Check Point Infinity's advanced capabilities and AI detection features. This automation also allows us to reduce costs. 

We've been able to reduce our reliance on human resources and replace it with AI capabilities, improving our cost efficiency and allowing us to reinvest those resources where necessary. Unified Security Management has helped us save time, reduce costs, and streamline our processes.

What is most valuable?

The most valuable feature is its ability to provide unified threat prevention and response across our entire decentralized finance system. 

By integrating it into our company, Horizon offers a wider view into Infinity and helps us to identify threats across the network that are targeting the company. 

This feature is crucial for blockchain-based security environments. With Check Point Infinity, we can proactively protect our ecosystem from cyber threats such as malware, ransomware, and phishing attacks, which can compromise the security of our decentralized identity solutions. 

Additionally, its automated response mechanisms allow us to mitigate threats efficiently. That's the best part about it.

It's quite easy to use and learn. Those with beginner skills who are new to the cloud environment and looking for solutions they can learn without extensive tutorials or manuals can easily approach Check Point Infinity. 

The support teams are very friendly and can guide you through the setup and deployment processes. If a beginner is trying to learn this product, it's quite beginner-friendly.

What needs improvement?

While Check Point Infinity offers a robust security operations platform, it could benefit from improvements in several areas. Firstly, the platform's pricing structure can be complex, which might be prohibitive for smaller businesses, limiting its accessibility. 

Simplifying the pricing model or offering more flexible pricing options could make Check Point Infinity more appealing to a wider range of organizations.

Secondly, alert fatigue is a common issue with platforms that have strong detection capabilities. Implementing more filtering and prioritization mechanisms can help address this issue, ensuring that security teams can focus on the most critical threats. These are the areas where I believe there's room for improvement.

In future releases, I would like to add more integration features. The ability to integrate seamlessly with more third-party applications would make it more customizable for our needs and simplify the integration process. This would improve our overall threat detection capabilities.

For how long have I used the solution?

 I have been using it for a year. I use the latest version. 

What do I think about the stability of the solution?

It's a quite stable product. We haven't faced any major breakdowns yet. So far, it's been stable.

After implementing Check Point Infinity, our network has remained stable and fast. We've seen approximately a 50% increase in network speed and reduced latency. Because of this, we can deploy more apps and provide services to larger organizations more efficiently.

What do I think about the scalability of the solution?

Check Point Infinity is quite a scalable product. It can be used in very large organizations where there are major security concerns. It's a very scalable product.

Our company has around 13 end users using this solution. Some are admins. 

With Check Point Infinity's scalability, we can easily deploy it across all our apps, models, and the services we provide. Its advanced detection capabilities allow us to identify more vulnerabilities and potential attacks targeting our company. This ultimately protects us from cyberattacks.

Which solution did I use previously and why did I switch?

My company was using McAfee Endpoint. Considering Check Point Infinity has proven helpful for our company, we've seen a 20% overall cost reduction and time savings of approximately 30-45%. 

That makes it a worthwhile investment. Based on our extensive research, we found Check Point Infinity to be the best fit for us so that I would choose this product again.

How was the initial setup?

The initial setup of Check Point Infinity was a reasonably efficient process. The platform's user interface is intuitive and guided us through the setup steps, making it easy to configure everything to meet our specific security needs. 

Additionally, the Check Point team was very supportive and readily available to assist us with any questions, which made the deployment process even smoother.

What's my experience with pricing, setup cost, and licensing?

The price is moderately priced. The pricing structure varies. 

Here's a breakdown:

  • Vulnerability Management: Approximately $49
  • Complete Edition: Approximately $69
  • EDR Capabilities: Adds approximately $83 for advanced and $103 for complete
  • Vulnerability Management + EDR: Approximately $94 for advanced and $114 for complete
  • Patch Management: Additional cost of approximately $78 and $58

Overall, the price may depend on your organization's needs. For us, it's a moderate expense.

Which other solutions did I evaluate?

We looked at many solutions before, including McAfee Endpoint Security. However, it didn't fit well with our company's needs. We faced some issues with it. 

Someone recommended Check Point Infinity, and with its advanced threat prevention capabilities, we've been able to refine our apps and make them more secure without vulnerabilities. This increases the reliability of our customers and cloud environments.

What other advice do I have?

For organizations seeking security solutions, Check Point Infinity offers a range of options to meet specific needs. There are various editions along with add-ons like vulnerability management and endpoint detection and response (EDR) that provide a layered approach to security. 

The pricing, while detailed, allows for scalability and customization based on your individual requirements. 

Additionally, features like vulnerability and patch management further enhance the platform. 

Those looking for an alternative to McAfee or firewalls could consider Check Point Infinity for its flexibility and streamlined processes.

Overall, I would rate the product an eight out of ten. It's a good product that helps organizations protect themselves and mitigate potential threats. 

However, to compete with platforms like McAfee and others, they need to add more advanced features. This would enhance the product's value for organizations considering it.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Senior Network Engineer at a tech services company with 201-500 employees
Real User
Easy to manage, scalable and stable
Pros and Cons
  • "The solution is very stable. I would estimate it's 99.9% stable, if not more."
  • "Technical support is something that needs improvement."

What is our primary use case?

We primarily implement the solution for our clients.

What is most valuable?

The solution assures that we can manage all our other relevant related solutions from one place. Clients can manage everything - the data center firewall, the perimeter firewall, and the cloud, etc. They can have one single consolidated management that makes everything more visible and transparent from one place.

What needs improvement?

We recently upgraded to the latest release of the new version, IP40. Since it is new, whatever features that were not there in the IP30 version, have been added to IP40. Right now, we are gradually going through it, so I cannot say what might be lacking just yet. 

Technical support is something that needs improvement.

For how long have I used the solution?

We've been using the solution for two years.

What do I think about the stability of the solution?

The solution is very stable. I would estimate it's 99.9% stable, if not more.

What do I think about the scalability of the solution?

The solution is extremely scalable. It's not difficult to expand it as necessary.

How are customer service and technical support?

Technical support is good. They have a team in Dubai that is taking care of the Middle East. First, we will try to contact them, and if they are busy they normally will escalate the request to another office. They're quite good and have been very helpful. We've been satisfied with the level of support and the amount of access they give for assistance. However, they could provide additional materials to us so that we don't have to reach out to them directly.

Which solution did I use previously and why did I switch?

We mostly promote this solution, but we also work with Palo Alto and Fortinet.

What other advice do I have?

We are an integrator as well as a partner. 

I'd rate the solution ten out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: partner
PeerSpot user
Buyer's Guide
Download our free Check Point Infinity Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2024
Buyer's Guide
Download our free Check Point Infinity Report and get advice and tips from experienced pros sharing their opinions.