Try our new research platform with insights from 80,000+ expert users
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at a tech services company with 51-200 employees
Real User
Top 20
Aug 25, 2022
Reliable, good at emulating threats, and is easy to manage
Pros and Cons
  • "For me, one of the best features of Check Point Infinity is to be able to have the possibility of emulating the activity of attached files with malicious content in such a short time."
  • "They need to update the guides."

What is our primary use case?

As we adapt to the changes left by the pandemic, we must adapt our technologies, our equipment, and the traditional scheme in which we worked must evolve.

As a result of these changes, we have been adopting security and much of the administration with fully cloud services to be able to adapt to these changes and give greater adaptability to our technologies.

With Check Point Infinity, we have the possibility of managing our platform from the cloud. It also offers us centralization and other solutions of the same portfolio in one place, taking advantage of great advantages; it is at this point where Check Point allows us to take advantage of a secure and centralized administration.

How has it helped my organization?

Check Point Infinity is one of the solutions that has given us more value, being able to adopt their cloud where they centralize many solutions. Taking advantage of all that computing power, we assure users inside or outside the organization are safe. After all, due to the changes produced by the pandemic, we have had to evolve with security and administration.

To have a cloud such as Check Point Infinity is to have an ally that puts at our disposal many solutions from a single portal. It offers great response at the level of security. 

What is most valuable?

For me, one of the best features of Check Point Infinity is to be able to have the possibility of emulating the activity of attached files with malicious content in such a short time. This capacity is of great value. Many times we want to know what an attack does and how an attack is exploited on our computers. With what we have learned from emulation we can reinforce our security lines or bases. You can learn a lot while always staying protected.

What needs improvement?

They need to update the guides. The product has improved a lot. However, its support guides are still the same as they were seven years ago. I say this from experience. For example, for configuration, it is necessary in some cases to consult these same guides and you see yourself looking at references the old information is still there. 

The support for Latin America is one of those that is also a bit neglected. We are without direct technicians speaking in Spanish. In some cases and their support is fast, however, this cultural shock makes interaction difficult, and when it comes to the escalation of the problems, mainly when the cases are urgent or escalated, the most experienced technicians only speak English.

Buyer's Guide
Check Point Infinity
December 2025
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,259 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for around two years.

What do I think about the stability of the solution?

The solution is scalable and is very complete. It centralizes everything.

What do I think about the scalability of the solution?

It is a really complete solution. It manages to cover everything in the Infinity Check Point Portal.

Which solution did I use previously and why did I switch?

We did not previously use a different solution. 

What's my experience with pricing, setup cost, and licensing?

What Check Point currently does at the security level is very good. However, some prices in reference to licenses are a bit high. An example is how they sell SSL.

Which other solutions did I evaluate?

We did not evaluate other options. 

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Chief Information Security Officer at a financial services firm with 10,001+ employees
Real User
Top 10
Apr 2, 2021
Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network
Pros and Cons
  • "The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."
  • "The licensing model for Check Point Infinity is not clear."

What is our primary use case?

We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors.

These sophisticated attacks are on mobile devices, endpoints, cloud, and various enterprise networks. They easily bypass the conventional, static detection-based systems used by organizations today.

The legacy perimeter-focused security approaches have become ineffective. The outdated assumption that everything inside the security perimeter can be trusted leaves organizations exposed for vulnerability and attack.

To protect the organization, we need to move up to the latest generation of cybersecurity tools. These combine real-time threat prevention, shared intelligence, and the most advanced zero-trust security across network, cloud, endpoint, and mobile devices.

How has it helped my organization?

Rebuilding security infrastructure around the Zero Trust approach, using disparate technologies might lead to complexities and inherent security gaps. To avoid errors and provide robust security, Check Point offers more practical and holistic approaches to implement Zero Trust. It is based on a single consolidated cybersecurity architecture, Check Point Infinity.

Check Point provides different solutions to protect organizations at each level. They have products that can work in a silo or can be integrated with other security solutions to enhance security by mitigating risk and providing a dashboard for monitoring.  

Generated logs can be sent to a SIEM solution, where a use case or action can be defined against raised alerts. Automated policies/processes can be created accordingly.

For example, if we need to block communication from a suspicious IP for which an alert has been raised, and send it to ServiceNow. We can create a playbook on the ServiceNow platform for raisings an alert, which will instruct the NGFW firewall to block the connection.

What is most valuable?

The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles.

Zero Trust Security, Check Point Infinity is an architecture provided by Check Point that includes a solution for protecting organizations at different levels. 

Zero Trust Networks: The Check Point Security Gateway enables micro-segmentation across the organization's network. Integration with Identity awareness and Application Control enables policy enforcement at a granular level.

Zero Trust Workloads: Protect workloads hosted in private and public clouds, enforce compliance, detect and remediate misconfiguration.

Zero Trust People: Identity awareness enables granting access to data for authorized users with SSO and MFA.

Zero Trust Devices: Sandblast Agent Endpoint and Check Point Sandblast Mobile protect employees' mobile devices and workstations from advanced attacks, Zero-day malware, malicious app installation, and more. Network-based threat prevention protects devices from threats that are coming from the network and vice versa.

Zero Trust Data: Protect data by performing full hard disk encryption on endpoint and external media encryption on all removable storage media. Data shared to external partners over the Internet is encrypted by site-to-site VPN and client-to-site VPN.

Visibility and Analytics: The Check Point attack dashboard allows for immediate response to security incidents and provides real-time forensics for investigating events.

Automation and Orchestration: Security architecture integration with organization border IT environment enhances speed and agility, incident response, policy accuracy, and task delegation.

What needs improvement?

The licensing model for Check Point Infinity is not clear. As infinity licenses are based on the number of users, it confuses larger organizations, where not every user needs every service. 

For example:

For an organization size of more than 100,000 users, where only a few users need to have access to SandBlast Mobile for protecting their BYOD devices against threats, and there are a few users that need Capsule to access corporate data, and in addition, if the organization needs to protect all of the user's email accounts using Check Point Email Security, then it creates issues in terms of the license count. It is confusing when it comes to figuring out how to fulfill the requirements.

What do I think about the stability of the solution?

Check Point solutions are stable.

What do I think about the scalability of the solution?

It's a framework, so it is scalable.

How are customer service and technical support?

The technical support is excellent.

Which solution did I use previously and why did I switch?

We are using this solution to provide having security at each level of the environment.

How was the initial setup?

Different solutions or products from Check Point are involved for creating complete this security framework.

What about the implementation team?

We deployed with an in-house team with OEM support.

What's my experience with pricing, setup cost, and licensing?

Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA).

Which other solutions did I evaluate?

We have worked with different products from Check Point and other security solutions.

What other advice do I have?

This is a security architecture. Organizations can use different Check Point solutions for protecting different environments, such as the network, email, endpoints, and more.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Infinity
December 2025
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,259 professionals have used our research since 2012.
Support at a security firm with 51-200 employees
User
Top 5Leaderboard
Nov 25, 2025
Infinity Porta is a secure environment and has good overall functionality
Pros and Cons
  • "We can add our environments and can configure and manage them easily which is why administrators are happy with this tool."
  • "Check Point Infinity's web application is sometimes a little slow."

What is our primary use case?

We needed to handle the administration of the tools that we have with Check Point without the use of administration servers and from the cloud. With this product, we can centrally manage our security environments for the company through a web portal.

It is really easy to do it this way as the portal is managed directly by Check Point. We can detach ourselves from the portal and focus on the security of the infrastructure itself. The portal is extremely intuitive for admins.

How has it helped my organization?

We like the Check Point Infinity Portal's functionality. It provides us, within the license, the use of a secure environment for the administration of various manufacturer tools and we can easily, intuitively, and safely work from the web browser without having to have our own server and additional licensing to manage. In addition, this console complies with all identity security tools that prevent us from being violated by losing control of the console.

From the portal, we manage our FWs in addition to using Harmony Connect.

What is most valuable?

This web tool, or the web administration server included in the license, is really intuitive. We can add our environments and can configure and manage them easily which is why administrators are happy with this tool.

There are no additional costs, which is why it is really important for the company.

And finally, it is managed by Check Point in terms of access, availability, and security. Connecting to the portal is secure which is really providing the company with administration security.

What needs improvement?

Check Point Infinity's web application is sometimes a little slow. It really is only a little slow, however, it is perceived that it is not normal to be that way. The performance of the site could be improved depending on the capabilities it has at the moment.

There should be more documentation on these new technologies and administrative portals, in addition to including more tools from the manufacturer to finally have them all centralized to facilitate the client's administration from the same place without having any connectivity problems.

For how long have I used the solution?

We have used Check Point Infinity Portal for at least a year and have had great results. It is a centrally managed environment for many of the other Check Point tools.

Which solution did I use previously and why did I switch?

I have not previously used a solution similar to Check Point Infinity.

What's my experience with pricing, setup cost, and licensing?

The tool comes licensed with the required security tools. I recommend that new users try it as a test mode to determine if their infrastructure and the administration functionality work for them.

Which other solutions did I evaluate?

We always try to validate the competence of manufacturers in our organization in order to determine the best option. In this case, Check Point is the best option for us.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Nov 25, 2025
Flag as inappropriate
PeerSpot user
Martin Ellmann - PeerSpot reviewer
Chief Executive Officer at a tech services company with 11-50 employees
Real User
Top 5
Aug 9, 2024
Helps to connect various locations worldwide through VPN
Pros and Cons
  • "Our company used Check Point Infinity to connect various locations worldwide through VPN, specifically using IPsec, rather than for cybersecurity. We implemented it in on-premises networks to collect data in data centers from different locations."
  • "The solution is expensive."

What is our primary use case?

Our company used Check Point Infinity to connect various locations worldwide through VPN, specifically using IPsec, rather than for cybersecurity. We implemented it in on-premises networks to collect data in data centers from different locations.

What needs improvement?

The solution is expensive.

What do I think about the stability of the solution?

The tool is 100 percent stable. 

What do I think about the scalability of the solution?

Check Point Infinity is scalable. 

How was the initial setup?

The initial deployment took about a month, subsequent deployments were much faster, typically taking only a few days.

What's my experience with pricing, setup cost, and licensing?

The solution's  price is quite high, and the licensing model requires extra licenses for various features like SD-WAN.

What other advice do I have?

The tool is one of the most secure and stable products, with clear administration. I rate the overall product an eight out of ten. 

I recommend Check Point Infinity to others, especially if they aren't planning to use Fortinet or Palo Alto. All three solutions—Check Point Infinity, Fortinet, and Palo Alto—offer similar levels of security. However, one thing to consider is that the tool's licensing can be expensive and complex. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Systems Engineer at a manufacturing company with 10,001+ employees
Real User
Aug 11, 2023
Stable platform with good technical support services
Pros and Cons
  • "It is a scalable product."
  • "Check Point Infinity is not compatible with Windows 8."

What is most valuable?

It is a good tool. If we plan to change the password, we don't have to change the MX Points or SPF settings, as it works with Microsoft 365. It helps us prevent losing emails.

What needs improvement?

Check Point Infinity is not compatible with Windows 8.

For how long have I used the solution?

We have been using Check Point Infinity for two months. We did a POC for it.

What do I think about the stability of the solution?

It is a stable product. 

What do I think about the scalability of the solution?

It is a scalable product.

How are customer service and support?

The technical support services are good. We reach them regarding technical errors. They reply with the solutions in a few hours.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup process is complex.

What's my experience with pricing, setup cost, and licensing?

The product has good pricing considering the features and a global approach. I rate its pricing an eight out of ten.

What other advice do I have?

I rate Check Point Infinity a nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Top 5
Feb 20, 2023
Great infinity portal, modern, intuitive.
Pros and Cons
  • "New Check Point technologies can be found via this portal."
  • "The portal is provisioned in AWS. They should improve the cloud to make it faster."

What is our primary use case?

Our vendor told us about the solution. It was not required to use a management server since this portal provided the same service of free or licensed with the same logic already obtained from our GWs.             

How has it helped my organization?

Check Point Infinity Portal has given us an excellent complete solution where we can use many security plugins integrated into a single console and is providing that centralized security environment that all companies look for, including logs, monitoring, and security from the same part.

This portal is extremely intuitive as well as versatile and accessible from anywhere, providing all this control and business security in an easy way.

New Check Point technologies can be found via this portal.

Check Point Infinity is a great tool.

What is most valuable?

One of the most important features is the simple access. It's easy from anywhere, it's safe, and you can even use MFA to have a security layer for administrator users.

It is a centralized portal that provides all the features required for cloud environments, to manage our gateways developed in Microsoft Azure.

This portal also has an incredible availability since I've been using it I haven't had log in problems or service outages, quite useful to integrate all the new products.

Its costs are quite accessible.

What needs improvement?

In general, Check Point can improve its documentation. Sometimes they are very old. They could include more examples to guide customers in their implementations.

I have noticed that new technologies are more difficult to find guides. Without them, the objective to implement them correctly is not always achieved.

On the other hand, I think it is good to improve the support service since it is somewhat slow for cloud issues, they are resolved, but after several weeks, I think the solution SLA should be improved.

The portal is provisioned in AWS. They should improve the cloud to make it faster.

For how long have I used the solution?

Check Point Infinity is a completely innovative security solution that we have used for the administrative use of both Check Point Harmony and Check Point SmartCloud to manage our gateways. It is a solution that does not use a server provisioned by the client. It is located in a web portal in which you can incorporate many of these features like the ones we currently use. We have been using it for more than two years.

Which solution did I use previously and why did I switch?

We did not previously use a solution as complete as Check Point Infinity Portal.

What's my experience with pricing, setup cost, and licensing?

It is important to have access to licensing consultations with a direct Check Point vendor to determine needs. In addition, the costs are not always public, which is why it is very helpful to have someone to assist.

Which other solutions did I evaluate?

We have previously evaluated other technologies and manufacturers. However, the most complete is Check Point.

What other advice do I have?

I recommend this security tool. However, it is important to validate with your Check Point partner if it fits your business needs.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Kabelo Lamola - PeerSpot reviewer
Cyber Security trainee at a tech consulting company with 1-10 employees
Real User
Sep 15, 2022
Simple navigation, flexible scalability, and excellent support
Pros and Cons
  • "The most valuable feature of Check Point Infinity is the ease of use and navigation."
  • "Check Point Infinity price could improve."

What is our primary use case?

Check Point Infinity is used to protect information that is moved to the cloud. For example, when you upload your documents to the cloud wherever you are, that document can be encrypted so that no one can access it outside that domain. If they try to impersonate a user they won't be able to access it. There is verification that takes place if they are requesting to access a document with a password and a username to gain access.

What is most valuable?

The most valuable feature of Check Point Infinity is the ease of use and navigation.

What needs improvement?

Check Point Infinity price could improve.

For how long have I used the solution?

I have been using Check Point Infinity for approximately one year.

What do I think about the stability of the solution?

Check Point Infinity is stable.

What do I think about the scalability of the solution?

The scalability of Check Point Infinity is good. If you want to scale the capacity it is easy to do, it is flexible.

We have approximately 50 people using this solution in my company. We have plans to increase the usage.

How are customer service and support?

I have used the support from the technical support and they are good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used another solution prior to Check Point Infinity.

How was the initial setup?

The initial setup of Check Point Infinity is straightforward. I had a few challenges with my system but the time it should take to implement is approximately less than one hour.

What about the implementation team?

The implementation of the solution can be done in-house.

What's my experience with pricing, setup cost, and licensing?

The pricing of Check Point Infinity could be better. There is a license needed to use the solution and we pay annually.

What other advice do I have?

I recommend this solution to others.

I rate Check Point Infinity a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Senior Network/Security Engineer at a computer software company with 501-1,000 employees
Real User
Aug 26, 2020
Offers a unified security approach that provides full control over users and what they can do
Pros and Cons
  • "We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure."
  • "I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

How has it helped my organization?

The "Infinity" is not some standalone security solution, but the way you plan and implement the whole security infrastructure of your company. It contains all the modern components from Check Point. 

In our company, we use the hardware appliances, Next-Generation Firewalls, with a bunch of blades activated (DLP, IPS, VPN, etc.) to protect the data centers. Our data centers are controlled by the Check Point Security management, with the current version being R80.10. These are the basic building blocks of Check Point Infinity, and they work just great together. They also allow for the future extension and we are thinking about adding the Anti-DDOS protection on the edge of our environments. 

We are fully satisfied with the abilities it provides and the general approach of the Check Point solutions.

What is most valuable?

The Check Point Infinity architecture is the unified approach for building the unified security infrastructure of our company. I like that it covers all the pieces of the modern enterprise organization security needs including offices and data centers, public cloud environments, and the interconnects between them. It also protects end-user devices such as laptops, smartphones, and tablets.

We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure. I also like that all of the components are tightly integrated and there is a single endpoint to control all the elements. This is called the Smart Console.

What needs improvement?

Even though we have had several support cases opened for the components of the Check Point Infinity architecture, as an administrator, I'm satisfied with the solution and the abilities it provides. I can't describe any disadvantages at the moment, except for the overall price of purchasing and maintaining the entire set of components.

I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain. Maintenance requires that the licenses and the support services be prolonged regularly.

Alternatively, they should create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers.

For how long have I used the solution?

We have been using the Check Point Infinity for about three years, starting in late 2017.

What do I think about the stability of the solution?

All of the components in Check Point Infinity are mature and stable and we have not encountered any issue with that.

What do I think about the scalability of the solution?

The solution scales well with the hardware we have, and we see that scalability, the Active-Active HA mode, doesn't affect the overall performance much after activation.

How are customer service and technical support?

We have had several support cases opened, but none of them were connected with the Check Point Mobile Access Software Blade. Some of the issues were resolved by installing the latest recommended JumoHotfix, whereas some required additional configuration at the OS kernel level.

The longest issue took about one month to be resolved, which we consider too long.

Which solution did I use previously and why did I switch?

We have not used any solution of this kind before.

How was the initial setup?

The setup was straightforward. The configuration was easy and understandable, and we relied heavily on built-in objects and groups.

What about the implementation team?

Our deployment was completed by our in-house team. We have a Check Point Certified engineer working in the engineering team.

What's my experience with pricing, setup cost, and licensing?

Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.

Which other solutions did I evaluate?

We decided to stick to the Check Point Infinity after the demo with the vendor.

What other advice do I have?

The Check Point Infinity security architecture is a robust and modern security solution for organizations of any size, but make sure that you have a dedicated budget to maintain it. It is really not cheap.

Also, it is better to have a dedicated and certified Check Point specialist in your engineering team, since the solution is complex.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Infinity Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2025
Buyer's Guide
Download our free Check Point Infinity Report and get advice and tips from experienced pros sharing their opinions.