Try our new research platform with insights from 80,000+ expert users

Check Point Infinity Valuable Features

NareshKumar9 - PeerSpot reviewer
Team Lead, Information Technology at Tonbo Imaging

These features of Check Point Infinity help me stop real security issues effectively. It has stopped a lot of potential threats for me because, with my previous firewall, which I don't want to disclose, I didn't have the same feasibility to see each device categorized easily. Whenever a device gets infected, Check Point Infinity immediately alerts me with a pop-up simply showing the IP address. From there, I can quickly identify whether the device is a mobile, computer, laptop, or smartwatch to block it efficiently, thus keeping my internal network safe and secure.

The best features that Check Point Infinity offers are its ease of configuration and smooth user experience. I find it very useful because I completed the configuration within two days, despite thinking it would be complicated compared to my previous firewall. I considered restoring my previous firewall backup, but since it was a different brand, I decided to start from scratch. I thought configuring each user's laptop and applying patches would be difficult, but Check Point Infinity made it simple, allowing me to quickly set up local and remote VPNs. Identifying glitches and options is easy, unlike other firewalls, making Check Point Infinity very user-friendly.

There is a reporting alert feature that I find useful in Check Point Infinity. Whenever there are any glitches, such as DOS or DNS activities from internal sources, Check Point Infinity easily identifies those issues and quickly alerts me as the admin through pop-ups, email, and text messages. I can log into Check Point Infinity and block the device immediately when alerted.

Check Point Infinity has positively impacted my organization by significantly reducing incidents. It has defended us against numerous threats and malware, providing immediate alerts when a device is infected. Whenever a threat is identified, I receive a pop-up notification stating that specific devices are infected, and affected IPs automatically get thrown onto the block list for easy identification and actionable responses.

I estimate that since starting with Check Point Infinity, I have received over a hundred alerts for threat protections and malware incidents. Whenever these alerts come through, I block the particular IP, ensuring my internet and network stay safe and secure.

I have seen a return on investment with Check Point Infinity as it prevents costly incidents effectively. The device identifies any impending threat and alerts me immediately, allowing me to log in to the GUI and take necessary actions quickly. This process saves a lot of time and reduces the number of incidents we experience, proving to be invaluable for a system admin.

View full review »
CM
Advisor at Rossell Techsys (Division of Rossell India Limited)

The Threat Prevention technology in Check Point Infinity has enhanced my security posture; that's very great, excellent, and helpful.

Check Point Infinity provides financial benefits and cost savings. Without this, our business would not continue at all, as our business depends on this. If we cannot keep our data secret, all our customers will be lost.

View full review »
Muluken Mekonene - PeerSpot reviewer
Network Engineer at Insa

Check Point Infinity offers a multi-layered security approach that enhances our IT security environment. It provides tracking protection, intrusion prevention, and supports mobile users efficiently. 

The AI integration helps in guiding configurations and installations, making the process smoother. 

Additionally, Check Point is a supportive vendor, offering notable assistance and knowledge sharing during installations and configurations.

View full review »
Buyer's Guide
Check Point Infinity
July 2025
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
860,632 professionals have used our research since 2012.
Pratik-Savla - PeerSpot reviewer
Security and Compliance Architect at a manufacturing company with 1,001-5,000 employees

The whole process of consolidation, centralization, and obtaining a single pane of glass view into the current state, necessary changes, and areas for improvement.

Check Point Infinity has significantly improved our workflow within the ecosystem, making processes smoother and more efficient. It hasn’t added unnecessary work; instead, it has streamlined operations and simplified tasks.

View full review »
LP
PM at SECURE SOFT

One of the valuable aspects of Check Point Infinity is that I can use one unified portal for the administration of all these tools. I can integrate other tools from other brands too, to consolidate and unify cybersecurity strategies. Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.

View full review »
Nuno Faria - PeerSpot reviewer
Managing Partner at NCSO

I have a positive history with Check Point, having worked with their firewall models since the nineties. A notable aspect that I appreciate is their ongoing effort to redesign the portal, giving it a fresh and centralized appearance. This is particularly significant as the transition from Check Point on-premises solutions to the cloud.

View full review »
Michael Mugagga - PeerSpot reviewer
Systems Integrator at Africa Dataedge

The sandblast threat emulation is great. We are able to visualize the extent of specific threats without necessarily having them deployed in our environment. The Sandbox feature is able to virtualize an environment that can mirror what we have in the internal environment.

The quality of Service for different traffic types is excellent. We are able to prioritize business-critical traffic over other types of traffic like streaming.

Artificial intelligence threat profiling has helped a lot in detecting and protecting the internal network from zero-day, DNS, and DDoS attacks. 

View full review »
Geraldo Freitas - PeerSpot reviewer
Analista de TI - suporte a redes e segurança at Tribunal de Contas da União

I like all the features because within the suite we use, it's sometimes hard to know exactly which features are being used and where they come from. 

But, the main feature is the integration with Active Directory, where you can allow or deny traffic based on users or groups of users from Active Directory.

View full review »
Hendrik-Du Plooy - PeerSpot reviewer
Regional Manager at Saber1

The most valuable features of the solution stem from factors like ease of use, visibility, and cost to the enterprise.

View full review »
Anuraj Nair - PeerSpot reviewer
Presales Engineer at SNSIN

Infinity is a technical console where we have to log in, and we can navigate to all the products very easily because it is written in a normal installation. People who know about the product can click and take care of their activity.

View full review »
MH
Systems Engineer at PGE

It is a good tool. If we plan to change the password, we don't have to change the MX Points or SPF settings, as it works with Microsoft 365. It helps us prevent losing emails.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security, those characteristics that it has that different cover devices regardless of the brand, also to help us maintain full control of our employees' devices and thus be able to monitor and ensure more and more security breaches. Infinity helped us a lot in real-time threat prevention, and with continuous updates, it is one of the most important points of all Check Point solutions.

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

The portal gives us many advantages. 

It has great internal analytics, which contains artificial intelligence. It has the ability to be managed centrally and acquire and consume computing power from the cloud. This means that we will make a payment for the use of the services and a payment for the licensing. Additionally, computing power doesn't all come in a single license. We can take a single product and enable and facilitate it as necessary, making all of these capabilities and features available as needed. 

View full review »
Erick Chinchilla Mena - PeerSpot reviewer
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana

Everyone who uses Check Point products has been realizing that it has been innovating in immense ways. Before we had the perimeter network administration teams in one place, with the management of mobile devices or web browsing handled separately. Today, we have them in a centralized place and are managing (in different tabs) the security of each of its devices, branches, clouds, etc. It is a more efficient way to take advantage of all the computing power and intelligence behind it. And it has additional AI.

View full review »
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited

You can tell this product's standards have gone through heavy validation and testing; it's always verifying access from all resources at all times. If a breach happens, it minimizes its impact, which is a determining factor of its efficiency (worst-case scenario behavior), and incorporates the data to strategize on the best possible responses with the most accurate neutralizing actions. It provides fantastic visibility of security incidents through deconstructing and dissecting the threat's infection protocol.

View full review »
SK
Presales Engineer at Vincacyber

The detection rate is good. It also has personal management that provides all the details on one dashboard. Depending upon the requirements, you can customize the dashboard. The visibility part is also very good. It can customised. The reaction rate is good.

View full review »
DH
Security IT at a tech services company with 51-200 employees

Check Point Infinity Portal achieved many of the company's requirements, including:

1- An easy and fast implementation of the portal.

2- Licensing is already included in some Check Point tools, such as the Check Point gateways.

3- Accessibility from anywhere.

4- Use of MFA to ensure the identity of the user.

5- An automated, modern, and simple portal for security administrators.

This is a very good management tool, which saves logs depending on the policy implemented from the beginning to have portal information that can be used later.

View full review »
reviewer2008407 - PeerSpot reviewer
Java Developer at EROAD

The security services that are provided in the organization have given departments an opportunity to focus more on productive business activities. 

The complete security set of tools enables each sector to focus on threats that are directly proportional to engaged programs. 

Powerful cyber security functionalities track workflows to block all threats that may arise and affect the workflow chain. 

It has integrated all the components in the organization with the central control system that provides comprehensive reports on work processes.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

For me, one of the best features of Check Point Infinity is to be able to have the possibility of emulating the activity of attached files with malicious content in such a short time. This capacity is of great value. Many times we want to know what an attack does and how an attack is exploited on our computers. With what we have learned from emulation we can reinforce our security lines or bases. You can learn a lot while always staying protected.

View full review »
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution

It's very easy to access and works fine for me. Centralizing the management of all our Check Point products in one place saves our team a ton of time.

Infinity is a platform rather than a specific security feature. It provides a central access point for our purchased Check Point products like Harmony Email, Harmony Connect, Harmony Browser, Harmony VPN, etc.

The unified management console enhances security operations. We manage all our products through a single console instead of needing to open separate interfaces for each one.

View full review »
LD
Cloud Support at a tech company with 1-10 employees

One of the most important features is the simple access. It's easy from anywhere, it's safe, and you can even use MFA to have a security layer for administrator users.

It is a centralized portal that provides all the features required for cloud environments, to manage our gateways developed in Microsoft Azure.

This portal also has an incredible availability since I've been using it I haven't had log in problems or service outages, quite useful to integrate all the new products.

Its costs are quite accessible.

View full review »
BD
Chief Information Security Officer at Abcl

The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles.

Zero Trust Security, Check Point Infinity is an architecture provided by Check Point that includes a solution for protecting organizations at different levels. 

Zero Trust Networks: The Check Point Security Gateway enables micro-segmentation across the organization's network. Integration with Identity awareness and Application Control enables policy enforcement at a granular level.

Zero Trust Workloads: Protect workloads hosted in private and public clouds, enforce compliance, detect and remediate misconfiguration.

Zero Trust People: Identity awareness enables granting access to data for authorized users with SSO and MFA.

Zero Trust Devices: Sandblast Agent Endpoint and Check Point Sandblast Mobile protect employees' mobile devices and workstations from advanced attacks, Zero-day malware, malicious app installation, and more. Network-based threat prevention protects devices from threats that are coming from the network and vice versa.

Zero Trust Data: Protect data by performing full hard disk encryption on endpoint and external media encryption on all removable storage media. Data shared to external partners over the Internet is encrypted by site-to-site VPN and client-to-site VPN.

Visibility and Analytics: The Check Point attack dashboard allows for immediate response to security incidents and provides real-time forensics for investigating events.

Automation and Orchestration: Security architecture integration with organization border IT environment enhances speed and agility, incident response, policy accuracy, and task delegation.

View full review »
BK
Technical Support at Hitachi Systems, Ltd.

The tool's most valuable feature for threat prevention is the encryption alarm. 
I find the centralized management console, including the log analyzer and reports in Check Point Infinity, extremely beneficial for enhancing security and operations efficiency in our enterprise. I would rate it a perfect ten out of ten, as it effectively helps us analyze logs,  and detect potential attacks. 

View full review »
NG
Support at a security firm with 51-200 employees

This web tool, or the web administration server included in the license, is really intuitive. We can add our environments and can configure and manage them easily which is why administrators are happy with this tool.

There are no additional costs, which is why it is really important for the company.

And finally, it is managed by Check Point in terms of access, availability, and security. Connecting to the portal is secure which is really providing the company with administration security.

View full review »
Kabelo Lamola - PeerSpot reviewer
Cyber Security trainee at Chimera

The most valuable feature of Check Point Infinity is the ease of use and navigation.

View full review »
OP
Senior Network/Security Engineer at Skywind Group

The Check Point Infinity architecture is the unified approach for building the unified security infrastructure of our company. I like that it covers all the pieces of the modern enterprise organization security needs including offices and data centers, public cloud environments, and the interconnects between them. It also protects end-user devices such as laptops, smartphones, and tablets.

We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure. I also like that all of the components are tightly integrated and there is a single endpoint to control all the elements. This is called the Smart Console.

View full review »
reviewer1301772 - PeerSpot reviewer
Senior Network Engineer at a tech services company with 201-500 employees

The solution assures that we can manage all our other relevant related solutions from one place. Clients can manage everything - the data center firewall, the perimeter firewall, and the cloud, etc. They can have one single consolidated management that makes everything more visible and transparent from one place.

View full review »
Buyer's Guide
Check Point Infinity
July 2025
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
860,632 professionals have used our research since 2012.