Check Point Infinity Valuable Features

Nuno Faria - PeerSpot reviewer
Managing Partner at NCSO

I have a positive history with Check Point, having worked with their firewall models since the nineties. A notable aspect that I appreciate is their ongoing effort to redesign the portal, giving it a fresh and centralized appearance. This is particularly significant as the transition from Check Point on-premises solutions to the cloud.

View full review »
Ashish Upadhyay - PeerSpot reviewer
Founder at BlockMosiac

Check Point Infinity has significantly benefited in providing robust security information for deploying recent live applications with advanced security features. Bootstrapping data with Infinity mitigates issues associated with traditional centralized systems. Implementing the solution streamlines internal processes, offering a transparent and tamper-resistant environment for transaction and data management. The tool's scalability has allowed the organization to adapt to the market's growing demands.

One of the most valuable and distinctive features of Check Point Infinity is its dynamic adaptive consensus mechanism. This innovative feature adapts the consensus algorithm based on centralized applications' specific needs and characteristics within the enterprise ecosystem. Unlike traditional one-size-fits-all models, the adaptive consensus mechanism optimizes performance by dynamically adjusting the consensus algorithm, considering transaction volume, network latency, and resource availability factors. This ensures the network operates at peak efficiency even during high-demand network conditions.

The adaptability enhances the solution's scalability and allows organizations to tailor the consensus mechanism to match the unique requirements of their business processes. Whether prioritizing speed, security, or energy efficiency, the adaptive consensus mechanism ensures that the blockchain network optimally aligns with each decentralized application's specific goals and characteristics.

The product has improved security. The platform's robust architecture and consensus mechanism create a resilient and secure environment. Continuous updates and adherence further enhance security. Additionally, the tool's implementation node work has led to a 25 percent increase in operational efficiency.

View full review »
Hendrik-Du Plooy - PeerSpot reviewer
Regional Manager at Saber1

The most valuable features of the solution stem from factors like ease of use, visibility, and cost to the enterprise.

View full review »
Buyer's Guide
Check Point Infinity
April 2024
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.
Prateek Agarwal - PeerSpot reviewer
Manager at Indian Institute of Management Visakhapatnam

The product, a cloud-based unified security solution, facilitates the automation of security threat detection and vulnerability management across various endpoints, including mobile and IoT devices. A notable feature is the centralized administration, allowing monitoring of existing solutions from web and mobile devices in a unified interface. As a cloud-native platform, it is fully managed by Check Point, eliminating the need for manual upgrades or maintenance. The solution also excels in enhancing application performance for a better end-user experience.

We don't need to worry about manual patch upgrades or maintenance tasks. The unified dashboard provides a view of security progress, threats, ransomware, and malware checks. The solution offers clear analysis and reports, guiding us on the necessary actions against identified vulnerabilities.

The central management console enhances security operations efficiency by eliminating the need for high technical resources. It can be easily maintained by non-technical personnel after training. The unified solution offers a dashboard easily understood by senior management, including the CEO. This allows for presenting reports on security threats and vulnerabilities at any moment, facilitating quick financial approvals for new solutions or further actions in response to day-to-day challenges.

One noteworthy incident is when a user sends an email containing sensitive financial information, including addresses, bank account details, mobile numbers, and email IDs. We received a notification about the sensitive information in the email. This prompt ensured that we did not share confidential data with third parties. Check Point initially blocked the message, and after reviewing it, we could unblock it and respond appropriately.

View full review »
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited

You can tell this product's standards have gone through heavy validation and testing; it's always verifying access from all resources at all times. If a breach happens, it minimizes its impact, which is a determining factor of its efficiency (worst-case scenario behavior), and incorporates the data to strategize on the best possible responses with the most accurate neutralizing actions. It provides fantastic visibility of security incidents through deconstructing and dissecting the threat's infection protocol.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security, those characteristics that it has that different cover devices regardless of the brand, also to help us maintain full control of our employees' devices and thus be able to monitor and ensure more and more security breaches. Infinity helped us a lot in real-time threat prevention, and with continuous updates, it is one of the most important points of all Check Point solutions.

View full review »
Erick Chinchilla Mena - PeerSpot reviewer
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana

Everyone who uses Check Point products has been realizing that it has been innovating in immense ways. Before we had the perimeter network administration teams in one place, with the management of mobile devices or web browsing handled separately. Today, we have them in a centralized place and are managing (in different tabs) the security of each of its devices, branches, clouds, etc. It is a more efficient way to take advantage of all the computing power and intelligence behind it. And it has additional AI.

View full review »
MH
Systems Engineer at PGE

It is a good tool. If we plan to change the password, we don't have to change the MX Points or SPF settings, as it works with Microsoft 365. It helps us prevent losing emails.

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

The portal gives us many advantages. 

It has great internal analytics, which contains artificial intelligence. It has the ability to be managed centrally and acquire and consume computing power from the cloud. This means that we will make a payment for the use of the services and a payment for the licensing. Additionally, computing power doesn't all come in a single license. We can take a single product and enable and facilitate it as necessary, making all of these capabilities and features available as needed. 

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

For me, one of the best features of Check Point Infinity is to be able to have the possibility of emulating the activity of attached files with malicious content in such a short time. This capacity is of great value. Many times we want to know what an attack does and how an attack is exploited on our computers. With what we have learned from emulation we can reinforce our security lines or bases. You can learn a lot while always staying protected.

View full review »
CZ
Java Developer at EROAD

The security services that are provided in the organization have given departments an opportunity to focus more on productive business activities. 

The complete security set of tools enables each sector to focus on threats that are directly proportional to engaged programs. 

Powerful cyber security functionalities track workflows to block all threats that may arise and affect the workflow chain. 

It has integrated all the components in the organization with the central control system that provides comprehensive reports on work processes.

View full review »
BD
Senior Manager at a financial services firm with 10,001+ employees

The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles.

Zero Trust Security, Check Point Infinity is an architecture provided by Check Point that includes a solution for protecting organizations at different levels. 

Zero Trust Networks: The Check Point Security Gateway enables micro-segmentation across the organization's network. Integration with Identity awareness and Application Control enables policy enforcement at a granular level.

Zero Trust Workloads: Protect workloads hosted in private and public clouds, enforce compliance, detect and remediate misconfiguration.

Zero Trust People: Identity awareness enables granting access to data for authorized users with SSO and MFA.

Zero Trust Devices: Sandblast Agent Endpoint and Check Point Sandblast Mobile protect employees' mobile devices and workstations from advanced attacks, Zero-day malware, malicious app installation, and more. Network-based threat prevention protects devices from threats that are coming from the network and vice versa.

Zero Trust Data: Protect data by performing full hard disk encryption on endpoint and external media encryption on all removable storage media. Data shared to external partners over the Internet is encrypted by site-to-site VPN and client-to-site VPN.

Visibility and Analytics: The Check Point attack dashboard allows for immediate response to security incidents and provides real-time forensics for investigating events.

Automation and Orchestration: Security architecture integration with organization border IT environment enhances speed and agility, incident response, policy accuracy, and task delegation.

View full review »
OP
Senior Network/Security Engineer at Skywind Group

The Check Point Infinity architecture is the unified approach for building the unified security infrastructure of our company. I like that it covers all the pieces of the modern enterprise organization security needs including offices and data centers, public cloud environments, and the interconnects between them. It also protects end-user devices such as laptops, smartphones, and tablets.

We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure. I also like that all of the components are tightly integrated and there is a single endpoint to control all the elements. This is called the Smart Console.

View full review »
Michael Mugagga - PeerSpot reviewer
Systems Integrator at a tech services company with 11-50 employees

The sandblast threat emulation is great. We are able to visualize the extent of specific threats without necessarily having them deployed in our environment. The Sandbox feature is able to virtualize an environment that can mirror what we have in the internal environment.

The quality of Service for different traffic types is excellent. We are able to prioritize business-critical traffic over other types of traffic like streaming.

Artificial intelligence threat profiling has helped a lot in detecting and protecting the internal network from zero-day, DNS, and DDoS attacks. 

View full review »
LD
Cloud Support at a tech company with 1-10 employees

One of the most important features is the simple access. It's easy from anywhere, it's safe, and you can even use MFA to have a security layer for administrator users.

It is a centralized portal that provides all the features required for cloud environments, to manage our gateways developed in Microsoft Azure.

This portal also has an incredible availability since I've been using it I haven't had log in problems or service outages, quite useful to integrate all the new products.

Its costs are quite accessible.

View full review »
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees

Check Point Infinity Portal achieved many of the company's requirements, including:

1- An easy and fast implementation of the portal.

2- Licensing is already included in some Check Point tools, such as the Check Point gateways.

3- Accessibility from anywhere.

4- Use of MFA to ensure the identity of the user.

5- An automated, modern, and simple portal for security administrators.

This is a very good management tool, which saves logs depending on the policy implemented from the beginning to have portal information that can be used later.

View full review »
NG
Support at a security firm with 51-200 employees

This web tool, or the web administration server included in the license, is really intuitive. We can add our environments and can configure and manage them easily which is why administrators are happy with this tool.

There are no additional costs, which is why it is really important for the company.

And finally, it is managed by Check Point in terms of access, availability, and security. Connecting to the portal is secure which is really providing the company with administration security.

View full review »
SK
Presales Engineer at Vincacyber

The detection rate is good. It also has personal management that provides all the details on one dashboard. Depending upon the requirements, you can customize the dashboard. The visibility part is also very good. It can customised. The reaction rate is good.

View full review »
BK
Technical Support at Hitachi Systems, Ltd.

The tool's most valuable feature for threat prevention is the encryption alarm. 
I find the centralized management console, including the log analyzer and reports in Check Point Infinity, extremely beneficial for enhancing security and operations efficiency in our enterprise. I would rate it a perfect ten out of ten, as it effectively helps us analyze logs,  and detect potential attacks. 

View full review »
Kabelo Lamola - PeerSpot reviewer
Cyber Security trainee at Chimera

The most valuable feature of Check Point Infinity is the ease of use and navigation.

View full review »
JH
Senior Network Engineer at a tech services company with 201-500 employees

The solution assures that we can manage all our other relevant related solutions from one place. Clients can manage everything - the data center firewall, the perimeter firewall, and the cloud, etc. They can have one single consolidated management that makes everything more visible and transparent from one place.

View full review »
Buyer's Guide
Check Point Infinity
April 2024
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.