Try our new research platform with insights from 80,000+ expert users

Check Point Infinity vs Check Point SandBlast Network comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Infinity
Ranking in Advanced Threat Protection (ATP)
13th
Average Rating
8.6
Reviews Sentiment
7.4
Number of Reviews
28
Ranking in other categories
AI-Powered Cybersecurity Platforms (8th)
Check Point SandBlast Network
Ranking in Advanced Threat Protection (ATP)
10th
Average Rating
8.4
Reviews Sentiment
7.4
Number of Reviews
37
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2025, in the Advanced Threat Protection (ATP) category, the mindshare of Check Point Infinity is 1.8%, up from 0.7% compared to the previous year. The mindshare of Check Point SandBlast Network is 5.7%, up from 5.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP)
 

Featured Reviews

Ashish Upadhyay - PeerSpot reviewer
Provide unified threat prevention and response across our entire decentralized finance system
While Check Point Infinity offers a robust security operations platform, it could benefit from improvements in several areas. Firstly, the platform's pricing structure can be complex, which might be prohibitive for smaller businesses, limiting its accessibility. Simplifying the pricing model or offering more flexible pricing options could make Check Point Infinity more appealing to a wider range of organizations. Secondly, alert fatigue is a common issue with platforms that have strong detection capabilities. Implementing more filtering and prioritization mechanisms can help address this issue, ensuring that security teams can focus on the most critical threats. These are the areas where I believe there's room for improvement. In future releases, I would like to add more integration features. The ability to integrate seamlessly with more third-party applications would make it more customizable for our needs and simplify the integration process. This would improve our overall threat detection capabilities.
GaneshKhutwad - PeerSpot reviewer
Provides advanced threat prevention and utilizes geographic-based policies to mitigate attacks
Check Point offers three types of support: Gold, Platinum, and Diamond. The level of support you receive should be based on the criticality of the issue, not solely on your client's support tier. While there are established support levels, I have experienced instances where the support provided was not categorized as Gold, Platinum, or Diamond but rather a standard support level. In such cases, the response times were slower, and getting support personnel on the call was more difficult.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The tool's most valuable feature for threat prevention is the encryption alarm. I find the centralized management console, including the log analyzer and reports in Check Point Infinity, extremely beneficial for enhancing security and operations efficiency in our enterprise. I would rate it a perfect ten out of ten, as it effectively helps us analyze logs, and detect potential attacks."
"The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."
"Check Point Infinity offers a multi-layered security approach that enhances our IT security environment."
"Infinity is a technical console where we have to log in, and we can navigate to all the products very easily because it is written in a normal installation. People who know about the product can click and take care of their activity."
"A notable aspect that I appreciate is their ongoing effort to redesign the portal, giving it a fresh and centralized appearance."
"Powerful cyber security functionalities track workflows to block all threats that may arise and affect the workflow chain."
"The most valuable feature of Check Point Infinity is the ease of use and navigation."
"Check Point Infinity's threat prevention capabilities benefitted our organization."
"The main feature of the solution is that it protects against malicious threats from the outside."
"The forensics reports and the ability to sandbox malware are its most valuable features."
"It seems like it works all the time. We have never had an issue. We have never had something go undetected, anything major. All in all, it works pretty well."
"When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company."
"It has caught some harmful attachments and downloads."
"It saves time with us trying to do the analysis. We use it to try to find out how something got into the network. We use it to stop something before it ever gets in."
"The technology is impressive in general."
"One of its characteristics that we liked the most was its analysis and emulation of activities in the emails since it manages to review them and inspect them if they have an infected attachment."
 

Cons

"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"There is an issue with high agent size, which impacts performance."
"The tool's technical support lags."
"We have had some performance issues. Because of this, we had to redirect traffic to be analyzed by other appliances."
"I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity."
"Check Point Infinity's web application is sometimes a little slow."
"The management console has given us some trouble, and the documentation is a little bit rigid in its solution paths."
"We need improvement around the Smart-1 cloud solution."
"Sometimes, Check Point Sandblast requires more resources, which impacts network performance if it has been deployed with limited resources."
"When you have to scan emails that come with attachments, it takes a long time to examine them, which causes other emails not to be scanned, which can cause some danger to our organization."
"At the support level, they could improve the attention times and have the resolution of cases happen a little faster."
"I would like for them to improve the visibility in the product."
"I think Check Point provides standard time which ideally most other vendors take to identify behaviors of a file by sending them into a sandbox environment for inspection."
"I would like if it could emulate bigger files and somehow improve this usability. I don't know if this would be possible. However, if it was able to scan or emulate bigger files, then it would be safer for a company using it."
"Using it in the beginning was difficult because I had never used anything similar. In terms of navigating the UI, it was all not too bad, but there is definitely a learning curve."
"EDR and EPM solutions like Carbon Black or CyberArk have integrations with the cloud version of Sandblast, however, there must be on-premise Sandblast options also."
 

Pricing and Cost Advice

"The pricing of Check Point Infinity could be better. There is a license needed to use the solution and we pay annually."
"The solution's price is quite high, and the licensing model requires extra licenses for various features like SD-WAN."
"While the initial payment might be perceived as relatively higher, the absence of hidden supplementing charges contributes to a straightforward and clear pricing model. The pricing is cheap and moderate."
"The product has good pricing considering the features and a global approach."
"Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."
"The flexibility in pricing is advantageous, and being a special partner allows for negotiating special rates based on the project requirements."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"When it comes to price, the paramount consideration is the strength of the security. If the security measures provided by the product, such as Check Point Infinity, are robust and meet our requirements, price becomes a secondary concern."
"The product's cost is high."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"We have seen ROI."
"The pricing is quite effective, not excessively high. On a scale of one to ten, where ten is the highest price, I rate the pricing a nine."
"The cost is not significantly high and it can be negotiated during any purchase of NGFW."
"We would like to try the Threat Extraction blade, but you need to buy a license. Check Point is expensive. I would like to buy things, but I would need the funding."
"I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market."
"The cost of Check Point SandBlast Network is annually, and there is only a standard license."
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
850,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
14%
Government
8%
Comms Service Provider
6%
Financial Services Firm
15%
Computer Software Company
14%
Government
11%
Energy/Utilities Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Infinity?
Check Point Infinity's threat prevention capabilities benefitted our organization.
What needs improvement with Check Point Infinity?
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity. This would help users to easily understand and deploy the so...
What is your primary use case for Check Point Infinity?
We have been deploying Check Point Infinity as a new technology for security purposes with our biggest customer in Ethiopia. It serves to secure endpoints and protect from intrusion and various thr...
What do you like most about Check Point SandBlast Network?
The solution can detect and prevent attacks that may be encrypted.
What needs improvement with Check Point SandBlast Network?
The cost is a little bit high-end, and you need to get precise performance metrics in order to get the correct size. Improvements are required in both areas of the tool.
 

Also Known As

R80, Infinity
No data available
 

Overview

 

Sample Customers

Edel AG
Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media
Find out what your peers are saying about Check Point Infinity vs. Check Point SandBlast Network and other solutions. Updated: April 2025.
850,028 professionals have used our research since 2012.