IT Central Station is now PeerSpot: Here's why

Check Point Infinity vs Cisco Stealthwatch comparison

Cancel
You must select at least 2 products to compare!
Featured Review
Buyer's Guide
Advanced Threat Protection (ATP)
May 2022
Find out what your peers are saying about Palo Alto Networks, Morphisec, Microsoft and others in Advanced Threat Protection (ATP). Updated: May 2022.
607,127 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The basic features are okay and I'm satisfied with the Defender.""The most valuable feature of Microsoft Defender for Office 365 is the ease of use.""Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features.""The solution is very easy to use. All you have to do is to assign the license to the end-user and it's done. The customer will only have the feature activated, and the solution will monitor the emails to determine if they are a threat or not.""At the moment we are satisfied with this product. It's a stable, scalable, and resilient solution for us.""The good part is that you don't have to configure it, which is very convenient.""I would say that 90% of the spam and phishing attack emails get blocked right off the bat.""The risk level notifications are most valuable. We get to know what kind of intrusion or attack is there, and we can fix a problem on time."

More Microsoft Defender for Office 365 Pros →

"We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure.""The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles.""It is very easy to integrate new features."

More Check Point Infinity Pros →

"Cisco Stealthwatch has predefined alerts for different types of security issues that might happen in the network. Whether it's PCs or servers that are used for botnets or Bitcoin mining we receive the alerts automatically. This functionality is what we receive from the solution out of the box.""Great network monitoring, looking at anomaly detection and evaluation.""We find that Stealthwatch can detect the unseen.""It has definitely helped us improve our mean time to resolution on network issues.""It provides good visibility to the customers. People are still evaluating it, but it provides visibility and helps them to take action to remediate and mitigate the issues that are highlighted on the dashboard. It has good integration with the Cisco switching platform.""StealthWatch lets me see the ports running in and out and the country. It has excellent reporting, telemetry, and artificial intelligence features. With the telemetry, I can set thresholds to detect sudden changes and the alarms go through the PLC parts. I can see all the ports running on that trunk.""Overall, the implementation is very good.""If you are using Darktrace or NAC solutions you can integrate Stealthwatch."

More Cisco Stealthwatch Pros →

Cons
"There needs to be an improvement in integrating the product to work across multiple operating systems, and to have better support for non-Microsoft file types.""Microsoft Defender for Office 365 could improve by giving customers information on techniques to prevent threats. For example, information about best practices on how to protect their own devices against hackers and scammers, such as educational information or training. This would help others have a better understanding of cyber security. Additionally, there can be more security features added.""We are always looking for others tools to increase automation on tasks. There can be better integration with other solutions, such as PowerPoint and email.""This product's effectiveness could be improved, in terms of detecting unwanted spam or even malware between the emails, compared to other products.""We need a separate license and we don't know how to get the license that is required.""I'd like some additional features any product can give me to protect our environment in a better way.""It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers.""Configuration requires going to a lot of places rather than just accessing one tab."

More Microsoft Defender for Office 365 Cons →

"The licensing model for Check Point Infinity is not clear.""They can improve the latency of the portal.""I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."

More Check Point Infinity Cons →

"We determined that Stealthwatch wouldn't provide the machine learning model that we required.""It's a good solid solution but integration with Network Access Control products with Cisco ISE would be good.""Cisco Stealthwatch can improve by having bundled packages for popular add-ons. It would be a lot easier for people implementing it, have let's say a better way to use the product.""Many of these tools require extensive on-premises hardware to run.""We would like the solution to make more advances in the way that Extreme Networks has been doing.""It's not great as a standalone solution.""There could be better integration on the programming side, which uses Python. StealthWatch could provide a template for Python to manage the switches. For example, it would be nice if StealthWatch bounced a port automatically it detected something anomalous.""Stealthwatch is still maturing in AI. It uses artificial intelligence for predictions, but AI still needs to mature. It is in a phase where you get 95% correct detection. As its AI engine learns more, it will become more accurate. This is applicable to all the devices that are using AI because they support both supervised and unsupervised machine learning. The accuracy in the case of supervised machine learning is dependent on the data you feed into the box. The accuracy in the case of unsupervised machine learning is dependent on the algorithm. The algorithm matures depending on retrospective learning, and this is how it is able to detect zero-day attacks."

More Cisco Stealthwatch Cons →

Pricing and Cost Advice
  • "It's a user-base subscription."
  • "From the pricing point of view, like any other product in the market, there is scope for negotiation."
  • "Defender is a little bit more expensive as compared to others. We are in the manufacturing environment. So, we don't have a high budget for all of our endpoint devices. Its cost is a major concern for us."
  • "For licensing, it's usually a yearly package for customers who are subscribed to Office 365, but they can also pay on a monthly basis."
  • "Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
  • "Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
  • More Microsoft Defender for Office 365 Pricing and Cost Advice →

  • "Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
  • "Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."
  • More Check Point Infinity Pricing and Cost Advice →

  • "This is an expensive product. We have quit paying for support because we don't want to have to upgrade it and keep paying for it."
  • "It has a subscription model. There is yearly support, and there is also three-year support. It depends on what the customers want."
  • "There are additional licenses needed for the number of so-called network flows. It's hard to plan the number of flows you need in the network, this is a problem. The price of the Cisco Stealthwatch is relatively inexpensive"
  • More Cisco Stealthwatch Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
    607,127 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable feature of Microsoft Defender for Office 365 is the ease of use.
    Top Answer:Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system.
    Top Answer:Microsoft Defender for Office 365 could improve by giving customers information on techniques to prevent threats. For… more »
    Top Answer:It is very easy to integrate new features.
    Top Answer:They can improve the latency of the portal. Sometimes it takes a while to respond. It is not a good image for the… more »
    Top Answer:We have used the Infinity Check Point portal to use two edges, Harmony Connect, and the SmartConsole. We have managed… more »
    Top Answer:StealthWatch lets me see the ports running in and out and the country. It has excellent reporting, telemetry, and… more »
    Top Answer:We have a three-year contract with Cisco, including 24/7 online support. There are no additional costs.
    Top Answer:There could be better integration on the programming side, which uses Python. StealthWatch could provide a template for… more »
    Comparisons
    Also Known As
    MS Defender for Office 365
    R80, Infinity
    Cisco Stealthwatch Enterprise, Lancope StealthWatch
    Learn More
    Overview

    Microsoft Defender for Office 365 protects all of Office 365 against advanced threats like business email compromise and credential phishing, and automatically investigates and remediates attacks. With Defender for O365 you get Integrated threat protection for all of Office 365 that gives you:

    - Native protection for Office 365 with built-in protection that simplifies administration, lowers total cost of ownership, and boosts productivity.

    - Unparalleled scale and effectiveness with powerful automated workflows to improve SecOps efficiency.

    - A complete solution for collaboration that protects you from attacks across the kill chain.

    To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity

    Cisco Stealthwatch uses NetFlow to provide visibility across the network, data center, branch offices, and cloud. Its advanced security analytics uncover stealthy attacks on the extended network. Stealthwatch helps you use your existing network as a security sensor and enforcer to dramatically improve your threat defense.

    Offer
    Learn more about Microsoft Defender for Office 365
    Learn more about Check Point Infinity
    Learn more about Cisco Stealthwatch
    Sample Customers
    Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
    Edel AG
    Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
    Top Industries
    REVIEWERS
    Manufacturing Company29%
    Performing Arts14%
    Logistics Company14%
    Financial Services Firm14%
    VISITORS READING REVIEWS
    Computer Software Company23%
    Comms Service Provider18%
    Government7%
    Financial Services Firm6%
    VISITORS READING REVIEWS
    Computer Software Company45%
    Comms Service Provider22%
    Financial Services Firm7%
    Insurance Company4%
    REVIEWERS
    Healthcare Company22%
    Financial Services Firm17%
    Comms Service Provider7%
    Manufacturing Company7%
    VISITORS READING REVIEWS
    Comms Service Provider33%
    Computer Software Company19%
    Government7%
    Financial Services Firm6%
    Company Size
    REVIEWERS
    Small Business31%
    Midsize Enterprise23%
    Large Enterprise46%
    VISITORS READING REVIEWS
    Small Business26%
    Midsize Enterprise19%
    Large Enterprise55%
    REVIEWERS
    Small Business40%
    Midsize Enterprise30%
    Large Enterprise30%
    VISITORS READING REVIEWS
    Small Business26%
    Midsize Enterprise29%
    Large Enterprise45%
    REVIEWERS
    Small Business13%
    Midsize Enterprise10%
    Large Enterprise77%
    VISITORS READING REVIEWS
    Small Business16%
    Midsize Enterprise14%
    Large Enterprise70%
    Buyer's Guide
    Advanced Threat Protection (ATP)
    May 2022
    Find out what your peers are saying about Palo Alto Networks, Morphisec, Microsoft and others in Advanced Threat Protection (ATP). Updated: May 2022.
    607,127 professionals have used our research since 2012.

    Check Point Infinity is ranked 10th in Advanced Threat Protection (ATP) with 3 reviews while Cisco Stealthwatch is ranked 4th in Network Traffic Analysis (NTA) with 10 reviews. Check Point Infinity is rated 9.0, while Cisco Stealthwatch is rated 8.2. The top reviewer of Check Point Infinity writes "Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network". On the other hand, the top reviewer of Cisco Stealthwatch writes "Provides valuable security knowledge and helps us improve network performance". Check Point Infinity is most compared with CyberArk Privileged Access Manager, Palo Alto Networks VM-Series, Palo Alto Networks WildFire and Skybox Security Suite, whereas Cisco Stealthwatch is most compared with Darktrace, SolarWinds NetFlow Traffic Analyzer, ThousandEyes, Palo Alto Networks Threat Prevention and Vectra AI.

    We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.