Check Point Infinity and Cortex XSIAM compete in the cybersecurity sector, each offering distinct advantages. Check Point Infinity holds an upper hand with its comprehensive security coverage and integrated management solutions.
Features: Check Point Infinity offers comprehensive security across data centers, clouds, and end-user devices. Its zero-trust principles and Smart Console management provide holistic protection. Cortex XSIAM utilizes a unified database for thorough threat detection with machine learning capabilities, enhancing forensic investigation and incident response.
Room for Improvement: Check Point Infinity's pricing model and technical support need refinement. Its licensing complexity and outdated documentation are concerns, alongside occasional support efficiency issues. Cortex XSIAM could enhance integration capabilities and support responsiveness, with noted performance issues when multiple tabs are open.
Ease of Deployment and Customer Service: Check Point Infinity supports on-premises, hybrid, and public cloud deployments, with reliable yet improvable customer support response times. Cortex XSIAM simplifies public cloud deployment, though there is a need for enhanced direct support materials to decrease external dependency.
Pricing and ROI: Check Point Infinity's complex pricing is seen as costly, though its comprehensive security features offer a 40-60% ROI. Cortex XSIAM is priced competitively with reasonable rates compared to alternatives, contributing to strong ROI with additional costs for specific add-ons.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
The technical support is excellent with quick response times.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
It is ineffective in terms of responding to basic queries and addressing future requirements.
The Palo Alto support team is fully responsive and helpful.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
Without proper integration, scaling up with more servers is meaningless.
Cortex XSIAM is highly scalable.
The product was easy to install and set up and worked right.
Overall, Cortex XSIAM is stable.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
If Check Point continues reforms of AI and takes more information from different origins, not only from its database but also from other brands, it can complete this information and make it stronger.
Cortex XSIAM needs improvements in terms of data onboarding, parsers, and third-party integration supports.
In terms of incident response automation, it is quite poor due to the lack of integration with all security tools, making manual intervention necessary.
Cortex could improve the detection and online resolution of security vulnerabilities.
The pricing is good as Check Point Infinity includes many tools and details that others might not have.
The product, as supported by Check Point, offers invaluable assistance for ease of deployment.
The product is very expensive.
The licensing cost of Cortex XSIAM is more or less the same as Splunk, making it quite expensive compared to other tools.
The first impression is that XSIAM would be more expensive than others we tried.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
Check Point Infinity offers a multi-layered security approach that enhances our IT security environment.
One of the valued aspects of the product is its use of artificial intelligence to detect security vulnerabilities.
Cortex XSIAM allows us to onboard almost every device, whether they are on-prem or on SaaS.
The flexibility for creating manual workflows stands out.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
Cortex XSIAM acts as a critical element for SOC foundations, integrating SIEM and EDR capabilities, valued for threat detection and seamless security orchestration with Palo Alto Networks products.
Organizations find Cortex XSIAM beneficial for SOC foundations due to its capability to integrate SIEM and EDR tools, facilitating data collection, detection, and response. It connects with third-party data sources while reducing management effort and offering cost-effective alternatives to competitors like CrowdStrike and Trend Micro. Featuring automation and integration with Palo Alto Networks products, Cortex XSIAM enhances threat detection. Unified architecture allows a comprehensive view of attacks, further supported by machine learning and integration with existing vendor solutions, ensuring that users gain insights without significant manual log analysis.
What are Cortex XSIAM's key features?
What benefits are evident in Cortex XSIAM reviews?
Industries implement Cortex XSIAM mainly in technology-driven sectors where centralized endpoint protection and automation of forensic investigation are paramount. By integrating several third-party systems for incident response, companies in competitive markets leverage its attributes for heightened operational security efficiency. However, users note areas for improvement, such as Attack Surface Management and integration enhancements, to better suit tech-heavy industries needing extensive connectivity with cybersecurity solutions.
We monitor all AI-Powered Cybersecurity Platforms reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.