CrowdStrike Falcon and Check Point Infinity are leading cybersecurity solutions focusing on endpoint and network protection, respectively. CrowdStrike Falcon appears to have an advantage in terms of real-time threat intelligence and lightweight design, while Check Point Infinity shines with its extensive zero-trust framework and comprehensive security coverage.
Features: CrowdStrike Falcon stands out for its endpoint detection and response capabilities, providing real-time threat intelligence and comprehensive visibility, which are vital for effective threat remediation. The AI-driven design minimizes system impact and facilitates remote investigation. Check Point Infinity excels in its zero-trust security architecture, enabling protection across network gateways and endpoints with advanced analytics to secure diverse environments.
Room for Improvement: CrowdStrike Falcon could improve reporting, system integration, and false-positive reduction. Enhancements in threat correlation, dashboard organization, and legacy support are also desired. Check Point Infinity users suggest better user interface, faster technical support, updated documentation, and clearer licensing terms.
Ease of Deployment and Customer Service: CrowdStrike Falcon is praised for its easy deployment, especially in cloud environments, and proactive technical support, though response times may vary. Check Point Infinity is perceived as more complex, particularly for hybrid or on-premises setups. Users appreciate its competent support but highlight occasional response delays and complex pricing, which can complicate implementation.
Pricing and ROI: CrowdStrike Falcon offers a premium-priced extensive feature set, which might be high for SMEs, yet its robust protection and significant ROI through reduced downtime are valued. Check Point Infinity, also premium-priced, provides flexible licensing to meet specific security needs, optimizing cost-effectiveness. Both solutions demonstrate notable ROI, with CrowdStrike Falcon notable for reducing manpower costs and swift threat resolution.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
The technical support is excellent with quick response times.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
The CrowdStrike team is very efficient; I would rate them ten out of ten.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
It has adequate coverage and is easy to deploy.
When it comes to scalability, it is entirely based on premium models according to demand.
I have never seen instability in the CrowdStrike tool.
We are following N-1 versions across our environment, which is stable.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
If Check Point continues reforms of AI and takes more information from different origins, not only from its database but also from other brands, it can complete this information and make it stronger.
Another concern is CrowdStrike's GUI. It changes annually, making it hard to work and find options.
Threat prevention should be their first priority.
Simplifying the querying process, such as using double quote queries or directly obtaining logs based on IP addresses or usernames, would be beneficial.
The pricing is good as Check Point Infinity includes many tools and details that others might not have.
The product, as supported by Check Point, offers invaluable assistance for ease of deployment.
It is expensive compared to SentinelOne, but as the market leader, it is worth it.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
Check Point Infinity offers a multi-layered security approach that enhances our IT security environment.
I can investigate by accessing the customer's host based on the RTR environment and utilize host search to know details for the past seven days, including logins, processes, file installations, malicious processes, and network connections.
CrowdStrike handled it effectively. It was not detected by the credential vendor, and it was our new code.
The machine learning behavior for anomaly detection is a valuable feature.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
CrowdStrike Falcon provides endpoint protection and threat intelligence using a cloud-based platform for real-time detection and response. Its minimal impact on system performance and ease of deployment are key benefits along with advanced logging and reporting for compliance and forensic analysis.
CrowdStrike Falcon is known for its efficacy in identifying malware, ransomware, and sophisticated cyber threats. The platform's cloud-native architecture and advanced AI capabilities ensure comprehensive endpoint visibility and rapid response times. Users appreciate the lightweight agent and seamless deployment process, along with detailed reporting features. Integration with security tools and efficient customer support are essential features, although some users highlight high pricing, occasional detection delays, and challenges with integration. Frequent alerts and the mobile app's performance are areas for improvement.
What are the key features of CrowdStrike Falcon?
What are the benefits or ROI of CrowdStrike Falcon?
In industries like finance, healthcare, and retail, CrowdStrike Falcon is often used for critical security due to its robust threat detection capabilities. Financial firms value its rapid response and detailed reporting for compliance, while healthcare providers appreciate the minimal system performance impact. Retailers benefit from its comprehensive endpoint visibility and integration with other security tools.
We monitor all AI-Powered Cybersecurity Platforms reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.