CrowdStrike Falcon and Check Point Infinity are leading cybersecurity solutions focusing on endpoint and network protection, respectively. CrowdStrike Falcon appears to have an advantage in terms of real-time threat intelligence and lightweight design, while Check Point Infinity shines with its extensive zero-trust framework and comprehensive security coverage.
Features: CrowdStrike Falcon stands out for its endpoint detection and response capabilities, providing real-time threat intelligence and comprehensive visibility, which are vital for effective threat remediation. The AI-driven design minimizes system impact and facilitates remote investigation. Check Point Infinity excels in its zero-trust security architecture, enabling protection across network gateways and endpoints with advanced analytics to secure diverse environments.
Room for Improvement: CrowdStrike Falcon could improve reporting, system integration, and false-positive reduction. Enhancements in threat correlation, dashboard organization, and legacy support are also desired. Check Point Infinity users suggest better user interface, faster technical support, updated documentation, and clearer licensing terms.
Ease of Deployment and Customer Service: CrowdStrike Falcon is praised for its easy deployment, especially in cloud environments, and proactive technical support, though response times may vary. Check Point Infinity is perceived as more complex, particularly for hybrid or on-premises setups. Users appreciate its competent support but highlight occasional response delays and complex pricing, which can complicate implementation.
Pricing and ROI: CrowdStrike Falcon offers a premium-priced extensive feature set, which might be high for SMEs, yet its robust protection and significant ROI through reduced downtime are valued. Check Point Infinity, also premium-priced, provides flexible licensing to meet specific security needs, optimizing cost-effectiveness. Both solutions demonstrate notable ROI, with CrowdStrike Falcon notable for reducing manpower costs and swift threat resolution.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
I would say we can save about 90% of our budget with Check Point Infinity.
CrowdStrike Falcon saves time and offers good value for money, especially for enterprise companies, because it can stop breaches.
It's very easy to deploy without many IT admins, saving time.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
The technical support is excellent with quick response times.
Check Point support is very responsive.
On a scale of one to ten, I would rate the technical support as a 10 because they resolve many issues for us.
The CrowdStrike team is very efficient; I would rate them ten out of ten.
They could improve by initiating calls for high-priority cases instead of just opening tickets.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
It has adequate coverage and is easy to deploy.
In terms of scalability, I find CrowdStrike to be stable, and I have not encountered any limitations with it.
There's no scalability limitation from CrowdStrike itself, as it just requires agent deployment.
Check Point Infinity is a very stable solution; I don't remember experiencing any downtime.
I have never seen instability in the CrowdStrike tool.
We are following N-1 versions across our environment, which is stable.
The biggest issue occurred when every computer worldwide experienced a blue screen.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
If Check Point continues reforms of AI and takes more information from different origins, not only from its database but also from other brands, it can complete this information and make it stronger.
Simplifying the querying process, such as using double quote queries or directly obtaining logs based on IP addresses or usernames, would be beneficial.
Another concern is CrowdStrike's GUI. It changes annually, making it hard to work and find options.
Threat prevention should be their first priority.
In terms of pricing, I find Check Point Infinity to be an expensive product.
The pricing is good as Check Point Infinity includes many tools and details that others might not have.
The product, as supported by Check Point, offers invaluable assistance for ease of deployment.
It is expensive compared to SentinelOne, but as the market leader, it is worth it.
The licensing cost and setup costs are affordable.
The solution is a bit expensive.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
Check Point Infinity offers a multi-layered security approach that enhances our IT security environment.
If we cannot keep our data secret, all our customers will be lost.
I can investigate by accessing the customer's host based on the RTR environment and utilize host search to know details for the past seven days, including logins, processes, file installations, malicious processes, and network connections.
The real-time analytics aspect of CrowdStrike performs well because we get all logs in real-time, with no delay, allowing us to take action immediately.
Being an EDR solution, it helps us identify attacks in real-time.
Product | Market Share (%) |
---|---|
CrowdStrike Falcon | 19.3% |
Check Point Infinity | 0.6% |
Other | 80.1% |
Company Size | Count |
---|---|
Small Business | 29 |
Midsize Enterprise | 8 |
Large Enterprise | 10 |
Company Size | Count |
---|---|
Small Business | 46 |
Midsize Enterprise | 34 |
Large Enterprise | 61 |
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
CrowdStrike Falcon offers comprehensive endpoint protection with real-time threat detection, AI-driven capabilities, and seamless integration with other platforms. Its cloud-native design provides robust security across diverse environments, making it a reliable choice for modern cybersecurity needs.
CrowdStrike Falcon is heralded for features like robust endpoint visibility, threat detection, and AI-driven capabilities. Users value its efficient real-time monitoring, which maintains low impact on performance while offering seamless integration with platforms. The lightweight design, coupled with comprehensive dashboards and automated threat responses, enhances security operations while reducing resource strain. CrowdStrike's cloud-native architecture ensures flexible, always-on protection, making it adaptable to a wide range of environments. However, improvements can be made in log management, compatibility with diverse operating systems, and integration with third-party technologies. Users also seek more robust reporting features, fewer false positives, and better support for legacy systems. Enhanced policy application, AI capabilities, and extended on-demand scanning are desired, while pricing and technical support responsiveness are concerns.
What are CrowdStrike Falcon's key features?CrowdStrike Falcon is implemented widely in industries relying on robust endpoint protection for monitoring, securing endpoints, forensic analysis, and malware detection. Its cloud-based AI capabilities ensure comprehensive security across devices, making it a preferred choice for networks, servers, and workstations globally. The efficient management of security threats and compliance with regulations is achieved with minimal resource consumption.
We monitor all AI-Powered Cybersecurity Platforms reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.