Darktrace and Check Point Infinity compete in the cybersecurity solutions category. Check Point Infinity seems to have the upper hand with a more unified security approach across various platforms, but Darktrace offers superior network visibility and threat detection capabilities.
Features: Darktrace offers comprehensive threat detection powered by AI, providing detailed insights into network behavior and threats. Key features include fast threat detection, meaningful alerting systems, and strong network visibility. Check Point Infinity provides a unified security infrastructure integrating Zero Trust principles effectively across all platforms with extensive endpoint, network, and cloud security, complemented by seamless policy management.
Room for Improvement: Darktrace needs to improve its user interface, reduce false positives, and add endpoint protection. More system integrations and pricing flexibility could enhance its usability and appeal to smaller enterprises. Check Point Infinity should enhance documentation, simplify its licensing models, and improve technical support responsiveness. There's a need to address cloud tool latency and pricing complexity to better suit different business sizes.
Ease of Deployment and Customer Service: Darktrace primarily supports on-premises and hybrid cloud infrastructures, with very responsive technical support, although deployment complexity may require more user-friendly assistance. Check Point Infinity supports a broader range of cloud environments, including public cloud, but faces challenges with cloud-related latency. Customer service is generally well-rated, but there are suggestions for improved support in specific locations.
Pricing and ROI: Darktrace is perceived as expensive, especially for smaller enterprises, but offers flexible payment options. Despite its high cost, it provides substantial ROI due to its strong threat mitigation and network visibility, reducing downtime and enhancing security postures. Check Point Infinity’s pricing is moderate with a focus on comprehensive security features, though its complex licensing can be a challenge. The ROI is realized through robust security measures that effectively mitigate potential breaches and safeguard business operations.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
Using this solution provides financial benefits by securing from server attacks, which offers indirect savings.
The technical support is excellent with quick response times.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
The challenge lies in waiting for a response after logging a ticket.
The technical support from Darktrace is of high quality.
Darktrace provides excellent technical support with a monthly meeting to review platform incidents, ensuring the system functions as expected.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
Since it's cloud-based, it expands easily.
Darktrace has high scalability, and I would rate it a nine out of ten.
The stability of Darktrace is excellent, rated ten out of ten.
The appliance itself has never let me down.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
If Check Point continues reforms of AI and takes more information from different origins, not only from its database but also from other brands, it can complete this information and make it stronger.
There is no dedicated salesperson in Egypt, and having one would help to improve focus on this market.
Darktrace could improve by integrating with email security gateways like Mimecast or Ironscales.
The intelligence section and the incident view should be seamlessly connected in one view to avoid jumping between pages.
The pricing is good as Check Point Infinity includes many tools and details that others might not have.
The product, as supported by Check Point, offers invaluable assistance for ease of deployment.
The product is considered expensive compared to others.
The licensing cost is approximately eight dollars a year.
The pricing is costly in USD, and they charge based on device counts.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
Check Point Infinity offers a multi-layered security approach that enhances our IT security environment.
If more than 2.5 gigabytes of data have been pulled in a few minutes, it engages by blocking for one-hour intervals, alerts, and extends the block until it goes into full isolation if the violation continues.
I do not need to manually process incidents as Darktrace provides an incident summary, potential detection paths, and other details, all exportable with just a click.
The most valuable features are the AI and advanced learning tools that distinguish it from other products.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
Darktrace is a leading cybersecurity solution that leverages artificial intelligence and machine learning to provide advanced threat detection, response, and risk management capabilities. Many reviewers find Darktrace's AI and machine-learning capabilities to be valuable. They appreciate its ability to detect anomalies and threats that might go unnoticed by traditional security tools. Overall, the general sentiment towards Darktrace from reviewers is positive. Users seem to appreciate its scalability, stability, AI capabilities, visibility, and ease of use.
Darktrace offers a proactive and intelligent approach to cybersecurity. It utilizes AI algorithms to learn and understand the 'pattern of life' for every user and device within a network. This understanding enables it to detect anomalies that could signify a cyber threat, from subtle insider threats to more obvious ransomware attacks.
Its adaptability, autonomous response features, and comprehensive network visibility make it a top-tier solution for different sizes of organizations and across many industries. It was named one of TIME magazine’s ‘Most Influential Companies’ in 2021 and protects over 8,800 organizations globally from advanced cyber threats.
Darktrace Cyber AI Loop
The Darktrace Cyber AI Loop introduces an advanced artificial intelligence-based system for cybersecurity, designed to build a self-improving defense mechanism. This system functions like a closed loop, where each stage feeds information and insights into the next, amplifying the overall effectiveness of the platform.
The key components of the loop are:
Darktrace's AI algorithms can identify threats that traditional security tools might miss. It continuously learns and updates its understanding of what is normal for each environment, ensuring that it can quickly detect and respond to unusual activities that could indicate a breach. Darktrace's Antigena module can autonomously respond to threats in real time. This is particularly crucial in containing fast-moving threats like ransomware, where every second counts.
Darktrace's solution provides unparalleled visibility into all parts of the network, including cloud services, IoT devices, and industrial control systems. This comprehensive coverage ensures that no part of the network is left unprotected. However, while the Darktrace Cyber AI Loop offers a robust solution, it is not a complete cure-all and requires careful implementation and integration with existing security frameworks.Darktrace offers a comprehensive and unified approach to cybersecurity. It provides continuous protection against known and unknown threats, regardless of where they emerge. Darktrace's solutions provide visibility into your cloud infrastructure, continuous monitoring of application usage and communication patterns (e.g., identification of suspicious actions like unauthorized data access), comprehensive email security that goes beyond traditional spam and phishing filters, real-time protection for endpoints, and continuous monitoring of network traffic and device activity.
Darktrace also provides specialized coverage to secure your zero-trust architecture. Identifies compromised identities, unauthorized access attempts, and risky data exfiltration within a least-privilege environment. Finally, it has a dedicated solution for safeguarding industrial control systems and critical infrastructure. Monitors communication patterns, device behavior, and physical access within OT environments, protecting against operational disruptions and cyberattacks.
We monitor all AI-Powered Cybersecurity Platforms reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.