Coming October 25: PeerSpot Awards will be announced! Learn more

Check Point Infinity vs Digital Guardian comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Infinity and Digital Guardian based on real PeerSpot user reviews.

Find out in this report how the two ATP (Advanced Threat Protection) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.

To learn more, read our detailed Check Point Infinity vs. Digital Guardian report (Updated: September 2022).
634,325 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The risk level notifications are most valuable. We get to know what kind of intrusion or attack is there, and we can fix a problem on time.""The deployment capability is a great feature.""The good part is that you don't have to configure it, which is very convenient.""Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features.""I would say that 90% of the spam and phishing attack emails get blocked right off the bat.""Does a thorough job of examining email and URLs for malicious content.""The most valuable feature of Microsoft Defender for Office 365 is the ease of use.""At the moment we are satisfied with this product. It's a stable, scalable, and resilient solution for us."

More Microsoft Defender for Office 365 Pros →

"The most valuable feature of Check Point Infinity is the ease of use and navigation.""The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles.""It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security.""New Check Point technologies can be found via this portal.""The initial implementation was accomplished easily and without deployment problems.""It is very easy to integrate new features.""For me, one of the best features of Check Point Infinity is to be able to have the possibility of emulating the activity of attached files with malicious content in such a short time."

More Check Point Infinity Pros →

"It has been scalable.""It can scale from 100 to 10,000. There's no problem with the scalability."

More Digital Guardian Pros →

Cons
"In some situations, it has not been able to pick impersonated emails having no attachments. Technical support definitely has a scope for improvement.""The custom alerts have to improve a lot.""The visibility for the weaknesses in the system and unauthorized access can be improved.""Too many false positives and lacks an accurate capability to detect malicious SharePoint sites.""I'd like some additional features any product can give me to protect our environment in a better way.""They can improve their security in a way where a customer can know if all their attachments are safe or not to open through a report. The solution does its job perfectly, but it never reports to the customer whether those attachments have been stopped before or not.""This product's effectiveness could be improved, in terms of detecting unwanted spam or even malware between the emails, compared to other products.""Microsoft Defender for Office 365 could improve by giving customers information on techniques to prevent threats. For example, information about best practices on how to protect their own devices against hackers and scammers, such as educational information or training. This would help others have a better understanding of cyber security. Additionally, there can be more security features added."

More Microsoft Defender for Office 365 Cons →

"They need to update the guides.""They can improve the latency of the portal.""The portal is provisioned in AWS. They should improve the cloud to make it faster.""The console at the beginning also has the section on where to save the logs, however, if by mistake we choose a very remote area, this detail cannot be corrected unless the change of data center where the logs are housed, which is requested through support, which can become a management difficulty.""One of the main improvements that can be made is the latency in the portal.""Check Point Infinity price could improve.""The licensing model for Check Point Infinity is not clear."

More Check Point Infinity Cons →

"There are a lot of issues with the current version of the Endpoint agent. It's not stable, it's resource-consuming, and there are some performance issues. If they could improve the stability of the agent it would be great.""The initial setup is a bit more complex than other solutions."

More Digital Guardian Cons →

Pricing and Cost Advice
  • "It's a user-base subscription."
  • "From the pricing point of view, like any other product in the market, there is scope for negotiation."
  • "Defender is a little bit more expensive as compared to others. We are in the manufacturing environment. So, we don't have a high budget for all of our endpoint devices. Its cost is a major concern for us."
  • "For licensing, it's usually a yearly package for customers who are subscribed to Office 365, but they can also pay on a monthly basis."
  • "Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
  • "Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
  • More Microsoft Defender for Office 365 Pricing and Cost Advice →

  • "Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."
  • "The pricing of Check Point Infinity could be better. There is a license needed to use the solution and we pay annually."
  • More Check Point Infinity Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which ATP (Advanced Threat Protection) solutions are best for your needs.
    634,325 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:It also gives the vulnerability status according to the versions you have selected. Let's say you have Google Chrome. It… more »
    Top Answer:I would recommend Microsoft Defender for Office 365. If you already have a deployment method, like CCM or something… more »
    Top Answer:In one of the reports, I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go… more »
    Top Answer:The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust… more »
    Top Answer:The licensing model for Check Point Infinity is not clear. As infinity licenses are based on the number of users, it… more »
    Top Answer:We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by… more »
    Top Answer:The feature we call desktop recording is the most valuable aspect of the solution. Not only can we collect data from the… more »
    Top Answer:For the price in the market, it is a little bit higher than Symantec and Forcepoint. However, I believe, especially in… more »
    Top Answer:We're a distributor of the solution. I personally handle pre-sales. Some web upload actions need to be improved due to… more »
    Comparisons
    Also Known As
    MS Defender for Office 365
    R80, Infinity
    Learn More
    Overview

    Microsoft Defender for Office 365 protects all of Office 365 against advanced threats like business email compromise and credential phishing, and automatically investigates and remediates attacks. With Defender for O365 you get Integrated threat protection for all of Office 365 that gives you:

    - Native protection for Office 365 with built-in protection that simplifies administration, lowers total cost of ownership, and boosts productivity.

    - Unparalleled scale and effectiveness with powerful automated workflows to improve SecOps efficiency.

    - A complete solution for collaboration that protects you from attacks across the kill chain.

    To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity

    Digital Guardian Endpoint Data Loss Prevention (DLP) protects sensitive data on all your endpoints. It protects intellectual property and personal information. An endpoint agent that captures and records all system, user and data events on or off the network. It has a granular control of all data movement that can be configured to automatically block, justify or encrypt sensitive data in or attached to email, files moved to removable drives, cloud storage, or web - malware and malware-free - before sensitive data is lost. It has a built-in advanced data classification that creates and modifies classification and usage policies through content inspection, context-awareness and user classification. It provides design policies with controls that won't block actions that comply with corporate policy so employees remain productive while the data stays safe.

    Offer
    Learn more about Microsoft Defender for Office 365
    Learn more about Check Point Infinity
    Learn more about Digital Guardian
    Sample Customers
    Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
    Edel AG
    The Fifth Avenue Theatre, Jabil Circuit
    Top Industries
    REVIEWERS
    Manufacturing Company25%
    Comms Service Provider25%
    Performing Arts13%
    Logistics Company13%
    VISITORS READING REVIEWS
    Computer Software Company20%
    Comms Service Provider12%
    Government8%
    Financial Services Firm7%
    VISITORS READING REVIEWS
    Computer Software Company35%
    Comms Service Provider14%
    Security Firm12%
    Financial Services Firm8%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Comms Service Provider14%
    Financial Services Firm11%
    Manufacturing Company8%
    Company Size
    REVIEWERS
    Small Business33%
    Midsize Enterprise27%
    Large Enterprise40%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise18%
    Large Enterprise55%
    REVIEWERS
    Small Business60%
    Midsize Enterprise20%
    Large Enterprise20%
    VISITORS READING REVIEWS
    Small Business40%
    Midsize Enterprise19%
    Large Enterprise42%
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise17%
    Large Enterprise67%
    Buyer's Guide
    Check Point Infinity vs. Digital Guardian
    September 2022
    Find out what your peers are saying about Check Point Infinity vs. Digital Guardian and other solutions. Updated: September 2022.
    634,325 professionals have used our research since 2012.

    Check Point Infinity is ranked 11th in ATP (Advanced Threat Protection) with 7 reviews while Digital Guardian is ranked 13th in ATP (Advanced Threat Protection) with 2 reviews. Check Point Infinity is rated 9.0, while Digital Guardian is rated 6.6. The top reviewer of Check Point Infinity writes "Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network". On the other hand, the top reviewer of Digital Guardian writes "Reliable, easy to expand, and has nice data security features". Check Point Infinity is most compared with CyberArk Privileged Access Manager, Palo Alto Networks VM-Series, Cisco Secure Network Analytics, Skybox Security Suite and Palo Alto Networks WildFire, whereas Digital Guardian is most compared with Forcepoint Data Loss Prevention, Carbon Black CB Defense, Microsoft Defender for Endpoint, Microsoft Purview Data Loss Prevention and Symantec Data Loss Prevention. See our Check Point Infinity vs. Digital Guardian report.

    See our list of best ATP (Advanced Threat Protection) vendors.

    We monitor all ATP (Advanced Threat Protection) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.