We performed a comparison between Check Point Infinity and Microsoft Defender for Cloud Apps based on real PeerSpot user reviews.
Find out in this report how the two Advanced Threat Protection (ATP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The initial implementation was accomplished easily and without deployment problems."
"New Check Point technologies can be found via this portal."
"The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."
"Our network security posture has improved significantly due to several factors. We've seen a 25% reduction in security incidents due to Infinity's advanced threat prevention capabilities. Additionally, the platform's automation features led to a 20% increase in operational efficiency, allowing our security teams to focus on more strategic tasks."
"The product's excellent scalability features have allowed our organization to seamlessly adapt to the growing demand. The consensus mechanism and smart contract capabilities have optimized our workflow, resulting in an overall reduction in the complexity of our organization."
"It provides threat detection, predictive analysis, advanced analytics, and advanced threat protection."
"The most valuable feature of Check Point Infinity is the ease of use and navigation."
"The most valuable features of the solution stem from factors like ease of use, visibility, and cost to the enterprise."
"Defender helps us control which applications are being used and gain more security insight into remote and hybrid users based on user identity and log in location. You can also integrate Defender for Cloud Apps with Defender for Endpoint to extend its capabilities."
"It does a great job of monitoring and maintaining a security baseline. For us, that is a key element. The notifications are pretty good."
"The solution does not affect a user's workflow."
"The most valuable feature is the ease of management. It's important."
"The general usability of the solution is very straightforward."
"In Microsoft Defender for Cloud Apps, there is an option to enable files. Once you enable that, it will give you all the files in your organization and where they are located in the cloud... That feature is very useful for investigation purposes."
"The most valuable feature is the alerting system."
"There are a lot of features with benefits, including discovery, investigation, and putting controls around things. You can't say that you like the investigation part but not the discovery. Everything is correlated; that's how the tool works."
"Check Point Infinity is not compatible with Windows 8."
"We'd like to see support for fiber connections."
"Alert fatigue is a common issue with platforms that have strong detection capabilities. Implementing more filtering and prioritization mechanisms can help address this issue, ensuring that security teams can focus on the most critical threats."
"The solution's reports should be easy to understand and work with."
"Technical support is something that needs improvement."
"The console at the beginning also has the section on where to save the logs, however, if by mistake we choose a very remote area, this detail cannot be corrected unless the change of data center where the logs are housed, which is requested through support, which can become a management difficulty."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"The management console has given us some trouble, and the documentation is a little bit rigid in its solution paths."
"I would like for it to be available on Mac and for it to support all of the features of Microsoft financing products. It is really for Windows."
"Defender for Cloud Apps could come with more configured policies out of the box. Also, integration could be easier. Integration is moderately difficult because Microsoft hasn't developed a solution that unifies device onboarding and management. You have to use Intune to manage devices and Defender for Endpoint to enforce policies. They need to fix their integration, but I believe they will straighten it out by the end of the year."
"The interface needs to be more user-friendly."
"We would like to get more information from the endpoint. I don't get enough detailed information right now on why something failed. There is not enough visibility."
"There could be more granular roles that are out of the box included in the product."
"The integration with macOS operating systems needs to be better."
"This service would be better if it had a separate license, only for this service, that could be used to track usage."
"Sometimes the support is actually lacking."
More Microsoft Defender for Cloud Apps Pricing and Cost Advice →
Check Point Infinity is ranked 14th in Advanced Threat Protection (ATP) with 26 reviews while Microsoft Defender for Cloud Apps is ranked 11th in Advanced Threat Protection (ATP) with 30 reviews. Check Point Infinity is rated 8.8, while Microsoft Defender for Cloud Apps is rated 8.4. The top reviewer of Check Point Infinity writes "Provides robust cybersecurity with a comprehensive suite of features, expert support, and scalable cloud-based architecture, ensuring effective threat detection and continuous improvement ". On the other hand, the top reviewer of Microsoft Defender for Cloud Apps writes "Integrates well and helps us in protecting sensitive information, but takes time to scan and apply the policies and cannot detect everything we need". Check Point Infinity is most compared with CyberArk Privileged Access Manager, Cisco Secure Network Analytics, Skybox Security Suite, Proofpoint Email Protection and Microsoft Defender for Office 365, whereas Microsoft Defender for Cloud Apps is most compared with Zscaler Internet Access, Cisco Umbrella, Netskope , Prisma Access by Palo Alto Networks and Qualys VMDR. See our Check Point Infinity vs. Microsoft Defender for Cloud Apps report.
See our list of best Advanced Threat Protection (ATP) vendors.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.