Try our new research platform with insights from 80,000+ expert users

Check Point Infinity vs Microsoft Defender for Identity comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.5
Check Point Infinity enhances network security and performance, offering significant ROI and cost savings while simplifying security management.
Sentiment score
6.7
Microsoft Defender for Identity improves incident management, reduces costs, enhances ROI, and saves time despite unclear financial benefits.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
I would say we can save about 90% of our budget with Check Point Infinity.
 

Customer Service

Sentiment score
6.7
Check Point Infinity's support is praised for expertise and resources, but some report delays and suggest enhancing educational tools.
Sentiment score
8.4
Microsoft Defender for Identity's support receives mixed feedback, with users praising premium service but noting poorer lower-tier support responses.
I gave customer support this rating because when I raised tickets, some took weeks or even up to six months to resolve.
The technical support is excellent with quick response times.
Check Point support is very responsive.
The quality of support is very good, but troubleshooting can take time due to complex setups and the need to provide many logs.
Generally, the support is more effective than other providers like Oracle.
 

Scalability Issues

Sentiment score
8.1
Check Point Infinity offers scalable and flexible cybersecurity solutions for organizations, supporting growth and adaptable deployment across applications.
Sentiment score
8.6
Microsoft Defender for Identity is scalable, efficiently supports large networks, and integrates well into Microsoft-centric environments with minimal effort.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
In a Microsoft-centric organization, especially with Azure infrastructure and Office 365, Microsoft Defender for Identity is scalable.
 

Stability Issues

Sentiment score
8.4
Check Point Infinity offers high stability, strong performance, and 50% improved speed, with minor latency issues and strong customer support.
Sentiment score
7.8
Microsoft Defender for Identity is stable and reliable, though occasional sensor restarts occur, generally scoring 6-9/10 in stability.
If they provide timely and effective support, it would enhance stability and minimize glitches considerably.
Microsoft Defender for Identity is quite robust and built on Azure hyperscale infrastructure, with a 99% availability.
Having recently started using it, reliability is affirmed, but manual investigation is often performed to verify if alerts identified by auto-remediation are accurate.
 

Room For Improvement

Check Point Infinity users criticize support delays, complex licensing, outdated documentation, portal latency, integration issues, and frequent updates.
Microsoft Defender for Identity needs better integration, usability, and support, with improved detection and cost efficiency highlighted by users.
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
When I log a ticket, they often take a long time to resolve the issue, with some tickets remaining unresolved for over six months.
If Microsoft could develop a feature that indicates when impossible travel is caused by VPN connections, it would prevent unnecessary password resets and session disruptions, especially for VIP users in organizations.
One improvement I would recommend is the integration of an admin application within Teams, allowing easy access to attack information on a mobile platform.
Reducing false positives is something we've been working on with Microsoft.
 

Setup Cost

Check Point Infinity's pricing is moderate to high; users value its features but note high initial setup costs.
Microsoft Defender for Identity is cost-effective within E5, offering flexibility compared to standalone purchases or E3 add-ons.
In terms of pricing, I find Check Point Infinity to be an expensive product.
The pricing is good as Check Point Infinity includes many tools and details that others might not have.
The product, as supported by Check Point, offers invaluable assistance for ease of deployment.
If they can reduce the costs, organizations will be happy, and it will compensate for using the Azure environment, which is more expensive on the infrastructure as a service side.
the Microsoft Defender Suite is quite expensive, especially when integrated into Sentinel.
From an organization perspective, using E5 licenses is value for money, especially if Azure and Office 365 are already in use.
 

Valuable Features

Check Point Infinity provides centralized security management with Zero Trust, real-time threat prevention, automation, and scalability for diverse business needs.
Microsoft Defender for Identity excels in integration, real-time detection, privilege management, AI analytics, and comprehensive security monitoring features.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
Check Point Infinity has positively impacted my organization by significantly reducing incidents.
Check Point Infinity offers a multi-layered security approach that enhances our IT security environment.
We receive an advance report of risky users, allowing us to take preemptive action before an attack causes damage to organization details.
The most valuable features of Microsoft Defender for Identity include its automatic remedies, possibilities for avoiding incidents, the privilege manager, and the generation of logs that facilitate a safer environment.
I find the most valuable features in Microsoft Defender for Identity to be the conditional access and the rule-based access control to give users their actual role-based permission to work.
 

Categories and Ranking

Check Point Infinity
Ranking in Advanced Threat Protection (ATP)
12th
Average Rating
8.6
Reviews Sentiment
7.4
Number of Reviews
28
Ranking in other categories
AI-Powered Cybersecurity Platforms (8th)
Microsoft Defender for Iden...
Ranking in Advanced Threat Protection (ATP)
5th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
23
Ranking in other categories
Microsoft Security Suite (5th), Identity Threat Detection and Response (ITDR) (3rd)
 

Mindshare comparison

As of June 2025, in the Advanced Threat Protection (ATP) category, the mindshare of Check Point Infinity is 2.0%, up from 0.7% compared to the previous year. The mindshare of Microsoft Defender for Identity is 7.1%, down from 8.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP)
 

Featured Reviews

NareshKumar9 - PeerSpot reviewer
Improved network security with real-time threat detection and alert system
There is room for improvement in Check Point Infinity as I encounter some glitches in its interface. Sometimes, the data utilization report does not show up in Check Point Infinity GUI, necessitating me to reach out to their support team, who typically indicates firmware issues that require new installations. This process can be frustrating, and I feel it should be addressed to enhance user experience. The customer support needs enhancement as well. When I log a ticket, they often take a long time to resolve the issue, with some tickets remaining unresolved for over six months. This duration is unacceptable, and it definitely needs to change; however, aside from that, everything else is satisfactory with Check Point Infinity.
ROBERT-CHRISTIAN - PeerSpot reviewer
Integration within the ecosystem enhances collaboration and automates functionalities
The integration into the Microsoft Defender ecosystem is the most valuable feature of Microsoft Defender for Identity. It fits very nicely with all the other Defender tools, allowing for excellent collaboration among them. It also fits seamlessly into Microsoft Sentinel SIEM. Furthermore, Microsoft security solutions can save time as they allow the automation of numerous functionalities, and the reporting inside the Microsoft ecosystem is commendable.
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
859,129 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
14%
Computer Software Company
13%
Government
7%
Computer Software Company
15%
Financial Services Firm
13%
Government
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Infinity?
Check Point Infinity's threat prevention capabilities benefitted our organization.
What needs improvement with Check Point Infinity?
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
What is your primary use case for Check Point Infinity?
Within my organization, I primarily use Check Point Infinity for bandwidth utilization, load balancing, and we analyze all the spams, filters, and blocks. Another feature of Check Point Infinity th...
What do you like most about Microsoft Defender for Identity?
Microsoft Defender for Identity provides excellent visibility into threats by leveraging real-time analytics and data intelligence.
What needs improvement with Microsoft Defender for Identity?
In Microsoft Defender for Identity, I would appreciate improvements in providing information on conditional access. They have added more control that can be put in place, which was not present year...
What is your primary use case for Microsoft Defender for Identity?
The main use cases for Microsoft Defender for Identity involve working with security and signing risk aspects. I work with conditional access, though I have not implemented this task yet.
 

Also Known As

R80, Infinity
Azure Advanced Threat Protection, Azure ATP, MS Defender for Identity
 

Overview

 

Sample Customers

Edel AG
Microsoft Defender for Identity is trusted by companies such as St. Luke’s University Health Network, Ansell, and more.
Find out what your peers are saying about Check Point Infinity vs. Microsoft Defender for Identity and other solutions. Updated: June 2025.
859,129 professionals have used our research since 2012.