Check Point Infinity vs Microsoft Defender for Identity comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Infinity and Microsoft Defender for Identity based on real PeerSpot user reviews.

Find out in this report how the two ATP (Advanced Threat Protection) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Check Point Infinity vs. Microsoft Defender for Identity Report (Updated: November 2022).
653,584 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The good part is that you don't have to configure it, which is very convenient.""At the moment we are satisfied with this product. It's a stable, scalable, and resilient solution for us.""The deployment capability is a great feature.""Does a thorough job of examining email and URLs for malicious content.""I would say that 90% of the spam and phishing attack emails get blocked right off the bat.""The most valuable feature of Microsoft Defender for Office 365 is the ease of use.""The solution is very easy to use. All you have to do is to assign the license to the end-user and it's done. The customer will only have the feature activated, and the solution will monitor the emails to determine if they are a threat or not.""Some of the valuable features on the email side are anti-phishing, anti-malware, and Safe Links."

More Microsoft Defender for Office 365 Pros →

"New Check Point technologies can be found via this portal.""It is very easy to integrate new features.""It provides fantastic visibility of security incidents through deconstructing and dissecting the threat's infection protocol.""It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security.""The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles.""Infinity has come to give us total protection.""For me, one of the best features of Check Point Infinity is to be able to have the possibility of emulating the activity of attached files with malicious content in such a short time.""The initial implementation was accomplished easily and without deployment problems."

More Check Point Infinity Pros →

"This solution has advanced a lot over the last few years.""Defender for Identity has not affected the end-user experience.""It is easy to set up. Based on the number of devices you would like to set up, you can use scripts, Group Policy, etc. It takes five minutes to set up.""The basic security monitoring at its core feature is the most valuable aspect. But also the investigative parts, the historical logging of events over the network are extremely interesting because it gives an in-depth insight into the history of account activity that is really easy to read, easy to follow, and easy to export."

More Microsoft Defender for Identity Pros →

Cons
"They can improve their security in a way where a customer can know if all their attachments are safe or not to open through a report. The solution does its job perfectly, but it never reports to the customer whether those attachments have been stopped before or not.""This product's effectiveness could be improved, in terms of detecting unwanted spam or even malware between the emails, compared to other products.""There is room for improvement with the UI.""Microsoft Defender for Office 365 could improve by giving customers information on techniques to prevent threats. For example, information about best practices on how to protect their own devices against hackers and scammers, such as educational information or training. This would help others have a better understanding of cyber security. Additionally, there can be more security features added.""There needs to be an improvement in integrating the product to work across multiple operating systems, and to have better support for non-Microsoft file types.""The visibility for the weaknesses in the system and unauthorized access can be improved.""The company should focus on adding threats that the solution is currently unable to detect.""We are always looking for others tools to increase automation on tasks. There can be better integration with other solutions, such as PowerPoint and email."

More Microsoft Defender for Office 365 Cons →

"They need to update the guides.""The licensing model for Check Point Infinity is not clear.""Check Point Infinity price could improve.""They can improve the latency of the portal.""In the future, I would like to see new developments that allow us to centralize the cloud.""The portal is provisioned in AWS. They should improve the cloud to make it faster.""The console at the beginning also has the section on where to save the logs, however, if by mistake we choose a very remote area, this detail cannot be corrected unless the change of data center where the logs are housed, which is requested through support, which can become a management difficulty.""One of the main improvements that can be made is the latency in the portal."

More Check Point Infinity Cons →

"I would like to be able to do remediation from the platform because it is just a scanner right now. If you onboard a device, it shows you what is happening, but you can't use it to fix things. You need to go into the system to fix it instead.""The impact of the sensors on the domain controllers can be quite high depending on your loads. I don't know if there's any room for improvement there, but that's one of the things that might be improved.""When the data leaves the cloud, there are security issues.""The solution could be better at using group-managed access and they could replace it with broad-based access controls."

More Microsoft Defender for Identity Cons →

Pricing and Cost Advice
  • "It's a user-base subscription."
  • "From the pricing point of view, like any other product in the market, there is scope for negotiation."
  • "Defender is a little bit more expensive as compared to others. We are in the manufacturing environment. So, we don't have a high budget for all of our endpoint devices. Its cost is a major concern for us."
  • "For licensing, it's usually a yearly package for customers who are subscribed to Office 365, but they can also pay on a monthly basis."
  • "Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
  • "Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
  • "The solution saves money so we have seen a return on investment."
  • More Microsoft Defender for Office 365 Pricing and Cost Advice →

  • "Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."
  • "The pricing of Check Point Infinity could be better. There is a license needed to use the solution and we pay annually."
  • More Check Point Infinity Pricing and Cost Advice →

  • "You won't be able to change your tenants from where you deploy them. For example, if you select Canada, they will charge you based on Canadian pricing. If you are also in London, when you deploy in Canada, the pound is higher than Canadian dollars, but your platform resources are billable in Canadian dollars. Using your pounds to pay for any of these things will be cheaper. Or, if you deploy in London, they will charge you based on your local currency."
  • More Microsoft Defender for Identity Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which ATP (Advanced Threat Protection) solutions are best for your needs.
    653,584 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Threat Explorer is one of the features that I very much like because it is a real-time report that allows you to… more »
    Top Answer:I would recommend Microsoft Defender for Office 365. If you already have a deployment method, like CCM or something… more »
    Top Answer:There is room for improvement with the UI. The company should focus on adding threats that the solution is currently… more »
    Top Answer:The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust… more »
    Top Answer:The licensing model for Check Point Infinity is not clear. As infinity licenses are based on the number of users, it… more »
    Top Answer:We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by… more »
    Top Answer:This solution has advanced a lot over the last few years.
    Top Answer:When the data leaves the cloud, there are security issues. The cloud security services and the integration with on-prem… more »
    Top Answer:We are looking at this solution as a trusted tenant for our network. This way, all of the data that goes through is… more »
    Comparisons
    Also Known As
    MS Defender for Office 365
    R80, Infinity
    Azure Advanced Threat Protection, Azure ATP, MS Defender for Identity
    Learn More
    Overview

    Microsoft Defender for Office 365 protects all of Office 365 against advanced threats like business email compromise and credential phishing, and automatically investigates and remediates attacks. With Defender for O365 you get Integrated threat protection for all of Office 365 that gives you:

    - Native protection for Office 365 with built-in protection that simplifies administration, lowers total cost of ownership, and boosts productivity.

    - Unparalleled scale and effectiveness with powerful automated workflows to improve SecOps efficiency.

    - A complete solution for collaboration that protects you from attacks across the kill chain.

    To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity

    Microsoft Defender for Identity is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. With Microsoft Defender for Identity, you can:

    - Monitor users, entity behavior, and activities with learning-based analytics

    - Protect user identities and credentials stored in Active Directory

    - Identify and investigate suspicious user activities and advanced attacks throughout the kill chain

    - Provide clear incident information on a simple timeline for fast triage

      To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.

      Offer
      Learn more about Microsoft Defender for Office 365
      Learn more about Check Point Infinity
      Learn more about Microsoft Defender for Identity
      Sample Customers
      Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
      Edel AG
      Microsoft Defender for Identity is trusted by companies such as St. Luke’s University Health Network, Ansell, and more.
      Top Industries
      REVIEWERS
      Comms Service Provider27%
      Financial Services Firm18%
      Manufacturing Company18%
      Performing Arts9%
      VISITORS READING REVIEWS
      Computer Software Company19%
      Comms Service Provider10%
      Government8%
      Financial Services Firm7%
      REVIEWERS
      Financial Services Firm38%
      Computer Software Company13%
      Security Firm13%
      Engineering Company13%
      VISITORS READING REVIEWS
      Computer Software Company34%
      Financial Services Firm13%
      Comms Service Provider12%
      Security Firm12%
      VISITORS READING REVIEWS
      Computer Software Company22%
      Financial Services Firm11%
      Government8%
      Comms Service Provider8%
      Company Size
      REVIEWERS
      Small Business26%
      Midsize Enterprise26%
      Large Enterprise47%
      VISITORS READING REVIEWS
      Small Business28%
      Midsize Enterprise19%
      Large Enterprise54%
      REVIEWERS
      Small Business58%
      Midsize Enterprise21%
      Large Enterprise21%
      VISITORS READING REVIEWS
      Small Business38%
      Midsize Enterprise16%
      Large Enterprise46%
      VISITORS READING REVIEWS
      Small Business21%
      Midsize Enterprise14%
      Large Enterprise65%
      Buyer's Guide
      Check Point Infinity vs. Microsoft Defender for Identity
      November 2022
      Find out what your peers are saying about Check Point Infinity vs. Microsoft Defender for Identity and other solutions. Updated: November 2022.
      653,584 professionals have used our research since 2012.

      Check Point Infinity is ranked 9th in ATP (Advanced Threat Protection) with 9 reviews while Microsoft Defender for Identity is ranked 10th in ATP (Advanced Threat Protection) with 4 reviews. Check Point Infinity is rated 8.8, while Microsoft Defender for Identity is rated 9.0. The top reviewer of Check Point Infinity writes "Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network". On the other hand, the top reviewer of Microsoft Defender for Identity writes "Gives most administrators absolutely amazing insight into what's happening in the network that they probably never had before". Check Point Infinity is most compared with CyberArk Privileged Access Manager, Cisco Secure Network Analytics, Palo Alto Networks VM-Series, Skybox Security Suite and Palo Alto Networks WildFire, whereas Microsoft Defender for Identity is most compared with Splunk User Behavior Analytics, Rapid7 InsightIDR, IBM QRadar User Behavior Analytics, Microsoft Purview Insider Risk Management and Palo Alto Networks WildFire. See our Check Point Infinity vs. Microsoft Defender for Identity report.

      See our list of best ATP (Advanced Threat Protection) vendors.

      We monitor all ATP (Advanced Threat Protection) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.