Check Point Infinity vs Microsoft Defender Vulnerability Management comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Infinity and Microsoft Defender Vulnerability Management based on real PeerSpot user reviews.

Find out in this report how the two Advanced Threat Protection (ATP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Check Point Infinity vs. Microsoft Defender Vulnerability Management Report (Updated: May 2024).
772,649 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It is a scalable product.""The detection and reaction rates are good.""It is one of the best brands and products in terms of centralization.""It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security.""The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles.""The most valuable features of the solution stem from factors like ease of use, visibility, and cost to the enterprise.""Our network security posture has improved significantly due to several factors. We've seen a 25% reduction in security incidents due to Infinity's advanced threat prevention capabilities. Additionally, the platform's automation features led to a 20% increase in operational efficiency, allowing our security teams to focus on more strategic tasks.""For me, one of the best features of Check Point Infinity is to be able to have the possibility of emulating the activity of attached files with malicious content in such a short time."

More Check Point Infinity Pros →

"The solution helps identify threats and vulnerabilities.""The product’s most valuable features are compliance, recommendations, and inventories.""One valuable feature is the Microsoft Security Scorecard.""The product's stability is very high...The scalability of the product is amazing.""The solution is up-to-date and helps prevent zero-day attacks."

More Microsoft Defender Vulnerability Management Pros →

Cons
"The endpoint solutions offered by Check Point are not prominent enough in the market due to Check Point's poor marketing efforts.""Technical support is something that needs improvement.""The management console has given us some trouble, and the documentation is a little bit rigid in its solution paths.""The licensing model for Check Point Infinity is not clear.""In the future, I would like to see new developments that allow us to centralize the cloud.""The console at the beginning also has the section on where to save the logs, however, if by mistake we choose a very remote area, this detail cannot be corrected unless the change of data center where the logs are housed, which is requested through support, which can become a management difficulty.""Check Point Infinity is not compatible with Windows 8.""They need to update the guides."

More Check Point Infinity Cons →

"It is challenging to extract and customize reports from the system.""The setup phase of the product is not that easy and needs a person to have a certain level of expertise.""Integration can be improved.""The technical support takes too much time to resolve tickets.""The general support could be improved."

More Microsoft Defender Vulnerability Management Cons →

Pricing and Cost Advice
  • "Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
  • "Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."
  • "The pricing of Check Point Infinity could be better. There is a license needed to use the solution and we pay annually."
  • "The product has good pricing considering the features and a global approach."
  • "I rate the product's price a six on a scale of one to ten, where one is cheap, and ten is expensive."
  • "The flexibility in pricing is advantageous, and being a special partner allows for negotiating special rates based on the project requirements."
  • "While the initial payment might be perceived as relatively higher, the absence of hidden supplementing charges contributes to a straightforward and clear pricing model. The pricing is cheap and moderate."
  • "When it comes to price, the paramount consideration is the strength of the security. If the security measures provided by the product, such as Check Point Infinity, are robust and meet our requirements, price becomes a secondary concern."
  • More Check Point Infinity Pricing and Cost Advice →

  • "The product’s pricing is medium."
  • "The licensing model follows a per-user per-month structure."
  • "I rate the product's price a three on a scale of one to ten, where one is a low price, and ten is a high price."
  • "The tool is a bit costly."
  • More Microsoft Defender Vulnerability Management Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
    772,649 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:It provides threat detection, predictive analysis, advanced analytics, and advanced threat protection.
    Top Answer:I would like to provide my feedback and confirm the reports. The report is the main thing because we have to prepare our representations for senior management on behalf of that report. The solution's… more »
    Top Answer:Check Point Infinity is one of Check Point's AI-powered solutions. It is one of the most comprehensive, highly advanced security and threat solutions, which gives us complete robustness, flexibility… more »
    Ranking
    Views
    406
    Comparisons
    149
    Reviews
    19
    Average Words per Review
    570
    Rating
    8.6
    Views
    21
    Comparisons
    19
    Reviews
    4
    Average Words per Review
    353
    Rating
    8.3
    Comparisons
    Also Known As
    R80, Infinity
    Learn More
    Overview

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity

    Defender Vulnerability Management delivers asset visibility, intelligent assessments, and built-in remediation tools for Windows, macOS, Linux, Android, iOS, and network devices. Leveraging Microsoft threat intelligence, breach likelihood predictions, business contexts, and devices assessments, Defender Vulnerability Management rapidly and continuously prioritizes the biggest vulnerabilities on your most critical assets and provides security recommendations to mitigate risk.

    Sample Customers
    Edel AG
    Information Not Available
    Top Industries
    REVIEWERS
    Security Firm26%
    Financial Services Firm16%
    Cloud Solution Provider11%
    Manufacturing Company11%
    VISITORS READING REVIEWS
    Security Firm22%
    Financial Services Firm14%
    Computer Software Company13%
    Government10%
    VISITORS READING REVIEWS
    Computer Software Company15%
    Financial Services Firm12%
    Government10%
    Manufacturing Company8%
    Company Size
    REVIEWERS
    Small Business64%
    Midsize Enterprise15%
    Large Enterprise21%
    VISITORS READING REVIEWS
    Small Business49%
    Midsize Enterprise10%
    Large Enterprise41%
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise19%
    Large Enterprise59%
    Buyer's Guide
    Check Point Infinity vs. Microsoft Defender Vulnerability Management
    May 2024
    Find out what your peers are saying about Check Point Infinity vs. Microsoft Defender Vulnerability Management and other solutions. Updated: May 2024.
    772,649 professionals have used our research since 2012.

    Check Point Infinity is ranked 14th in Advanced Threat Protection (ATP) with 26 reviews while Microsoft Defender Vulnerability Management is ranked 24th in Advanced Threat Protection (ATP) with 5 reviews. Check Point Infinity is rated 8.8, while Microsoft Defender Vulnerability Management is rated 8.2. The top reviewer of Check Point Infinity writes "Provide unified threat prevention and response across our entire decentralized finance system". On the other hand, the top reviewer of Microsoft Defender Vulnerability Management writes "The vulnerability assessment is very accurate because it runs directly into the vulnerability database". Check Point Infinity is most compared with Cisco Secure Network Analytics, CyberArk Privileged Access Manager, Skybox Security Suite and Microsoft Defender for Office 365, whereas Microsoft Defender Vulnerability Management is most compared with Qualys VMDR, Tenable Nessus, Rapid7 InsightVM, Tenable Vulnerability Management and Microsoft Sentinel. See our Check Point Infinity vs. Microsoft Defender Vulnerability Management report.

    See our list of best Advanced Threat Protection (ATP) vendors.

    We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.