Try our new research platform with insights from 80,000+ expert users

Check Point Infinity vs Morphisec comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Infinity
Ranking in Advanced Threat Protection (ATP)
11th
Average Rating
8.6
Reviews Sentiment
7.4
Number of Reviews
28
Ranking in other categories
AI-Powered Cybersecurity Platforms (7th)
Morphisec
Ranking in Advanced Threat Protection (ATP)
34th
Average Rating
9.2
Reviews Sentiment
7.4
Number of Reviews
21
Ranking in other categories
Vulnerability Management (65th), Endpoint Protection Platform (EPP) (55th), Endpoint Detection and Response (EDR) (62nd), Cloud Workload Protection Platforms (CWPP) (36th), Threat Deception Platforms (16th)
 

Mindshare comparison

As of July 2025, in the Advanced Threat Protection (ATP) category, the mindshare of Check Point Infinity is 2.1%, up from 0.7% compared to the previous year. The mindshare of Morphisec is 1.1%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP)
 

Featured Reviews

NareshKumar9 - PeerSpot reviewer
Improved network security with real-time threat detection and alert system
There is room for improvement in Check Point Infinity as I encounter some glitches in its interface. Sometimes, the data utilization report does not show up in Check Point Infinity GUI, necessitating me to reach out to their support team, who typically indicates firmware issues that require new installations. This process can be frustrating, and I feel it should be addressed to enhance user experience. The customer support needs enhancement as well. When I log a ticket, they often take a long time to resolve the issue, with some tickets remaining unresolved for over six months. This duration is unacceptable, and it definitely needs to change; however, aside from that, everything else is satisfactory with Check Point Infinity.
Rick Schibler - PeerSpot reviewer
Offers in-memory protection at a lower price than competitors
Morphisec's in-memory protection is probably the most valuable feature because it stops malicious activity from occurring. If something tries to install or act as a sleeper agent, Morphisec will detect and stop it. Morphisec's Moving Target Defense is critical to hardening our attack surface. If it detects something, it indicates whether it's valid. That means you've got a breach requiring investigation. It detects anomalies but doesn't necessarily point to what caused them. You still need to do that work. The solution is reasonably easy to administer. They made some changes last year, adding a cloud-based monitoring solution that makes deploying and monitoring our endpoints easy.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features of the solution stem from factors like ease of use, visibility, and cost to the enterprise."
"For me, one of the best features of Check Point Infinity is to be able to have the possibility of emulating the activity of attached files with malicious content in such a short time."
"I recommend Check Point Infinity to other customers due to its notable benefits and positive experiences with a major financial institution."
"The solution is very stable. I would estimate it's 99.9% stable, if not more."
"Our company used Check Point Infinity to connect various locations worldwide through VPN, specifically using IPsec, rather than for cybersecurity. We implemented it in on-premises networks to collect data in data centers from different locations."
"Infinity is a technical console where we have to log in, and we can navigate to all the products very easily because it is written in a normal installation. People who know about the product can click and take care of their activity."
"The detection and reaction rates are good."
"It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security."
"It also provides full visibility into security events from Microsoft Defender and Morphisec in one dashboard. We've always had that capability with Morphisec. The more recent version appears to do that even a little bit more natively and it's given us visibility that we didn't have otherwise."
"Morphisec stops attacks without needing to know what type of threat it is, just that it is foreign. It is based on injections, so it would know when a software launches. If a software launches and something else also launches, then it would count that as anomalous and block it. Because the software looks at the code, and if it executes something else that is not related, then Morphisec would block it. That is how it works."
"Morphisec provides full visibility into security events from Microsoft Defender and Morphisec in one dashboard. Defender and Morphisec are integrated. It's important because it lowers the total cost of maintenance on the engineer's time, more or less. So the administrative time is dramatically reduced in maintaining the product. This saves an engineer around four to five hours a week."
"Morphisec is a straightforward solution that is efficient and very stable."
"I really like the integration with Microsoft Defender. In addition to having third-party endpoint protection, we're also enabling Defender... I like the reporting that we get from Defender, when it comes in. I like that it's one console showing both Morphisec and Defender where it provides me with full visibility into security events from Defender and Morphisec."
"The fact that Morphisec uses deterministic attack prevention that does not require human intervention has affected our security team's operations by making things much simpler. We don't have to really track down various alerts anymore, they've just stopped. At that point, we can go in and we can clean up whatever needs to be cleaned up. There are some things that Morphisec detects that we can't really remove, it's parts of Internet Explorer, but it's being blocked anyway. So we're happy with that."
"Since using Morphisec we have seen a downturn in attacks because Morphisec protects us versus Defenders and whatnot that are signature-based. I know we have not had any issues with ransomware or other zero-day attacks that we've seen with machines that, all of a sudden, have become before we instituted the product. Now the machine had to be re-imaged and there was a loss of data because something was on the machine. You couldn't really determine what was on the machine because nothing was picking it up. The products we were using weren't picking it up."
"We have seen it successfully block attacks that a traditional antivirus did not pick up."
 

Cons

"Check Point Infinity's web application is sometimes a little slow."
"We'd like to see support for fiber connections."
"Technical support is pretty delayed."
"In the future, I would like to see new developments that allow us to centralize the cloud."
"We have had some performance issues. Because of this, we had to redirect traffic to be analyzed by other appliances."
"The management console has given us some trouble, and the documentation is a little bit rigid in its solution paths."
"The tool's technical support lags."
"Check Point Infinity is not compatible with Windows 8."
"Those are some of the features that I was looking for on my on-prem platform that they've already instituted in the cloud and that I'm sure will be instituting on their on-prem platform as well. Having to have an on-prem server required a lot of administration. Being able to push that to the cloud and have it managed up there for us is a real nice addition."
"The weakest point of this product is how difficult it is to understand the reasons for an alert. This is a problem because it is hard to determine whether an attack is real or not."
"We sometimes have to depend on the support team to know what action we should take. If the solution for an alert can be built into the report that we are getting, it will save time, and the interaction with support would be less. At times, corrective action is required, but at times, we don't need to take any action. It would be good if we get to know in the report that a particular infection doesn't require any action. It will save us time and effort."
"The dashboard is the area that requires the most improvement. We have about, I would say 5,500 computers currently, and searching through all of those takes some time to filter. So as soon as you apply the filter, it takes a few seconds. It crunches, it thinks, and then it brings up the clients that match."
"We started in the Linux platform and we deployed to Linux. The licensing of that has been kind of confusing between Linux licensing and Windows licensing. The overall simplicity of licensing or offering an enterprise license to just cover everything and then we don't have to count needs improvement."
"It might be a bit much to ask, but we are now beginning to use Morphisec Scout, which provides vulnerability information. At this time, it's recognizing vulnerabilities and reporting them to us, but it's not necessarily resolving them. There's still a separate manual process to resolve those vulnerabilities, primarily through upgrades. We have to do that outside of Morphisec. If Morphisec could somehow have that capability built into it, that would be very effective."
"I haven't been able to get the cloud deployment to work. When there's an update, I'm supposed to be able to roll it out for the cloud solution, but right now I'm continuing to use our SCCM solution to update it."
"If anything, tech support might be their weakest link. The process of getting someone involved sometimes takes a little time. It seems to me that they should have all the data they need to let me know whether an alert is legitimate or not, but they tend to need a lot of information from me to get to the bottom of something. It usually takes a little longer than I would expect."
 

Pricing and Cost Advice

"I rate the product's price a six on a scale of one to ten, where one is cheap, and ten is expensive."
"The pricing of Check Point Infinity could be better. There is a license needed to use the solution and we pay annually."
"Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."
"The product has good pricing considering the features and a global approach."
"The solution's price is quite high, and the licensing model requires extra licenses for various features like SD-WAN."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"The flexibility in pricing is advantageous, and being a special partner allows for negotiating special rates based on the project requirements."
"When it comes to price, the paramount consideration is the strength of the security. If the security measures provided by the product, such as Check Point Infinity, are robust and meet our requirements, price becomes a secondary concern."
"Morphisec is reasonably priced because our parent company's other subsidiaries use different products like CrowdStrike. CrowdStrike is four or five times more expensive than Morphisec. The competitive pricing saves us money in our overall security stack."
"It does not have multi-tenants. If South Africa wants to show only the machines that they have, they need their own cloud incidence. It is not possible to have that in a single cloud incidence with multiple tenants in it, instead you need to have multiple cloud incidences. Then, if you have that, it will be more expensive. However, they are going to change that, which is good."
"Compared to their competitors, the price of Morphisec is not that high. You can easily deploy it on a large-scale or small-scale network."
"The pricing is definitely fair for what it does."
"It is priced correctly for what it does. They end up doing a good deal of discounting, but I think it is priced appropriately."
"Our licensing is tied into our contract. Because we have a long-term contract, our pricing is a little bit lower. It is per year, so we don't get charged per endpoint, but we do have a cap. Our cap is 80 endpoints. If we were to go over 80, when we renewed our contract, which is not until three years are over. Then, they would reevaluate, and say, "Well, you have more than 80 devices active right now. This is going to be the price change." They know that we are installing and replacing computers, so the numbers will be all over the place depending on whether you archive or don't archive, which is the reason why we just have to keep up on that stuff."
"We are still using a separate tool. I know for our 600 or I think we're actually licensed for up to 700 users, it runs me 23 or $24,000 a year. When you're talking to that many users plus servers being protected, that's well worth the investment for that dollar amount."
"Licenses are per endpoint, and that's true for the cloud version as well. The only difference is that there is a little extra charge for the cloud version."
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
860,632 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
13%
Computer Software Company
13%
Government
7%
Outsourcing Company
14%
Computer Software Company
13%
Financial Services Firm
10%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Infinity?
Check Point Infinity's threat prevention capabilities benefitted our organization.
What needs improvement with Check Point Infinity?
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
What is your primary use case for Check Point Infinity?
Within my organization, I primarily use Check Point Infinity for bandwidth utilization, load balancing, and we analyze all the spams, filters, and blocks. Another feature of Check Point Infinity th...
Ask a question
Earn 20 points
 

Also Known As

R80, Infinity
Morphisec, Morphisec Moving Target Defense
 

Overview

 

Sample Customers

Edel AG
Lenovo/Motorola, TruGreen, Covenant Health, Citizens Medical Center
Find out what your peers are saying about Check Point Infinity vs. Morphisec and other solutions. Updated: June 2025.
860,632 professionals have used our research since 2012.