In the realm of comprehensive security solutions, Check Point Infinity and Palo Alto Networks VM-Series are leading competitors. Check Point Infinity stands out due to its centralized threat prevention and response capabilities, while Palo Alto Networks VM-Series is highlighted for its robust security features with cloud integration.
Features: Check Point Infinity offers centralized threat prevention, seamless integration with Microsoft 365, and AI-driven security. Palo Alto Networks VM-Series boasts features such as WildFire, user-based control policies, and extensive traffic visibility in cloud environments.
Room for Improvement: Check Point Infinity could enhance endpoint solutions, simplify pricing, and improve cloud support. Palo Alto Networks VM-Series could refine its UI, enhance Azure integration, and improve technical documentation.
Ease of Deployment and Customer Service: Check Point Infinity is noted for versatile deployment across hybrid and public clouds, though customer service varies. Palo Alto Networks VM-Series excels in public cloud deployments with reliable technical support but needs better documentation.
Pricing and ROI: Check Point Infinity offers competitive, flexible licensing, emphasizing security over cost, delivering strong ROI. Palo Alto Networks VM-Series, though pricier, ensures significant value with flexible AWS Marketplace models, focusing heavily on security robustness.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
Customers can see data within a week, indicating a quick return on investment.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
The technical support is excellent with quick response times.
The support quality could be improved.
Resolving issues promptly.
They are responsive and provide high-quality assistance.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
They are easy to upgrade, and with credit licensing, they scale effectively according to demand.
The solution is scalable and can easily handle an increase in the number of users.
It is easy to use with an excellent graphical user interface and extensive documentation, which contributes to its high scalability.
Hardware is generally very stable.
I have not experienced any major problems or downtime.
Perfection is unlikely as the dynamic nature of traffic and constant changes can result in occasional bugs despite regular updates.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
If Check Point continues reforms of AI and takes more information from different origins, not only from its database but also from other brands, it can complete this information and make it stronger.
Integration with CSIRT across all use levels would make it easier for administrators to stay updated on the blocked entities without manual intervention.
Most customers go for partner-enabled support, which involves multiple layers, leading to delays.
When managing the firewall, it involves a Strata Cloud web browser that requires improvement to enhance deployment ease and call center efficiency.
The pricing is good as Check Point Infinity includes many tools and details that others might not have.
The product, as supported by Check Point, offers invaluable assistance for ease of deployment.
Palo Alto is expensive in terms of pricing, particularly when comparing features to cost.
The cost involves purchasing through a vendor, which might mark up due to the supply chain.
Pricing for Palo Alto Networks is higher than other OEMs, but considering the robustness and features, it gains customer trust.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
Check Point Infinity offers a multi-layered security approach that enhances our IT security environment.
We use these tools to prevent all known and unknown threats using Palo Alto Networks' Wildfire and other data filtering tools to gather information, analyze traffic, manage malicious traffic, and offer visibility, control, and attack prevention.
Palo Alto's robust threat intelligence supports new updates, and I can open cases directly with their Threat Intelligence team.
The DNS security significantly enhances security through visibility and detection, allowing control over crucial traffic like DNS, which is often exploited by ransomware.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
Palo Alto Networks VM-Series is a highly effective advanced threat protection (ATP) solution and firewall that can be hosted on cloud computing technologies designed by many different companies. It decreases the amount of time that it will take administrators to respond to threats. Users that deploy VM-series have 70% less downtime than those who use similar firewalls. Neither protection nor efficiency are concerns when this next-generation firewall is in play.
VM-Series is being deployed to protect both public and private cloud environments. This level of flexibility empowers organizations to run the environment or environments that best meet their needs without worrying that they are going to be exposed to digital threats due to the environment that they choose.
In the public cloud, users of Palo Alto Networks VM-Series can automate their deployment and dynamically scale up their environment while experiencing a consistent level of protection. This dynamic scalability means that they also integrate their security into their DevOps workflows so that their security can keep up with their activities and requirements. Users of private cloud environments can set up security policies that can be automated to be provisioned as the need arises. Organizations don’t need to slow down when they deploy VM-Series because it makes the task of defending them so simple that they can set their defenses and forget that they are even there.
Users gain a deep level of visibility when they deploy Palo Alto Networks VM-Series. App-ID technology enables organizations to see their network traffic on the application level and spot threats that might be trying to sneak in through vulnerable points in their defenses. It also leverages Palo Alto Networks WildFire and advanced threat protection to block the threats before they can escalate.
Palo Alto Networks VM-Series Features:
Reviews from Real Users:
Palo Alto Networks VM-Series is a solution that stands out when compared to other similar solutions. Two major advantages that it offers are its ability to protect users without degrading the efficiency with which their networks perform and its centralized management system.
Jason H., the director of information technology at Tavoca Inc, writes, “There is no noticeable trade-off between security and network performance. In fact, so far, we've not seen any negative network performance with it. We're very impressed in that regard.”
An information technology manager at a tech services company says, “We use Palo Alto’s Panorama centralized management system. We have an on-prem firewall where Panorama is very good for pulling logs in from the cloud so we can see what is going on. It gives us visibility into that as well as shows us what attacks are coming in. Palo Alto’s Panorama centralized management system simplifies our security posture based on our requirements. Instead of manually pulling logs, then generating them into readable formats, it gives us the console in a readable format to view.”
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.