


Find out what your peers are saying about CrowdStrike, Darktrace, Trend Micro and others in AI-Powered Cybersecurity Platforms.
Automated policies enforcement and threat prevention have saved my team hours of manual configuration and incident handling.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
I would say we can save about 90% of our budget with Check Point Infinity.
I would rate technical support from Check Point a perfect score because when I call them, they answer before I could breathe.
Check Point support is very responsive.
The technical support is excellent with quick response times.
I am familiar with the granular policy control feature of Proofpoint Email Protection, and I find their support excellent for modifying those policies.
Technical support needs improvement as sometimes engineers are not available promptly, especially during high-severity incidents.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
Proofpoint is scalable for multi-site organizations with thousands of users.
Check Point Infinity is a very stable solution; I don't remember experiencing any downtime.
Check Point Infinity is stable in my experience, and I can change everything with very good capability.
A more guided setup process or contextual help within the dashboard would make it easier for new team members to get up to speed.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
Proofpoint could expand its phishing detection capabilities to improve its efficiency.
More security could be implemented.
I believe they still need to improve by consolidating some portals, as currently, you have to log in separately to a few of them.
There should be improvements in AI intelligence, faster decision-making, and a more responsive technical support team.
In terms of pricing, I find Check Point Infinity to be an expensive product.
The setup cost or license is very high.
The pricing is good as Check Point Infinity includes many tools and details that others might not have.
Customers pay around $90,000 yearly for a 1,000-user organization, with the subscription license being the main expense, apart from implementation fees.
Additional costs do come in, but it enhances security.
Check Point Infinity has positively impacted my organization by making everything better, including the speed of the network and the security.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
The Infinity portal combines all Check Point solutions in one place, including the endpoint, SASE, and the SMP.
The most beneficial feature of Proofpoint Email Protection is mostly spam filtering; it was very efficient, and we were very happy with the functionality as only relevant emails were allowed for mailboxes.
I appreciate that it's the industry leader, and its firewalling is very easy to manage and implement.
The main feature I find most effective is that Proofpoint Email Protection scans emails and quarantines the doubtful ones.
Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch.
| Product | Market Share (%) |
|---|---|
| Check Point Infinity | 0.6% |
| CrowdStrike Falcon | 19.3% |
| Darktrace | 18.8% |
| Other | 61.3% |
| Product | Market Share (%) |
|---|---|
| Proofpoint Email Protection | 21.0% |
| Microsoft Defender for Office 365 | 27.6% |
| Mimecast Email Security | 12.5% |
| Other | 38.9% |
| Product | Market Share (%) |
|---|---|
| Trellix Network Detection and Response | 5.2% |
| Palo Alto Networks WildFire | 10.7% |
| Microsoft Defender for Endpoint | 9.0% |
| Other | 75.1% |



| Company Size | Count |
|---|---|
| Small Business | 31 |
| Midsize Enterprise | 7 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 13 |
| Large Enterprise | 17 |
| Company Size | Count |
|---|---|
| Small Business | 19 |
| Midsize Enterprise | 8 |
| Large Enterprise | 19 |
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
Proofpoint Email Protection provides powerful filtering against spam, phishing, and malware, leveraging effective threat detection and blocking capabilities. This solution integrates smoothly with platforms like Office 365, offering a user-friendly dashboard for seamless operations.
Proofpoint Email Protection focuses on email security, ensuring protection against phishing, malware, and spam. It includes features like URL scanning, anti-phishing, anti-virus protection, and sandboxing for comprehensive threat analysis. Its advanced analytics through TAP and TRAP, along with strong integration abilities, make it appealing for handling email threats. While scalability and ease of deployment are advantages, challenges such as integration in complex environments, the cost, and limited local support require attention. Enhancements in search functionality, email encryption, and improved phishing detection are also needed.
What are the key features of Proofpoint Email Protection?Industries adopting Proofpoint Email Protection include finance, healthcare, and education sectors, which benefit from its robust email security measures. Educational institutions prioritize safe communication for staff and students, while healthcare organizations focus on protecting sensitive patient data. Financial services benefit from preventing data breaches and fraud through advanced threats management.
Detect the undetectable and stop evasive attacks. Trellix Network Detection and Response (NDR) helps your team focus on real attacks, contain intrusions with speed and intelligence, and eliminate your cybersecurity weak points.