Try our new research platform with insights from 80,000+ expert users

Check Point Infinity vs Proofpoint Email Protection vs Trellix Network Detection and Response comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
6.1
Check Point Infinity offers up to 90% budget savings with enhanced security, seamless remote access, and simplified management.
Sentiment score
6.5
Proofpoint Email Protection effectively reduced threats and costs, excelling in phishing defense, leading to significant efficiency improvements.
Sentiment score
8.5
Trellix Network Detection and Response exceeded expectations by improving threat prevention and detection, boosting productivity and reducing response times.
Automated policies enforcement and threat prevention have saved my team hours of manual configuration and incident handling.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
I would say we can save about 90% of our budget with Check Point Infinity.
 

Customer Service

Sentiment score
5.8
Check Point Infinity's customer service is praised for efficiency, but some users experience delays in issue resolution and escalation.
Sentiment score
7.1
Proofpoint Email Protection's customer service is praised for responsiveness and expertise, though some report slow responses or portal issues.
Sentiment score
6.8
Trellix's support is praised for responsiveness, but improvements in expertise and incident response promptness are suggested by some.
I would rate technical support from Check Point a perfect score because when I call them, they answer before I could breathe.
Check Point support is very responsive.
The technical support is excellent with quick response times.
I am familiar with the granular policy control feature of Proofpoint Email Protection, and I find their support excellent for modifying those policies.
Technical support needs improvement as sometimes engineers are not available promptly, especially during high-severity incidents.
 

Scalability Issues

Sentiment score
7.9
Check Point Infinity excels in scalability, offering flexibility and stability, suitable for both small businesses and larger enterprises.
Sentiment score
7.5
Proofpoint Email Protection excels in adaptability and scalability, serving both small and large enterprises with ease and flexibility.
Sentiment score
7.8
Trellix Network Detection and Response scales effectively in various industries, performing well in large enterprises without latency issues.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
Proofpoint is scalable for multi-site organizations with thousands of users.
 

Stability Issues

Sentiment score
8.6
Check Point Infinity is praised for high stability and reliability, with minor portal latency concerns and rare configuration issues.
Sentiment score
8.2
Users rate Proofpoint Email Protection highly for reliability and performance, with minor UI challenges and rare stability issues.
Sentiment score
7.7
Trellix Network Detection and Response is stable and reliable, with consistent performance and high user satisfaction despite occasional minor issues.
Check Point Infinity is a very stable solution; I don't remember experiencing any downtime.
Check Point Infinity is stable in my experience, and I can change everything with very good capability.
 

Room For Improvement

Check Point Infinity requires better customization, support, pricing, marketing, performance, cloud solutions, analytics, and intuitive features despite frequent updates.
Proofpoint Email Protection struggles with setup complexity, feature enhancements, pricing issues, and requires improved support and interface design.
Trellix Network Detection needs improved customization, integration, AI capabilities, support services, and a more user-friendly interface at reduced pricing.
A more guided setup process or contextual help within the dashboard would make it easier for new team members to get up to speed.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
Proofpoint could expand its phishing detection capabilities to improve its efficiency.
More security could be implemented.
I believe they still need to improve by consolidating some portals, as currently, you have to log in separately to a few of them.
There should be improvements in AI intelligence, faster decision-making, and a more responsive technical support team.
 

Setup Cost

Check Point Infinity's pricing is considered high, with additional fees and yearly payments, necessitating expert consultation and product trials.
Proofpoint Email Protection is considered costly, with pricing starting at $8 per user and varying by features.
Trellix Network Detection is costly but effective, with yearly licensing, discounts, and competitive pricing against some competitors like Palo Alto.
In terms of pricing, I find Check Point Infinity to be an expensive product.
The setup cost or license is very high.
The pricing is good as Check Point Infinity includes many tools and details that others might not have.
Customers pay around $90,000 yearly for a 1,000-user organization, with the subscription license being the main expense, apart from implementation fees.
Additional costs do come in, but it enhances security.
 

Valuable Features

Check Point Infinity offers centralized security management, real-time threat intelligence, and scalability, enhancing network control and policy efficiency.
Proofpoint Email Protection offers advanced threat defense, user-friendly interface, and seamless Office 365 integration for comprehensive email security.
Trellix excels in threat protection with AI-driven analysis, automation, and enhanced visibility, benefiting security operations and incident management.
Check Point Infinity has positively impacted my organization by making everything better, including the speed of the network and the security.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
The Infinity portal combines all Check Point solutions in one place, including the endpoint, SASE, and the SMP.
The most beneficial feature of Proofpoint Email Protection is mostly spam filtering; it was very efficient, and we were very happy with the functionality as only relevant emails were allowed for mailboxes.
I appreciate that it's the industry leader, and its firewalling is very easy to manage and implement.
The main feature I find most effective is that Proofpoint Email Protection scans emails and quarantines the doubtful ones.
Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch.
 

Mindshare comparison

AI-Powered Cybersecurity Platforms Market Share Distribution
ProductMarket Share (%)
Check Point Infinity0.6%
CrowdStrike Falcon19.3%
Darktrace18.8%
Other61.3%
AI-Powered Cybersecurity Platforms
Secure Email Gateway (SEG) Market Share Distribution
ProductMarket Share (%)
Proofpoint Email Protection21.0%
Microsoft Defender for Office 36527.6%
Mimecast Email Security12.5%
Other38.9%
Secure Email Gateway (SEG)
Advanced Threat Protection (ATP) Market Share Distribution
ProductMarket Share (%)
Trellix Network Detection and Response5.2%
Palo Alto Networks WildFire10.7%
Microsoft Defender for Endpoint9.0%
Other75.1%
Advanced Threat Protection (ATP)
 

Featured Reviews

Luis Diego Alvarado Diaz - PeerSpot reviewer
Has centralized cloud security tasks through an intuitive portal and simplified policy management processes
The best feature Check Point Infinity offers is Cloud Security Management. In this area, I use Quantum Security Management for excellent topics, Smart-1 Cloud. I have a good experience with Smart-1 Cloud and Quantum Security Management because Infinity Portal is an easy and better portal. The central features of Check Point Infinity in one portal are for me, the best topic about the Infinity Portal. Check Point Infinity has impacted my organization positively because it is easier to control and change VPNs and other features. I use this portal and Cloud One for management, security management in any location. It is more efficient because the portal is very intuitive. The policies in the gateway are easy to control, change, and create new policies. For us, it is the best part.
AhmedRamadan - PeerSpot reviewer
Optimize email security with effective sandboxing and auto Pull for quarantine
Proofpoint is used as an email security gateway for big enterprises, primarily for their on-premises servers. Many customers also use it alongside Office 365 Proofpoint offers a complete solution for email security with features like DLP, email archiving, and encryption. The most valuable…
BiswabhanuPanda - PeerSpot reviewer
Offers in-depth investigation capabilities, integrates well and smoothly transitioned from a lower-capacity appliance to a higher one
The in-depth investigation capabilities are a major advantage. When the system flags something as malicious, it provides a packet capture of that activity within the environment. That helps my team quickly identify additional context that most other tools wouldn't offer – like source IP or base64 encoded data. We can also see DNS requests and other details that aren't readily available in solutions like Check Point or others that we've tried. The detection itself is solid, and their sandboxing is powerful. There's a learning curve – you need a strong grasp of OS-level changes, process forking, registry changes, and the potential impact of those. But with that knowledge, the level of information Trellix provides is far greater than what we've seen elsewhere. The real-time response capability of Trellix has been quite effective, although it's not very fast. The key is this solution's concept of 'preference zero.' They don't immediately act on a zero-day. For example, the solution has seen a piece of malware for the first time. It'll let it in, then do sandboxing. Maybe after four or five minutes, it identifies that specific file's DNX Secure Store as malicious. At that point, they update the static analysis engine, and it gets detected if anything else tries to download the same file. There is that initial 'preference zero' concept, like with Panda. You may not hold traffic in the network. That's standard in the industry; we don't do much about it. To address that, we also have endpoint solutions. We use SentinelOne in our environment, which helps us identify threats like Western Bureaus and others.
report
Use our free recommendation engine to learn which AI-Powered Cybersecurity Platforms solutions are best for your needs.
872,706 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Security Firm
18%
Educational Organization
12%
Financial Services Firm
10%
Computer Software Company
10%
Computer Software Company
14%
Financial Services Firm
11%
Manufacturing Company
9%
Government
6%
Financial Services Firm
13%
Comms Service Provider
12%
Manufacturing Company
11%
Government
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business31
Midsize Enterprise7
Large Enterprise10
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise13
Large Enterprise17
By reviewers
Company SizeCount
Small Business19
Midsize Enterprise8
Large Enterprise19
 

Questions from the Community

What do you like most about Check Point Infinity?
Check Point Infinity's threat prevention capabilities benefitted our organization.
What needs improvement with Check Point Infinity?
I don't know how Check Point Infinity can be improved. I am familiar with this product, but I don't really know. Rega...
What is your primary use case for Check Point Infinity?
My main use case for Check Point Infinity is to use different applications of Check Point in cloud. In my work, I use...
What is your experience regarding pricing and costs for Proofpoint Email Protection?
In terms of pricing, it is okay compared to others. I would say it is normal. Additional costs do come in, but it enh...
What needs improvement with Proofpoint Email Protection?
I believe they still need to improve by consolidating some portals, as currently, you have to log in separately to a ...
What do you like most about FireEye Network Security?
We wanted to cross-reference that activity with the network traffic just to be sure there was no lateral movement. Wi...
What is your experience regarding pricing and costs for FireEye Network Security?
While I do not handle pricing directly, it is known that there is a variety of customers with different licensing nee...
What needs improvement with FireEye Network Security?
The Trellix solution could be improved by enhancing the Central Management Console for faster visibility, which would...
 

Also Known As

R80, Infinity
Proofpoint Enterprise Protection, Cofense PhishMe, Proofpoint Digital Protection
FireEye Network Security, FireEye
 

Overview

 

Sample Customers

Edel AG
Blocket, University of Waterloo, Lincoln Memorial University, WellSpan Health, U-Haul, Carestream Health, Westinghouse
FFRDC, Finansbank, Japan Advanced Institute of Science and Technology, Investis, Kelsey-Seybold Clinic, Bank of Thailand, City of Miramar, Citizens National Bank, D-Wave Systems
Find out what your peers are saying about CrowdStrike, Darktrace, Trend Micro and others in AI-Powered Cybersecurity Platforms. Updated: September 2025.
872,706 professionals have used our research since 2012.