Try our new research platform with insights from 80,000+ expert users

Check Point Infinity vs Proofpoint Targeted Attack Protection comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Infinity
Ranking in Advanced Threat Protection (ATP)
12th
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
29
Ranking in other categories
AI-Powered Cybersecurity Platforms (9th)
Proofpoint Targeted Attack ...
Ranking in Advanced Threat Protection (ATP)
30th
Average Rating
7.0
Reviews Sentiment
7.1
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Advanced Threat Protection (ATP) category, the mindshare of Check Point Infinity is 2.2%, up from 0.9% compared to the previous year. The mindshare of Proofpoint Targeted Attack Protection is 1.7%, down from 2.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP) Market Share Distribution
ProductMarket Share (%)
Check Point Infinity2.2%
Proofpoint Targeted Attack Protection1.7%
Other96.1%
Advanced Threat Protection (ATP)
 

Featured Reviews

Luis Diego Alvarado Diaz - PeerSpot reviewer
Has centralized cloud security tasks through an intuitive portal and simplified policy management processes
The best feature Check Point Infinity offers is Cloud Security Management. In this area, I use Quantum Security Management for excellent topics, Smart-1 Cloud. I have a good experience with Smart-1 Cloud and Quantum Security Management because Infinity Portal is an easy and better portal. The central features of Check Point Infinity in one portal are for me, the best topic about the Infinity Portal. Check Point Infinity has impacted my organization positively because it is easier to control and change VPNs and other features. I use this portal and Cloud One for management, security management in any location. It is more efficient because the portal is very intuitive. The policies in the gateway are easy to control, change, and create new policies. For us, it is the best part.
KC
Dynamic runtime engine and good protection, but needs better support and a single console
We have two to three issues per month. We contact Proofpoint's customer support for these issues. I am a major point of contact for support. If I am not able to resolve an issue, we will be reaching out to them. Proofpoint can take a couple of days to get back. I also deal with other applications from Okta and Microsoft, and we get the support within a couple of hours. There is a lot of difference between a couple of hours and a couple of days. So, Proofpoint's support should be improved. Okta and Microsoft are also able to do a Zoom or video call, but Proofpoint provides support only through email communication. Only if you request, it would be a Zoom or video session.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The tool's most valuable feature for threat prevention is the encryption alarm. I find the centralized management console, including the log analyzer and reports in Check Point Infinity, extremely beneficial for enhancing security and operations efficiency in our enterprise. I would rate it a perfect ten out of ten, as it effectively helps us analyze logs, and detect potential attacks."
"It provides fantastic visibility of security incidents through deconstructing and dissecting the threat's infection protocol."
"The sandblast threat emulation is great."
"Check Point Infinity's threat prevention capabilities benefitted our organization."
"One of the valuable aspects of Check Point Infinity is that I can use one unified portal for the administration of all these tools."
"The initial implementation was accomplished easily and without deployment problems."
"For me, one of the best features of Check Point Infinity is to be able to have the possibility of emulating the activity of attached files with malicious content in such a short time."
"Check Point Infinity has impacted my organization positively because it is easier to control and change VPNs and other features."
"It has a dynamic runtime engine, which gives it an advantage over Prisma that has a static engine. In Prisma, we have to do additional malware analysis, which is not required in Proofpoint."
 

Cons

"The cost of maintaining and purchasing the security components is high."
"The management console has given us some trouble, and the documentation is a little bit rigid in its solution paths."
"I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity."
"Something that should be better in Check Point Infinity is the customization, though I don't have any specific suggestions at this time."
"The console at the beginning also has the section on where to save the logs, however, if by mistake we choose a very remote area, this detail cannot be corrected unless the change of data center where the logs are housed, which is requested through support, which can become a management difficulty."
"Check Point Infinity's web application is sometimes a little slow."
"The solution is expensive."
"We have had some performance issues. Because of this, we had to redirect traffic to be analyzed by other appliances."
"We are using the TRAP console that has a Linux-based UI, which is not user-friendly. The TAP console looks very advanced. Currently, we are maintaining three different consoles, and it is sometimes hard to switch between them or try to grab the data."
 

Pricing and Cost Advice

"The product has good pricing considering the features and a global approach."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"I rate the product's price a six on a scale of one to ten, where one is cheap, and ten is expensive."
"Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."
"The pricing of Check Point Infinity could be better. There is a license needed to use the solution and we pay annually."
"When it comes to price, the paramount consideration is the strength of the security. If the security measures provided by the product, such as Check Point Infinity, are robust and meet our requirements, price becomes a secondary concern."
"The solution's price is quite high, and the licensing model requires extra licenses for various features like SD-WAN."
"The flexibility in pricing is advantageous, and being a special partner allows for negotiating special rates based on the project requirements."
Information not available
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
869,202 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
13%
Manufacturing Company
11%
Computer Software Company
11%
Financial Services Firm
11%
Manufacturing Company
12%
Financial Services Firm
9%
Healthcare Company
7%
Transportation Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business29
Midsize Enterprise8
Large Enterprise10
No data available
 

Questions from the Community

What do you like most about Check Point Infinity?
Check Point Infinity's threat prevention capabilities benefitted our organization.
What needs improvement with Check Point Infinity?
Something that should be better in Check Point Infinity is the customization, though I don't have any specific suggestions at this time.
What is your primary use case for Check Point Infinity?
The most common use case for Check Point Infinity is for managing all my gateways in one place and deploying everything from one place.
Ask a question
Earn 20 points
 

Also Known As

R80, Infinity
Targeted Attack Protection
 

Overview

 

Sample Customers

Edel AG
Brinker Capital
Find out what your peers are saying about Palo Alto Networks, Microsoft, Fortinet and others in Advanced Threat Protection (ATP). Updated: September 2025.
869,202 professionals have used our research since 2012.