Coming October 25: PeerSpot Awards will be announced! Learn more

Check Point Infinity vs RSA NetWitness Logs and Packets (RSA SIEM) comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Infinity and RSA NetWitness Logs and Packets (RSA SIEM) based on real PeerSpot user reviews.

Find out in this report how the two ATP (Advanced Threat Protection) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.

To learn more, read our detailed Check Point Infinity vs. RSA NetWitness Logs and Packets (RSA SIEM) report (Updated: September 2022).
636,406 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The good part is that you don't have to configure it, which is very convenient.""The risk level notifications are most valuable. We get to know what kind of intrusion or attack is there, and we can fix a problem on time.""Some of the valuable features on the email side are anti-phishing, anti-malware, and Safe Links.""The deployment capability is a great feature.""Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features.""The most valuable feature is the integration. It's a single console, so we don't have to switch around between multiple products. Another valuable feature is the ease of operations and maintenance.""Microsoft Defender for Office 365 is a stable solution.""The basic features are okay and I'm satisfied with the Defender."

More Microsoft Defender for Office 365 Pros →

"For me, one of the best features of Check Point Infinity is to be able to have the possibility of emulating the activity of attached files with malicious content in such a short time.""The most valuable feature of Check Point Infinity is the ease of use and navigation.""It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security.""New Check Point technologies can be found via this portal.""It is very easy to integrate new features.""The initial implementation was accomplished easily and without deployment problems.""The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."

More Check Point Infinity Pros →

"Offers a good wireless feature.""The software is scalable to whatever is required, and you can also put a lot of resources in the cloud.""The newer 11.5 version that my team is using has found it to have good mapping.""I can have enterprise security, email security, next generation firewall security log, HIDS and NIDS logs, etc. all on the same dashboard. It makes it easy to pinpoint or correlate our server to this. I can find out if there is lateral movement. This is the biggest advantage of this solution.""The solution is really scalable for the high-end power, enterprise customer.""The most valuable features are the packet inspection and the automated incident response.""The development of use cases on the SSA console is quite user friendly. This means that the security analyst or the researcher does not have to learn another language.""It's quite economical compared to other solutions in the market."

More RSA NetWitness Logs and Packets (RSA SIEM) Pros →

Cons
"In some situations, it has not been able to pick impersonated emails having no attachments. Technical support definitely has a scope for improvement.""We are always looking for others tools to increase automation on tasks. There can be better integration with other solutions, such as PowerPoint and email.""The custom alerts have to improve a lot.""In one of the reports I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go into the device and check. If they could include that file part in the report, without my having to go to the device itself, that would help.""They can improve their security in a way where a customer can know if all their attachments are safe or not to open through a report. The solution does its job perfectly, but it never reports to the customer whether those attachments have been stopped before or not.""There needs to be an improvement in integrating the product to work across multiple operating systems, and to have better support for non-Microsoft file types.""We need a separate license and we don't know how to get the license that is required.""The visibility for the weaknesses in the system and unauthorized access can be improved."

More Microsoft Defender for Office 365 Cons →

"The console at the beginning also has the section on where to save the logs, however, if by mistake we choose a very remote area, this detail cannot be corrected unless the change of data center where the logs are housed, which is requested through support, which can become a management difficulty.""They need to update the guides.""One of the main improvements that can be made is the latency in the portal.""Check Point Infinity price could improve.""The portal is provisioned in AWS. They should improve the cloud to make it faster.""They can improve the latency of the portal.""The licensing model for Check Point Infinity is not clear."

More Check Point Infinity Cons →

"Technical support could be improved.""There are instances where you try to run the reports and then it does not give you the desired outcome.""The multi-tenant capabilities are lagging compared to IBM QRadar.""The initial setup is complex. There are other solutions that are easier to implement.""Sometimes, it gives me static when integrating Windows-based systems. It should produce a precise log of sorts as to where the problem is. For example, a few days ago because of the McAfee application firewall, I couldn't get access to the particular Windows machine. So, my team and I had to figure out by ourselves that there was a virus responsible for the obstacle. This solution should trigger a meaningful log or message indicating the reason the user or implementer can't get into the machine.""The threat detection capability and centralizing and upgrading capability need to be improved. The threat alert capability needs to be improved as well because there is some lag time at present. They need to work on their database search too.""The solution should have more integration capabilities with different platforms.""Nowadays, their support is a little subpar compared to other solutions. I rate RSA support six out of 10."

More RSA NetWitness Logs and Packets (RSA SIEM) Cons →

Pricing and Cost Advice
  • "It's a user-base subscription."
  • "From the pricing point of view, like any other product in the market, there is scope for negotiation."
  • "Defender is a little bit more expensive as compared to others. We are in the manufacturing environment. So, we don't have a high budget for all of our endpoint devices. Its cost is a major concern for us."
  • "For licensing, it's usually a yearly package for customers who are subscribed to Office 365, but they can also pay on a monthly basis."
  • "Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
  • "Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
  • More Microsoft Defender for Office 365 Pricing and Cost Advice →

  • "Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."
  • "The pricing of Check Point Infinity could be better. There is a license needed to use the solution and we pay annually."
  • More Check Point Infinity Pricing and Cost Advice →

  • "There is a licensing fee and the customer can choose whether he wishes this to be subscription-based or perpetual."
  • "We are on an annual license for the use of the solution."
  • "RSA NetWitness Logs and Packets do not have a subscription model, it's a one-time purchase. There is only a perpetual license."
  • "We have yearly licensing costs. The license fee can be based on the volume of EPS. Some organizations may have, as a gentlemanly gesture, 10,000 EPS and get a 3,000 EPS license but actually use 5,000 EPS."
  • "Compared to the competition, the is price is not that high."
  • More RSA NetWitness Logs and Packets (RSA SIEM) Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which ATP (Advanced Threat Protection) solutions are best for your needs.
    636,406 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:It also gives the vulnerability status according to the versions you have selected. Let's say you have Google Chrome. It… more »
    Top Answer:I would recommend Microsoft Defender for Office 365. If you already have a deployment method, like CCM or something… more »
    Top Answer:In one of the reports, I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go… more »
    Top Answer:The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust… more »
    Top Answer:The licensing model for Check Point Infinity is not clear. As infinity licenses are based on the number of users, it… more »
    Top Answer:We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by… more »
    Top Answer:It would help if they could provide the malware analytics in the core package as that would make the cost more… more »
    Top Answer:I believe they could improve their support, there are often delays. The price of the solution could be reduced, it's… more »
    Comparisons
    Also Known As
    MS Defender for Office 365
    R80, Infinity
    RSA Security Analytics
    Learn More
    Overview

    Microsoft Defender for Office 365 protects all of Office 365 against advanced threats like business email compromise and credential phishing, and automatically investigates and remediates attacks. With Defender for O365 you get Integrated threat protection for all of Office 365 that gives you:

    - Native protection for Office 365 with built-in protection that simplifies administration, lowers total cost of ownership, and boosts productivity.

    - Unparalleled scale and effectiveness with powerful automated workflows to improve SecOps efficiency.

    - A complete solution for collaboration that protects you from attacks across the kill chain.

    To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity

    If you’re relying on log data to detect and prevent cyber threats, you’re in trouble. Attackers increasingly evade detection of log-centric security and network monitoring tools. But logs combined with full packet, endpoint NetFlow data are proven to provide the essential details for early threat detection. Here’s a closer look at our solution.

    Offer
    Learn more about Microsoft Defender for Office 365
    Learn more about Check Point Infinity
    Learn more about RSA NetWitness Logs and Packets (RSA SIEM)
    Sample Customers
    Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
    Edel AG
    Los Angeles World Airports, Reply
    Top Industries
    REVIEWERS
    Manufacturing Company25%
    Comms Service Provider25%
    Performing Arts13%
    Logistics Company13%
    VISITORS READING REVIEWS
    Computer Software Company20%
    Comms Service Provider11%
    Government8%
    Financial Services Firm7%
    VISITORS READING REVIEWS
    Computer Software Company34%
    Comms Service Provider14%
    Financial Services Firm12%
    Security Firm11%
    REVIEWERS
    Comms Service Provider31%
    Financial Services Firm25%
    Computer Software Company25%
    Manufacturing Company13%
    VISITORS READING REVIEWS
    Computer Software Company19%
    Comms Service Provider17%
    Financial Services Firm11%
    Government10%
    Company Size
    REVIEWERS
    Small Business33%
    Midsize Enterprise27%
    Large Enterprise40%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise18%
    Large Enterprise55%
    REVIEWERS
    Small Business56%
    Midsize Enterprise19%
    Large Enterprise25%
    VISITORS READING REVIEWS
    Small Business38%
    Midsize Enterprise18%
    Large Enterprise44%
    REVIEWERS
    Small Business26%
    Midsize Enterprise11%
    Large Enterprise63%
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise15%
    Large Enterprise63%
    Buyer's Guide
    Check Point Infinity vs. RSA NetWitness Logs and Packets (RSA SIEM)
    September 2022
    Find out what your peers are saying about Check Point Infinity vs. RSA NetWitness Logs and Packets (RSA SIEM) and other solutions. Updated: September 2022.
    636,406 professionals have used our research since 2012.

    Check Point Infinity is ranked 9th in ATP (Advanced Threat Protection) with 7 reviews while RSA NetWitness Logs and Packets (RSA SIEM) is ranked 7th in ATP (Advanced Threat Protection) with 12 reviews. Check Point Infinity is rated 9.0, while RSA NetWitness Logs and Packets (RSA SIEM) is rated 7.4. The top reviewer of Check Point Infinity writes "Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network". On the other hand, the top reviewer of RSA NetWitness Logs and Packets (RSA SIEM) writes "Economical with good technical support and is easily scalable". Check Point Infinity is most compared with CyberArk Privileged Access Manager, Palo Alto Networks VM-Series, Cisco Secure Network Analytics, Skybox Security Suite and Palo Alto Networks WildFire, whereas RSA NetWitness Logs and Packets (RSA SIEM) is most compared with Splunk, IBM QRadar, RSA enVision, Microsoft Sentinel and ArcSight Enterprise Security Manager (ESM). See our Check Point Infinity vs. RSA NetWitness Logs and Packets (RSA SIEM) report.

    See our list of best ATP (Advanced Threat Protection) vendors.

    We monitor all ATP (Advanced Threat Protection) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.