

Find out in this report how the two AI Observability solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
When I use different Check Point tools, I save support time overall.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
I would say we can save about 90% of our budget with Check Point Infinity.
SentinelOne Singularity Complete has helped reduce my organization's mean time to detect by fifty percent.
Since then, I have not faced any intrusions, which is one reason I chose SentinelOne over ESET.
We have not faced any attacks since we implemented it.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
The technical support is excellent with quick response times.
Check Point support is very responsive.
We are using the automated email process for support, and they respond within an hour or two hours sometimes.
A chat service would be beneficial.
The technical support from SentinelOne Singularity Complete is very active and good, with a strong knowledge base available online.
The Infinity Portal lets us manage on-premises, cloud and edge environments from a single elastic console.
We have not faced any issues with scalability.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
It's all auto-scale and auto-categorized, configuring automatically.
SentinelOne Singularity Complete is very scalable.
My deployment is relatively small, and SentinelOne Singularity Complete works within those constraints.
Check Point Infinity is a very stable solution; I don't remember experiencing any downtime.
Check Point Infinity is very stable for our company.
Check Point Infinity has achieved a 99.9% block rate on zero-day malware in the 2025 Miercom test.
This indicates room for improvement in stability when interacting with other solutions.
Initially, there were issues, particularly on the management side, but now the console is much more stable.
Everything is managed automatically, so there is no user interference needed for upgrades.
A more guided setup process or contextual help within the dashboard would make it easier for new team members to get up to speed.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
The only thing that prevented the attack from succeeding was a free version of Malwarebytes.
Providing a single pane of visibility for the end user would be beneficial.
That seems to play a little havoc and can conflict with manual installs, causing issues where it wants to delete and reinstall the client.
In terms of pricing, I find Check Point Infinity to be an expensive product.
The setup cost or license is very high.
We received a relative discount for this.
If you want protection, you have to pay the price.
There are other products that are less expensive, but I tell my clients that in security, they cannot cut corners or look for the cheapest solution.
Reputation and quality are important, but especially in today’s economy, price is a significant factor.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
Check Point Infinity has positively impacted my organization by making everything better, including the speed of the network and the security.
We have seen a faster response time and reduced effort from the network and security engineers while going through logs.
I have an advanced app providing visibility of all my endpoints, which was not the case before.
SentinelOne has a feature to decommission automatically, which has been fantastic.
There's also automation that gives my team free time, preventing them from having to look for every alert.
| Product | Market Share (%) |
|---|---|
| SentinelOne Singularity Complete | 2.4% |
| Check Point Infinity | 0.2% |
| Other | 97.4% |


| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 9 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 87 |
| Midsize Enterprise | 44 |
| Large Enterprise | 76 |
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
SentinelOne Singularity Complete delivers advanced endpoint protection leveraging AI-driven threat detection and behavior analysis for efficient malware and ransomware response. Its standout features enhance security insights and ensure comprehensive endpoint management.
SentinelOne Singularity Complete provides robust ransomware recovery through unique rollback capabilities and seamless integration with various security solutions. Its machine learning enhances endpoint protection, minimizing false positives and automating responses. While praised for real-time threat monitoring, incident management, and asset management, it faces challenges in managing the console, customizing UI, and maintaining policy flexibility. Some users report difficulties with deployment and integration with existing systems, and enhanced reporting, alert management, and documentation are desired. Its appeal extends to deploying across multiple operating systems, offering comprehensive security coverage and facilitating cybersecurity compliance.
What standout features does SentinelOne Singularity Complete offer?Industries implement SentinelOne Singularity Complete for its AI capabilities in advanced endpoint protection, particularly against malware and ransomware. It's utilized across diverse operating systems, aiding in real-time threat monitoring and facilitating compliance. Organizations use it for vulnerability assessments and asset management, ensuring optimal protection in complex IT environments.
We monitor all AI Observability reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.