Find out what your peers are saying about CrowdStrike, Darktrace, Trend Micro and others in AI-Powered Cybersecurity Platforms.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
I would say we can save about 90% of our budget with Check Point Infinity.
Check Point support is very responsive.
The technical support is excellent with quick response times.
I gave customer support this rating because when I raised tickets, some took weeks or even up to six months to resolve.
A significant issue was contacting support after hours on the weekends.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
One issue I faced with scalability was the transition from Skybox Security Suite's 6500 platform to the 7500 series due to licensing costs becoming prohibitive.
If they provide timely and effective support, it would enhance stability and minimize glitches considerably.
When I log a ticket, they often take a long time to resolve the issue, with some tickets remaining unresolved for over six months.
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
The lack of continued support and problematic licensing costs were also areas needing improvement.
It would be better if something more attractive or similar useful information found in AlgoSec was available.
In terms of pricing, I find Check Point Infinity to be an expensive product.
The pricing is good as Check Point Infinity includes many tools and details that others might not have.
The product, as supported by Check Point, offers invaluable assistance for ease of deployment.
From a commercial perspective, AlgoSec is more expensive compared to Skybox Security Suite.
The pricing became prohibitive when transitioning between the 6500 and 7500 series models.
Check Point Infinity has positively impacted my organization by significantly reducing incidents.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
If we cannot keep our data secret, all our customers will be lost.
The tool successfully helped in preventing vulnerabilities and breaches.
The most helpful feature is the firewall analyzer.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
Skybox Security Suite provides comprehensive tools for network and firewall compliance, vulnerability management, and change management, with a focus on risk reduction and network optimization.
Skybox Security Suite supports over 130 vendors with massive scalability and seamless integration, notably with Nessus and Qualys. Its features include network path analysis and offline attack simulation, which enhance management effectiveness. Despite its robust offering, improvements are needed in its UI, web interface, reporting detail, and customization. Automation, orchestration, and device policy provisioning require better support, and integration with tools like Rapid7 could be improved. Enhancements in firewall configuration checks, cloud connectivity, pricing, and marketing awareness are also called for, alongside a transition from Java GUI to a consistent web-based system.
What Are Key Features of Skybox Security Suite?Skybox Security Suite is commonly used in industries requiring strict compliance like finance and healthcare. Firms employ it for firewall audits, enhancing network visibility, and managing configurations against standards such as PCI, ensuring security and policy compliance across expansive networks.
We monitor all AI-Powered Cybersecurity Platforms reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.