

Find out in this report how the two AI Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
When I use different Check Point tools, I save support time overall.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
I would say we can save about 90% of our budget with Check Point Infinity.
With Trellix Collaboration Security's endpoint telemetry, policy automation, and faster threat correlation, our team spent around 25 to 35% less time on routine investigations.
I have seen a return on investment with Trellix Collaboration Security; specifically, money was saved and fewer employees were needed because I do not need employees on different sites.
I observe that the return on investment is hindered by the lack of adequate training opportunities, with Trellix's own training being quite costly, ranging from 2,000 to 4,000 dollars, which many small or medium-sized businesses cannot afford.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
The technical support is excellent with quick response times.
Check Point support is very responsive.
My contract of support at Santander and BNP was a platinum support level, and with that, we really had a good experience.
My experience with the Indian support team was not as satisfactory since they did not provide adequate support to rectify issues.
The support isn't bad, but there is room for improvement in response time.
The Infinity Portal lets us manage on-premises, cloud and edge environments from a single elastic console.
We have not faced any issues with scalability.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
Scalability benefits me by allowing for growth.
The console is strong and can be used for a large quantity of machines without slowing down.
Trellix Collaboration Security scalability allows me to use sensors on-cloud, on-premises, inside premises, and in a hybrid environment.
Check Point Infinity is a very stable solution; I don't remember experiencing any downtime.
Check Point Infinity is very stable for our company.
Check Point Infinity has achieved a 99.9% block rate on zero-day malware in the 2025 Miercom test.
Sometimes, integration can be challenging, impacting its stability.
A more guided setup process or contextual help within the dashboard would make it easier for new team members to get up to speed.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
I would like to see the addition of email digital protection features, such as anti-spam and antivirus, not just sandboxing, in the on-premises solution.
To improve vulnerabilities, Trellix can use an automation process to check if the system is vulnerable.
Trellix Collaboration Security can be improved by making the reporting and analysis tools more detailed.
In terms of pricing, I find Check Point Infinity to be an expensive product.
The setup cost or license is very high.
We received a relative discount for this.
It is quite expensive and should be reconsidered.
The setup cost was very cheap.
My experience with pricing, setup cost, and licensing for Trellix Collaboration Security is that pricing and setup were reasonable and licensing was straightforward.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
Check Point Infinity has positively impacted my organization by making everything better, including the speed of the network and the security.
We have seen a faster response time and reduced effort from the network and security engineers while going through logs.
Another feature I believe is very important is the real-time response capability. It is possible to collect artifacts, run scripts, kill processes, and isolate machines all without leaving the interface.
One of the most valuable features is the protection against vulnerabilities, particularly through virtual patching.
The entire system is stable and delivers what the customer needs.
| Product | Mindshare (%) |
|---|---|
| Check Point Infinity | 1.1% |
| Trellix Collaboration Security | 0.7% |
| Other | 98.2% |


| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 9 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 4 |
| Large Enterprise | 13 |
Check Point Infinity offers unified security management, integrating with Active Directory for a streamlined experience. It centralizes network, endpoint, and cloud security, enhancing efficiency and visibility while employing AI-driven threat prevention.
Check Point Infinity simplifies operations with its unified console, providing seamless integration across enterprise environments. With ThreatCloud AI, real-time analytics, and automation, Infinity enables proactive threat prevention and policy enforcement, strengthening security and reducing manual workloads. However, performance issues, a steep learning curve, and complex setup are challenges users may face. Its interface demands a detailed onboarding process, and while centralization improves threat prevention and policy consistency, the platform has complex licensing and costly implementation, especially for large organizations.
What are the most notable features?In industries like finance, healthcare, and telecommunications, Check Point Infinity is implemented to protect critical infrastructure from advanced cyber threats. Organizations utilize its centralized dashboard for firewall management and comprehensive threat detection, ensuring compliance and data security.
Trellix Collaboration Security enhances communication platforms with robust protective measures, utilizing threat intelligence, secure file sharing, customizable dashboards, and cloud compatibility. Its design fosters real-time threat prevention with features like deep packet inspection and automatic mail scans.
Established to secure communications, Trellix Collaboration Security employs advanced technologies like GTI threat intelligence and SSL to ensure data safety. Users benefit from real-time threat detection, streamlined cloud integration, and a responsive interface. Its functionalities include automatic email scanning, firewall and anti-spam capabilities that build a reliable security infrastructure revered for its scalability and straightforward deployment. Trellix also integrates threat intelligence tools and enhances control over security operations, encouraging efficient prevention strategies.
What are the essential features of Trellix Collaboration Security?In distinct industries like finance and healthcare, Trellix Collaboration Security plays a crucial role in ensuring email protection and secure data exchange. It helps these sectors combat threats like phishing and unauthorized access by leveraging advanced scanning methods and integrating management tools such as LDAP. Organizations value its ability to safeguard network communications and manage large-scale endpoints effectively, whether on-premise or in the cloud. The solution's customization and configuration capabilities allow tailored implementations, ensuring optimal protection across diverse operational needs.
We monitor all AI Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.