Trellix Network Detection and Response and Check Point Infinity compete in the network and endpoint security category. Check Point Infinity appears to have the upper hand due to its broader integration and management capabilities.
Features: Trellix Network Detection and Response provides excellent detection capabilities, especially against zero-day attacks and APTs, along with a strong incident response tool. Its sandboxing and malware analysis features provide comprehensive malicious software analysis. Check Point Infinity offers a wide security architecture that covers devices, networks, and cloud environments. It combines endpoint protection and real-time threat prevention, allowing simplified management through a unified console and excellent application visibility and control.
Room for Improvement: Trellix could improve network visibility and integration with third-party solutions. Enhancements in analytics influenced by McAfee and FireEye integration are needed, along with better cloud integration for malware detection. Check Point Infinity needs a more straightforward price structure and improved user-friendly documentation. Its support services and portal performance, including latency, require enhancements. Compatibility with newer platforms could also improve.
Ease of Deployment and Customer Service: Trellix Network Detection and Response is designed for on-premises setups with robust technical support. Check Point Infinity supports diverse deployment options, including hybrid and public cloud, offering great flexibility. Customer service for both is high, but Check Point’s complex pricing might hinder smaller businesses.
Pricing and ROI: Trellix's pricing is considered high due to its comprehensive features, but the ROI is positive for threat prevention efficiency. Check Point Infinity has competitive pricing, though some users find it expensive, specifically the license structure needing simplification. Both solutions show substantial ROI, with investments seen as valuable for threat prevention, increasing productivity, and reducing breach response times.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
The technical support is excellent with quick response times.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
Technical support needs improvement as sometimes engineers are not available promptly, especially during high-severity incidents.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
If Check Point continues reforms of AI and takes more information from different origins, not only from its database but also from other brands, it can complete this information and make it stronger.
There should be improvements in AI intelligence, faster decision-making, and a more responsive technical support team.
The pricing is good as Check Point Infinity includes many tools and details that others might not have.
The product, as supported by Check Point, offers invaluable assistance for ease of deployment.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
Check Point Infinity offers a multi-layered security approach that enhances our IT security environment.
Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
Detect the undetectable and stop evasive attacks. Trellix Network Detection and Response (NDR) helps your team focus on real attacks, contain intrusions with speed and intelligence, and eliminate your cybersecurity weak points.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.