

Trend Micro Deep Discovery and Check Point Infinity are two competing products in the cybersecurity space. Check Point Infinity generally holds the upper hand due to its comprehensive feature set, which justifies the investment.
Features: Trend Micro Deep Discovery offers superior threat detection, focusing on identifying advanced persistent threats, robust network traffic analysis, and real-time insights into potential breaches. Check Point Infinity provides an extensive suite of integrated security solutions, such as advanced threat prevention, endpoint protection, and cloud security, all within a unified architecture for seamless management and scalability.
Room for Improvement: Trend Micro Deep Discovery could benefit from improved deployment processes, enhanced integration with existing IT systems, and more user-friendly management interfaces. Check Point Infinity may improve by offering more competitive pricing, greater customization options in its user interface, and reducing complexity in its feature set to enhance usability.
Ease of Deployment and Customer Service: Check Point Infinity provides a streamlined deployment model that integrates well into existing IT environments, supported by responsive customer service that ensures quick issue resolution. Trend Micro Deep Discovery may have a more intricate setup process, requiring individualized configurations but offers detailed documentation for clear implementation guidance.
Pricing and ROI: Trend Micro Deep Discovery generally presents a competitive initial setup cost with a focus on threat detection capabilities, yet Check Point Infinity offers a higher return on investment through its extensive protection and consolidated security solutions, justifying its potentially higher upfront costs.
When I use different Check Point tools, I save support time overall.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
I would say we can save about 90% of our budget with Check Point Infinity.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
The technical support is excellent with quick response times.
Check Point support is very responsive.
If I were to rate them from 0 to 10, I would give them a nine or a ten.
The Infinity Portal lets us manage on-premises, cloud and edge environments from a single elastic console.
We have not faced any issues with scalability.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
If the appliance supports scalability, Trend Micro support will inform us, and we can implement it without replacing the hardware.
Check Point Infinity is a very stable solution; I don't remember experiencing any downtime.
Check Point Infinity is very stable for our company.
Check Point Infinity has achieved a 99.9% block rate on zero-day malware in the 2025 Miercom test.
The product updates and security updates are kept current, allowing us seamless integration with Trend Micro and getting daily updates and signatures without problems.
A more guided setup process or contextual help within the dashboard would make it easier for new team members to get up to speed.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
We have multiple components such as Deep Discovery Email Inspector for mail gateways, Deep Discovery Analyzer for sandboxing, and Deep Discovery Inspector, which serves as an IDS detecting malicious network traffic.
The solution is not scalable as it is an agent product rather than a product designed for scalability.
In terms of pricing, I find Check Point Infinity to be an expensive product.
The setup cost or license is very high.
We received a relative discount for this.
I do not consider it an expensive tool; its price is justified based on the capabilities that we receive when compared to another mail gateway or other vendors.
The solution is very expensive.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
Check Point Infinity has positively impacted my organization by making everything better, including the speed of the network and the security.
We have seen a faster response time and reduced effort from the network and security engineers while going through logs.
The most valuable capabilities of Trend Micro Deep Discovery Email Inspector include its ability to perform mail detection and mail filtration against various email attacks such as phishing and spam, serving as an email gateway for both inbound and outbound traffic.
This solution allows us to see anomalies, network traffic in our network, and zero-day threats.
| Product | Market Share (%) |
|---|---|
| Check Point Infinity | 2.5% |
| Trend Micro Deep Discovery | 2.0% |
| Other | 95.5% |

| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 9 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 6 |
| Large Enterprise | 9 |
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
Trend Micro Deep Discovery provides an intuitive interface and extensive threat visibility. It enhances detection with sandboxing and custom virtual machine images. Integration with Trend Micro Office Scan and Vision One ensures robust defense and detailed threat analysis.
Trend Micro Deep Discovery is a comprehensive network security tool used for intrusion detection, malware analysis, and zero-day vulnerability sandboxing. It supports various platforms and can be integrated with email and server protection. It's particularly useful for compliance with regulatory requirements through signature-based behavior analysis and virtual patching. Users benefit from easy installation, management, and responsive technical support.
What are the key features of Trend Micro Deep Discovery?Trend Micro Deep Discovery is implemented across sectors requiring stringent security measures, such as finance, healthcare, and government. It's favored for its ability to analyze diverse network traffic and provide exceptional protection against sophisticated threats while ensuring compliance with strict data regulations. Industry reviews highlight its role in safeguarding sensitive information through robust security frameworks and adaptable deployment options.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.