2020-03-16T06:56:14Z

What is your primary use case for Check Point Infinity?

Miriam Tover - PeerSpot reviewer
  • 0
  • 2
PeerSpot user
17

17 Answers

Ashish Upadhyay - PeerSpot reviewer
Real User
Top 5Leaderboard
2024-01-30T13:20:54Z
Jan 30, 2024

Check Point Infinity helps in developing centralized applications within an enterprise. Its primary use case is to enhance security and scalability in enterprise systems. It provides a robust framework for creating, managing, and securing centralized networks, ensuring data and transaction integrity. Check Point Infinity addresses scalability challenges by offering a solution capable of handling the growing volume of transactions while maintaining decentralization.

Search for a product comparison
Nuno Faria - PeerSpot reviewer
Real User
Top 10
2024-01-05T12:55:28Z
Jan 5, 2024

The use case involves managing various aspects, including endpoint security, SaaS interface, and firewall management within the Check Point Infinity architecture. The Infinity portal serves as a centralized hub for overseeing all components of the Check Point security suite. The architecture incorporates XDR and MDR, enabling automatic correlation of information. In scenarios where a security issue arises, the system can automatically analyze data from diverse platforms, such as endpoints, firewalls, and Office 365. T

Michael Mugagga - PeerSpot reviewer
User
Top 20
2023-10-17T05:00:00Z
Oct 17, 2023

We required a first line of defense to protect, monitor, and ensure that no confidential information leaves the internal network. We also required a device that can segment our network so that different subnets like the DMZ, Production network, and testing environments. Threat prevention that required AI and ML capabilities was another reason to acquire the Check Point Quantum Spark NGFW. Finally, it offers an all-in-one solution that was a necessity where the same instance could manage and monitor VPNs, application control, web filtering, intrusion detection, and email security.

Hendrik-Du Plooy - PeerSpot reviewer
Real User
Top 5
2023-10-03T13:14:21Z
Oct 3, 2023

My company's clients use Check Point Infinity to protect their data.

Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-01-28T19:45:00Z
Jan 28, 2023

We were looking for a solution that would allow us to establish a configuration with the different security devices remotely while centralizing management and including other products available at the security level. We looked into different options and brands that allowed us to establish, achieve and fulfill this need. This was one of the solutions that met all of these aforementioned characteristics, thus giving us 360º protection and accommodation in terms of managing security services.

NG
User
Top 5Leaderboard
2022-12-26T10:37:00Z
Dec 26, 2022

We needed to handle the administration of the tools that we have with Check Point without the use of administration servers and from the cloud. With this product, we can centrally manage our security environments for the company through a web portal. It is really easy to do it this way as the portal is managed directly by Check Point. We can detach ourselves from the portal and focus on the security of the infrastructure itself. The portal is extremely intuitive for admins.

Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,386 professionals have used our research since 2012.
Erick Chinchilla Mena - PeerSpot reviewer
Real User
Top 5
2022-11-06T05:00:00Z
Nov 6, 2022

Today we have the need to protect various infrastructures we have. We have infrastructure on-premise and in the cloud, and we have a variety of branches. All of the infrastructures has demanded greater security from us. We needed a new and evolved way of managing equipment and the security of our infrastructure. As a result of all these concerns, we have been adopting innovative security technologies, and this is where we have added additional value to the protection that we want to give to each of the places where we have hosted data and information. We have been adopting the themes of Infinity Cloud to have total protection.

Fabian Miranda - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-10-05T05:33:00Z
Oct 5, 2022

As part of a large organization, this product gained the visibility of our security team thanks to its reputation of having the most advanced technology against the latest cyber threats. It protects everything, from cloud and company networks to endpoints and mobile devices, by adopting Check Point Infinity security architecture as a strategy to neutralize fifth-generation threats that spread fast and at a large scale through different vectors. We also saved money in our security implementation measures with this solution.

Diana Alvarado - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-09-21T08:55:00Z
Sep 21, 2022

When validating the centralized environment, we began to use other tools of the Check Point family that are available through the portal. Some licenses already bring what is required to be able to manage. The tool complies with the mobility issue since it can be used from anywhere. The initial implementation was accomplished easily and without deployment problems. Its quite intuitive dashboard helped us a lot with the administration.

Kabelo Lamola - PeerSpot reviewer
Real User
Top 10
2022-09-14T15:40:46Z
Sep 14, 2022

Check Point Infinity is used to protect information that is moved to the cloud. For example, when you upload your documents to the cloud wherever you are, that document can be encrypted so that no one can access it outside that domain. If they try to impersonate a user they won't be able to access it. There is verification that takes place if they are requesting to access a document with a password and a username to gain access.

Jonathan Ramos G. - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-08-24T20:30:00Z
Aug 24, 2022

As we adapt to the changes left by the pandemic, we must adapt our technologies, our equipment, and the traditional scheme in which we worked must evolve. As a result of these changes, we have been adopting security and much of the administration with fully cloud services to be able to adapt to these changes and give greater adaptability to our technologies. With Check Point Infinity, we have the possibility of managing our platform from the cloud. It also offers us centralization and other solutions of the same portfolio in one place, taking advantage of great advantages; it is at this point where Check Point allows us to take advantage of a secure and centralized administration.

Adrian Cambronero - PeerSpot reviewer
Reseller
Top 5Leaderboard
2022-07-27T14:13:00Z
Jul 27, 2022

At the end of 2020, the company was growing its staff. In addition, the pandemic was beginning, and as a result of these two factors, the company needed to protect the organization. It was there that the Check Point Infinity tool was used. It is characterized as a great tool against the latest generation of cyber attacks all these attacks are found on mobile devices, endpoints, etc. Always in the security part, companies must be aware of technologies since it is an essential part of organizations, and Check Point Infinity is an excellent tool for these functions.

LD
User
Top 5Leaderboard
2022-07-27T06:53:00Z
Jul 27, 2022

The first use we had of this portal with these characteristics was Check Point Smart Cloud to manage our approved gateways in Microsoft Azure. Our vendor told us about the solution. It was not required to use a management server since this portal provided the same service of free or licensed with the same licenses already obtained from our gateways. It is really very easy to implement and offers very versatile usage, giving us economy since we do not have to use a server to be able to administer it. We are really happy with the service.

DAlvarado - PeerSpot reviewer
User
Top 5
2022-05-04T04:51:00Z
May 4, 2022

We have used the Infinity Check Point portal to use two edges, Harmony Connect, and the SmartConsole. We have managed our Check Point gateways through the web SmartConsole administration, which helps us not to have or depend on virtual or physical management, the licensing is included with the gateway license. On the other hand, we have also used the functionality of Check Point Harmony connect, all these functionalities integrated into a portal that has many more to complement all security departments.

BD
Real User
2021-03-30T06:29:00Z
Mar 30, 2021

We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors. These sophisticated attacks are on mobile devices, endpoints, cloud, and various enterprise networks. They easily bypass the conventional, static detection-based systems used by organizations today. The legacy perimeter-focused security approaches have become ineffective. The outdated assumption that everything inside the security perimeter can be trusted leaves organizations exposed for vulnerability and attack. To protect the organization, we need to move up to the latest generation of cybersecurity tools. These combine real-time threat prevention, shared intelligence, and the most advanced zero-trust security across network, cloud, endpoint, and mobile devices.

OP
Real User
2020-08-23T19:52:00Z
Aug 23, 2020

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

JH
Real User
2020-03-16T06:56:14Z
Mar 16, 2020

We primarily implement the solution for our clients.

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
Download Check Point Infinity ReportRead more