Introducing G2.ai, the future of software buying.Try now

Compare Check Point Infinity Platform and Webroot Business Endpoint Protection

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Check Point Infinity Platform
Check Point Infinity Platform
Star Rating
(51)4.5 out of 5
Market Segments
Mid-Market (38.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Check Point Infinity Platform
Webroot Business Endpoint Protection
Webroot Business Endpoint Protection
Star Rating
(526)4.6 out of 5
Market Segments
Small-Business (54.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Webroot Business Endpoint Protection
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Webroot Business Endpoint Protection excels in ease of use, with users appreciating its lightweight and unobtrusive nature. Many highlight that it runs smoothly without slowing down devices, making it a great choice for businesses that prioritize productivity.
  • Users say that Check Point Infinity Platform stands out for its advanced features, particularly its centralized security management. Reviewers commend its ability to manage policies, logs, and threat intelligence from a single console, which enhances visibility and reporting capabilities.
  • According to verified reviews, Webroot Business Endpoint Protection offers a quick implementation process, with many users praising the intuitive management console that allows for remote user management. This feature is particularly beneficial for small businesses looking for efficient solutions.
  • Reviewers mention that Check Point Infinity Platform provides superior security efficacy through its AI-powered threat prevention. Users appreciate the seamless integration across various environments, ensuring consistent protection whether in data centers or cloud settings.
  • G2 reviewers highlight that while Webroot Business Endpoint Protection has a higher satisfaction score, Check Point Infinity Platform has a strong presence in the mid-market segment, indicating its effectiveness for larger organizations that require robust security solutions.
  • Users report that Webroot's focus on resource efficiency makes it a preferred choice for small businesses, while Check Point's comprehensive security features cater well to organizations needing extensive threat management capabilities, showcasing the strengths of both products in different market segments.
Pricing
Entry-Level Pricing
Check Point Infinity Platform
No pricing available
Webroot Business Endpoint Protection
No pricing available
Free Trial
Check Point Infinity Platform
No trial information available
Webroot Business Endpoint Protection
Free Trial is available
Ratings
Meets Requirements
8.9
39
9.3
395
Ease of Use
8.8
41
9.2
397
Ease of Setup
7.8
32
9.4
339
Ease of Admin
8.3
23
9.0
342
Quality of Support
8.9
37
8.8
363
Has the product been a good partner in doing business?
8.8
24
9.1
331
Product Direction (% positive)
9.1
39
8.4
371
Features by Category
9.1
11
Not enough data
Sandbox
8.8
10
Not enough data
Evaluation
9.2
10
Not enough data
8.7
9
Not enough data
8.5
9
Not enough data
8.7
9
Not enough data
Intrusion Detection and Prevention Systems (IDPS)Hide 14 FeaturesShow 14 Features
9.1
10
Not enough data
Prevention
9.4
9
Not enough data
9.4
9
Not enough data
9.2
8
Not enough data
9.2
10
Not enough data
8.9
9
Not enough data
Detection
9.0
10
Not enough data
8.8
10
Not enough data
9.2
10
Not enough data
Administration
8.7
10
Not enough data
8.3
10
Not enough data
8.7
9
Not enough data
Generative AI
Not enough data
Not enough data
Agentic AI - Intrusion Detection and Prevention Systems (IDPS)
Not enough data
Not enough data
Not enough data
Not enough data
Network Security Policy Management (NSPM)Hide 10 FeaturesShow 10 Features
9.3
11
Not enough data
Network Maintenance
9.3
9
Not enough data
9.3
10
Not enough data
8.8
10
Not enough data
Network Management
9.2
10
Not enough data
9.2
10
Not enough data
8.5
10
Not enough data
9.0
10
Not enough data
Network Monitoring
9.0
10
Not enough data
9.1
9
Not enough data
8.7
9
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.7
19
9.0
99
Administration
8.7
18
Feature Not Available
8.6
18
9.2
82
8.3
18
9.1
77
8.6
18
Feature Not Available
8.5
18
Feature Not Available
Functionality
8.7
18
Feature Not Available
9.2
18
9.0
77
9.3
18
9.0
79
8.9
18
9.2
85
Analysis
8.9
18
9.0
80
8.6
17
8.8
81
8.6
18
8.8
76
Software-Defined Perimeter (SDP)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Protection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
6.3
8
Generative AI
Not enough data
6.5
8
Not enough data
6.0
8
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.2
6
Not enough data
Generative AI
7.2
6
Not enough data
Security Information and Event Management (SIEM)Hide 14 FeaturesShow 14 Features
Not enough data
Not enough data
Network Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Incident Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Intelligence
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Security Information and Event Management (SIEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Orchestration, Automation, and Response (SOAR)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Automation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Orchestration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Response
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Check Point Infinity Platform
Check Point Infinity Platform
Webroot Business Endpoint Protection
Webroot Business Endpoint Protection
Check Point Infinity Platform and Webroot Business Endpoint Protection are categorized as Endpoint Protection Platforms and Endpoint Management
Reviews
Reviewers' Company Size
Check Point Infinity Platform
Check Point Infinity Platform
Small-Business(50 or fewer emp.)
34.0%
Mid-Market(51-1000 emp.)
38.3%
Enterprise(> 1000 emp.)
27.7%
Webroot Business Endpoint Protection
Webroot Business Endpoint Protection
Small-Business(50 or fewer emp.)
54.5%
Mid-Market(51-1000 emp.)
41.3%
Enterprise(> 1000 emp.)
4.2%
Reviewers' Industry
Check Point Infinity Platform
Check Point Infinity Platform
Computer & Network Security
27.7%
Information Technology and Services
19.1%
Manufacturing
8.5%
Computer Networking
6.4%
Telecommunications
4.3%
Other
34.0%
Webroot Business Endpoint Protection
Webroot Business Endpoint Protection
Information Technology and Services
22.4%
Computer & Network Security
13.2%
Hospital & Health Care
4.8%
Non-Profit Organization Management
3.6%
Financial Services
2.7%
Other
53.2%
Alternatives
Check Point Infinity Platform
Check Point Infinity Platform Alternatives
ThreatDown
ThreatDown
Add ThreatDown
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Sumo Logic
Sumo Logic
Add Sumo Logic
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
Webroot Business Endpoint Protection
Webroot Business Endpoint Protection Alternatives
ThreatDown
ThreatDown
Add ThreatDown
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
Add Symantec End-user Endpoint Security
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
Discussions
Check Point Infinity Platform
Check Point Infinity Platform Discussions
Monty the Mongoose crying
Check Point Infinity Platform has no discussions with answers
Webroot Business Endpoint Protection
Webroot Business Endpoint Protection Discussions
When to allow old and no longer active endpoint or sites - permanently to be remove from the list!
2 Comments
KH
Hey there, thank you for the product dev suggestion! If you'd like to discuss this further, please reach out to us on the Webroot community via the "submit a...Read more
Support for central event log server and linux?
2 Comments
TM
We are now compatible with Linux! Please reach out to support with any questions https://www.webroot.com/us/en/business/support/contactRead more
What is Webroot Endpoint Protection?
2 Comments
DJ
Webroot Business Endpoint Protection is a antivirus an antimalware application that is backed by real-time threat intelligence to protect businesses from...Read more