Top Rated Check Point Infinity Platform Alternatives
Security Service provided by Checkpoint for using multiple Security Solution for both On-Prem and Cloud
Range to Services such as CloudGuard for protecting workload
Cloud Connect offers a range of other services such as NGFW, EMail, API, and More for protection
SandBlast for Mobile/Windows and Mac EndPoint Protection
Centralize Console for all Security solution from Checkpoint with single glass view Review collected by and hosted on G2.com.
Licencing model for Infinity is not clear Review collected by and hosted on G2.com.
19 out of 20 Total Reviews for Check Point Infinity Platform
Overall Review Sentiment for Check Point Infinity Platform
Log in to view review sentiment.
In short time we can integrate data resources and gain telemetry within environment. This tool interface good visualizations and designed for bid database. Review collected by and hosted on G2.com.
When we going to create any custom machine learning model it gets crashed and sometimes it will hang also. It's important to fix this issue on priority basis and there are no more such particular dislikes to discuss. It's an awesome platform to work. Review collected by and hosted on G2.com.

Check Point Endpoint Security Suite has enhanced secure collaboration of teams in the enterpries and remote areas. The platform tracks data from initial processing to the end user providing best security measures that cannot be easily compromised. Data analysis has been safe and there is zero cases of malicious attacks. Review collected by and hosted on G2.com.
The security suite has achieved most crucial objectives of securing endpoint devices. Review collected by and hosted on G2.com.

The platform offers comprehensive protection cover against all forms of external threats that can affect development lifecycle. It provides secure access with powerful VPN to our remote developers to enhance secure collaboration and connection. Check Point Endpoint Security Suite has enhnaced compliance with security policies that safeguards data. Review collected by and hosted on G2.com.
The performance has been stable since we deployed this platform in the enterprise. Review collected by and hosted on G2.com.

This is the most advanced tool that has highly prevented cyber attacks in my department. It offers timely alerts when there impending ransoware attacks targeting our development projects. There were high rate of cases that could lead to higher risks and expose confidential customer data to external threats. Check Point Endpoint Security Suite has promoted secure data handling ethics. Review collected by and hosted on G2.com.
I encountered few learning curve challenges after deployment which lasted shortly afer full enrollment for video and physical training sessions. Review collected by and hosted on G2.com.

Check Point Endpoint Security provides soutions to protecst endpoint devices from cyber threats. It protects sensational data from unverified access or sharing. Review collected by and hosted on G2.com.
While working with Check point Endpoint Security, No dislike occured about the product. Review collected by and hosted on G2.com.

Check Point Endpoint Security is valued for its complete solution to endpoint security concerns, manageability and strong protection capabilities. Review collected by and hosted on G2.com.
Working with Check Point Endpoint Security no dislikes. Review collected by and hosted on G2.com.
The software takes care of data security and security check compliance efficiently. The software prevents any threat entry into the IT system and ensures no data loss or lapses. It is the leading unified security management solution for IT systems. Highly customizable and flexible EDR software. Review collected by and hosted on G2.com.
No problems have been faced and reported till now. Going well with the software running and its performance on the security ecosystem. It would be great if more customized security features were enabled for better use. Review collected by and hosted on G2.com.

It is a structure that I find very useful in terms of quickly identifying security vulnerabilities and reducing the total cost.Thanks to the real-time action mechanism, we are constantly one step ahead. Review collected by and hosted on G2.com.
As a result of my reviews, I did not encounter a bad or negative comment or user experience in general. Pricing can be confusing at times. Review collected by and hosted on G2.com.
I like this solution because it protects the entire IT infrastructure: network protection, cloud protection, desktop protection... I also appreciate the quality of the IT support and its availability (24 hours a day, 7 days a week) Review collected by and hosted on G2.com.
So far, I have not noticed any aspect that I don't like. The only criticism I can make is about the price, but this is understandable given the quality of the service. Review collected by and hosted on G2.com.
I appreciate the innovative side of the software. They use technologies that have machine learning capability to help identify new threats. Review collected by and hosted on G2.com.
Nothing. Up to now we have never had problems with Check Point. Review collected by and hosted on G2.com.