Top Rated Check Point Infinity Platform Alternatives
20 Check Point Infinity Platform Reviews
Overall Review Sentiment for Check Point Infinity Platform
Log in to view review sentiment.
Security Service provided by Checkpoint for using multiple Security Solution for both On-Prem and Cloud
Range to Services such as CloudGuard for protecting workload
Cloud Connect offers a range of other services such as NGFW, EMail, API, and More for protection
SandBlast for Mobile/Windows and Mac EndPoint Protection
Centralize Console for all Security solution from Checkpoint with single glass view Review collected by and hosted on G2.com.
Licencing model for Infinity is not clear Review collected by and hosted on G2.com.
Inifinity Total Protection is very good solution to up and running our business securely with all the way.
It is providing complete security to our local resources as well as remote / roaming resources and data as well. Review collected by and hosted on G2.com.
This kind of security only provide Check Point. There is absulately no such dislike Review collected by and hosted on G2.com.
Consolidated Cyber Security Architecture including Mobile/Network/Cloud/Hybrid and even Internet of Things (IoT) providing prevention from threats both known and unknown. Review collected by and hosted on G2.com.
While it does work its best to prevent Zero day attacks, someone needs to get affected in order for others in the industry to be safe guarded. Better and lighter resource utilized sandboxing feature should be integrated in the system. Review collected by and hosted on G2.com.
The Check Point Infinity architecture is the unified approach for building the unified security infrastructure of our company. I like that it covers all the pieces of the modern enterprise organization security needs - offices and data centers, public cloud environments, interconnects between them, as well as the end user devices - laptops, smartphones, tablets etc. We have the full control over what our employees could do with the devices we provide them, to provide the secure and reliable network infrastructure. I also like that all the components are tightly integrated and there is single endpoint to control all the elements - the Smart Console. Review collected by and hosted on G2.com.
Even so we had several support cases opened for the components of the Check Point Infinity architecture, as administrator, I'm satisfied with the solution and the abilities it provides, so can't describe any disadvantages at the moment, except for the overall price of the purchasing and maintaining the whole lot of the components. Review collected by and hosted on G2.com.

The building blocks of the Check Point Infinity solution work just great with each other, and the architecture may be easily extended. I also personally like that now there is only one application used to manage all the components - the new Smart Console ( if you worked with R77 version of the software, you will love the unified approach of R80). Review collected by and hosted on G2.com.
So far we are fully satisfied with the Check Point Infinity solution and can't provides any disadvantages of the solution. Review collected by and hosted on G2.com.

Its very easy to deploy and manage for security prospective. We can integrate all the CheckPoint tool / product. It has very good for administration also. Review collected by and hosted on G2.com.
There is nothing we can say which dislike. Review collected by and hosted on G2.com.
The ease of deployment and security that the platform offers.
It integrates with all Check Point protection tools such as Gateway, Cloud, Mobile, Endpoint and IOT, and Infrastructure as a Service.
In addition, the tool behind a well intuitive console, which reduces the effort with the administration. Review collected by and hosted on G2.com.
I believe that being a tool so robust and working for a long time with her, I do not see something that I do not like. Review collected by and hosted on G2.com.
The best thing is that it is extremely reliable. Its Endpoint function is the best in the market without any doubt. And its advanced threat prevention system is impressive. It is undoubtedly the best in the market. Review collected by and hosted on G2.com.
Obviously, it is CISCO, so the only thing that is fucked up is the price. Very good, but very good. Review collected by and hosted on G2.com.
I like that it is easy to use and connects instantly after putting incredientials. Review collected by and hosted on G2.com.
I dislike nothing. It is an easy tool to use and it takes no time at all to use it. Review collected by and hosted on G2.com.