Overview
This marketplace listing is used to fulfill non-standard transaction (Check Point Software and Services), therefore the pricing table doesn't list any product entitlements and doesn't list any product SKUs, (final prices and entitlements are defined via a Private Offer quote).
Highlights
- Check Point Software and Services
Details
Unlock automation with AI agent solutions

Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/month |
|---|---|---|
Enterprise SW Offer | Check Point security private Software offer | $10,000.00 |
Enterprise PS Offer | Check Point security private PS hours offer | $10,000.00 |
Enterprise HW Offer | Check Point security private HW offer | $10,000.00 |
Vendor refund policy
No Refund
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Support
Vendor support
https://www.checkpoint.com/support-services/contact-support/Â 24x7 email support with emergency phone number. Premier support available for enterprise customers.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Unified threat prevention and centralized management have streamlined security operations and improved efficiency
What is our primary use case?
My main use for Check Point Infinity is unified security management across multiple environments. I use it most often to protect email, endpoints, and cloud applications under a single infrastructure architecture. It has reduced problems and improved visibility. Having everything integrated means threats are detected and blocked faster, while policies stay consistent across the organization.
Unified security management made a real difference during a phishing campaign that targeted both email and cloud collaboration tools at the same time. Because everything was integrated under one platform, the alerts came through in a single dashboard, and the policies applied consistently across endpoints, email, and cloud apps. This allowed my team to quickly identify the scope of the attack, block the malicious links, and prevent data exposure without having to jump between different systems.
I also use Check Point Infinity to simplify compliance reporting and strengthen cloud security. Having one platform that covers endpoints, gateways, and other applications, I can apply consistent policies and generate reports that auditors find clear.
What is most valuable?
One of the best features for me is unified threat prevention and centralized management.
Unified threat prevention and centralized management have helped my team day-to-day by reducing the time spent switching between different tools and dashboards. For example, when I had to investigate suspicious traffic across endpoints, gateways, or events in the VPN, everything was visible in one place. We could quickly trace the issue and apply consistent policies without delays.
Check Point Infinity has positively impacted my organization by streamlining security prevention and strengthening our overall posture. With everything managed under one platform, I've noticed clear improvements in efficiency since my team no longer has to juggle multiple tools or dashboards. I've also seen cost savings by consolidating licensing and reducing the need for separate solutions. By consolidating multiple tools into one platform, my team saves several hours each week that used to be spent switching between dashboards and managing separate policies. The unified platform has also reduced troubleshooting time during incidents.
What needs improvement?
The addition of languages for the support could improve Check Point Infinity. Support is currently only available in English. I suggest adding additional language support.
For how long have I used the solution?
I have been using Check Point Infinity for around six years.
What other advice do I have?
I rate Check Point Infinity a nine out of ten because I think about the language, as support is only in English. I believe different languages could be incorporated into the support. Check Point Infinity is an excellent tool because it centralizes multiple solutions in one portal. It is very important for all IT administrator teams. I recommend this tool.
Centralized threat prevention and faster incident response have improved operational efficiency
What is our primary use case?
My main use case for Check Point Infinity is unified threat prevention, centralized management, and end-to-end protection across network, cloud, and endpoint environments.
What is most valuable?
The best features Check Point Infinity offers are its unified threat prevention and centralized management, which make daily operation much simpler.
Centralized management makes daily operations simpler by allowing me to control policies and monitor threats from one console instead of juggling multiple tools. It streamlines tasks like updating firewall rules, applying endpoint protection, and managing VPN access for remote users. We can quickly push consistent security settings across network and cloud environments, which saves time and reduces errors.
Another feature I find particularly valuable in Check Point Infinity is the threat intelligence integration that keeps our defenses updated against new attacks, providing real-time insights that help us adapt quickly and block emerging threats before they impact users.
Since implementing Check Point Infinity, we have noticed a clear improvement in our overall security posture and efficiency because the unified threat prevention reduced the need for multiple point security and simplified daily operation through centralized management.
What needs improvement?
I think Check Point Infinity could be improved in terms of documentation. I need more images and pictures, and the steps should be more intuitive.
Another improvement I would like to see in Check Point Infinity is a more streamlined onboarding process for new administrators since the initial setup can feel complex. Better documentation and guided tutorials would make adoption faster and easier.
For how long have I used the solution?
I have been using Check Point Infinity for around three and a half years.
What do I think about the stability of the solution?
Check Point Infinity is stable in my experience.
What do I think about the scalability of the solution?
The scalability of Check Point Infinity is impressive.
How are customer service and support?
The customer support for Check Point Infinity is very fast when handling different tickets.
How would you rate customer service and support?
Neutral
What was our ROI?
The metric we track for our return on investment is time saved.
I save time with Check Point Infinity because it allows employees to have more free time during the day without any problems related to security.
What's my experience with pricing, setup cost, and licensing?
I had a great experience with pricing, setup cost, and licensing, with no problems encountered at all.
What other advice do I have?
A recent scenario where Check Point Infinity was especially helpful was during a phishing campaign targeting our employees, where the solution quickly blocked malicious email and prevented access to harmful links across both network and endpoint devices. The centralized management console allowed us to monitor the incidents in real-time and apply consistent policies without delays. This not only protected sensitive data, but also reduced downtime and gave our team confidence that threats were contained effectively.
A second example is focused on cloud workloads and remote users, illustrating that we have a variety of things to consider.
In practice, Check Point Infinity helps us protect cloud workloads by applying consistent security policies across Azure environments while also monitoring traffic for advanced threats. For remote users, it provides secure VPN access and endpoint protection that ensures they can connect safely from anywhere without exposing the network.
We have seen a measurable reduction in security incidents and phishing attempts reaching users, leading to improved response times because alerts are centralized and easier to track, which allows faster action. The unified policies across network, cloud, and endpoint environments have lowered misconfigurations and reduced downtime.
I advise others looking into using Check Point Infinity that it is a great tool for centralizing different kinds of security tools by Check Point. It is an excellent idea and provides centralized security. Check Point Infinity centralized is excellent.
I would rate this product an eight out of ten.
Improves daily threat prevention with real-time detection and requires better alert tuning for faster prioritization
What is our primary use case?
Our main use case for Check Point Infinity is to manage and protect our network from advanced threats. We use it for firewall control, threat prevention, and secure access for remote users. It also helps us monitor traffic and block risky activities and keep our endpoints safe. The platform also gives us clear reports so our team can respond faster. Overall, we can rely on it to keep our environment secure and stable every day.
Recently our team used Check Point Infinity to stop suspicious inbound connections that were targeting one of our internal apps. The system flagged and instantly blocked the activities before any damage was done. The alert Check Point Infinity gave us was clear and detailed so we could review logs and confirm it was a real threat. This quick detection saved us time and prevented a possible breach. It shows how useful the platform is in our daily security work.
What is most valuable?
Check Point Infinity offers many valuable features including AI-powered threat prevention, unified management, autonomous threat prevention, and generative AI copilot, scalable architecture, managed security services that monitor threat intelligence and support from Check Point experts. Users use ThreatCloud AI with 50 engines to block zero-day malware, malware, phishing and advanced threats.
ThreatCloud AI is an engine that gives very strong real-time threat prevention. AI Copilot helps us automate incident response, policy tuning, and threat hunting, saving a lot of manual effort. Managed security services with a dedicated team backing the platform gives confidence and support, especially when things get complex. If I had to pick one, it would be ThreatCloud AI because blocking threats early is the foundation of everything else for us.
Since deploying Check Point Infinity, we have seen a big drop in security incidents thanks to its strong AI-driven threat prevention. Response times have improved dramatically because of the automated XDRÂ workflows. The unified console has simplified managing our firewalls, endpoints and cloud, reducing admin overhead for us. Having the managed security team support has increased our confidence in handling complex threats. Overall, our security posture feels more proactive and resilient.
What needs improvement?
Check Point Infinity is powerful, but there are a few areas that could improve. The learning curve for new users can be steep, especially when managing multiple modules like CloudGuard, Quantum, and Harmony together. Some alerts can be overwhelming, making it harder to prioritize without fine-tuning. While automation helps, occasional manual adjustments are still needed. Overall, it is strong, but simplifying onboarding and alert management would make it even better.
Integration with third-party tools could be smoother. The reporting dashboard could be more customizable for quick insights. Performance on very large networks can sometimes slow during updates. Overall, while the platform is strong, improving user experience, alert management, and integration would make it even more efficient for daily operations.
For how long have I used the solution?
I have been working in my current field since the last 1.4 years.
What do I think about the stability of the solution?
Check Point Infinity has achieved a 99.9% block rate on zero-day malware in the 2025 Miercom test. It has also reached a high phishing prevention rate in the same report. These numbers correlate with fewer real incidents, faster detection, and much lower noise, which we have seen in our organization.
What do I think about the scalability of the solution?
Our experience with Check Point Infinity scalability has been very positive. The Infinity Portal lets us manage on-premises, cloud and edge environments from a single elastic console.
How are customer service and support?
We have reached out to Check Point support a few times. Overall, the response is decent for critical issues. For some critical issues, some users praise their promptness, but others note delays. Tickets sometimes take too long. Documentation could also be more up-to-date.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We evaluated several options before selecting Check Point Infinity. We evaluated Palo Alto Networks, specifically NGFW, since it is a strong all-around security platform. We also evaluated Fortinet, especially Fortinet firewalls for network security, and Microsoft Security.
How was the initial setup?
It was a fresh installation, so we have not migrated any software before implementing Check Point Infinity.
What about the implementation team?
We did not use an external implementation team.
What was our ROI?
We have seen a solid return on investment with Check Point Infinity.
What's my experience with pricing, setup cost, and licensing?
Our experience with Check Point Infinity pricing and licensing was mixed. The subscription model is flexible with one-year and multi-year plans based on per-user or deployment size. Setup costs were moderate but negotiating the price was necessary. Cost depends heavily on scale. According to PeerSpot users, pricing is not fixed and is based more on machines than users.
Which other solutions did I evaluate?
We evaluated several options before selecting Check Point Infinity. We evaluated Palo Alto Networks, specifically NGFW, since it is a strong all-around security platform. We also evaluated Fortinet, especially Fortinet firewalls for network security, and Microsoft Security.
What other advice do I have?
The advice I would give to others for Check Point Infinity is to first run a pilot test. Test its AI-led threat prevention, workflows, and unified portal in a small but realistic environment. Negotiate licenses carefully since cost can scale with modules and users. Invest in team training to understand policy tuning and alert handling. Use automation early to reduce manual work. Finally, regularly review and optimize your security rules and reporting dashboard to maximize value.
Check Point Infinity is a strong, comprehensive security platform. Its AI-driven threat prevention, unified management, and scalability make it reliable for hybrid environments. Automation and managed services save time and improve response. The main areas for improvements are alert management and documentation. Despite that, it has significantly strengthened our security posture and streamlined operations. I would recommend it to organizations seeking robust, all-in-one cybersecurity coverage. I would rate this product a 7 out of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Unifying security tools has streamlined responses and reduced complexity
What is our primary use case?
Check Point Infinity is used in our environment to unify security across network, cloud, including AWS and Azure , and endpoints under a single architecture. It is used most often to protect against advanced threats by leveraging real-time threat intelligence and automated prevention. It helps reduce complexity because instead of managing multiple disconnected products, one integrated solution covers firewall, endpoint protection, email security, and cloud workloads.
A specific example of how Check Point Infinity was used in the environment was during a phishing campaign that targeted several employees with email containing malicious attachments. The system automatically detected the threat across email and endpoint channels and blocked the attachment before it could be opened. At the same time, the firewall component prevented the compromised domain from being reached, which stopped the attack from spreading. This unified response saved the team a lot of time because coordination between different products was not necessary, and this solution is centralized in one portal.
Check Point Infinity fits into the daily workflow by reducing the need to jump between different security consoles. Previously, separate tools existed for firewall, endpoints, and email protection, which made monitoring and response slower. Now, everything is centralized, so the team can quickly see alerts, investigate incidents, and apply policies from one place. This saves time and helps the team stay focused on other IT priorities while still maintaining strong security.
What is most valuable?
The automation and orchestration that Check Point Infinity brings to ease of response is invaluable. Instead of teams manually chasing down alerts across different systems, Check Point Infinity can automatically correlate events and apply prevention measures across endpoints, network, clouds, and applications at the same time.
Check Point Infinity has positively impacted the organization because it has allowed the consolidation of multiple security tools into one unified platform, which immediately reduced complexity and saved time for the team and IT department.
The team has definitely noticed a significant difference since switching to Check Point Infinity. Incident response is much faster because alerts are consolidated in one console.
What needs improvement?
One area where Check Point Infinity could be improved is its user interface. It brings together a lot of powerful features, but sometimes the console feels overwhelming and requires extra time to navigate.
The documentation of Check Point Infinity is not always intuitive.
Integration with third-party tools is an area that could make Check Point Infinity even stronger.
For how long have I used the solution?
Check Point Infinity has been in use for around six years.
What do I think about the stability of the solution?
Check Point Infinity is stable.
What do I think about the scalability of the solution?
Check Point Infinity's scalability is good.
How are customer service and support?
Customer support for Check Point Infinity is excellent because it is very fast.
What was our ROI?
The time saved is considered a significant return on investment.
What other advice do I have?
My advice for others looking into using Check Point Infinity is that when the company needs to protect different options or tools, they should have them centralized in Check Point Infinity portal. Centralized tools and security through Check Point Infinity are important considerations. I would rate this product 9 out of 10.