Overview
This marketplace listing is used to fulfill non-standard transaction (Check Point Software and Services), therefore the pricing table doesn't list any product entitlements and doesn't list any product SKUs, (final prices and entitlements are defined via a Private Offer quote).
Highlights
- Check Point Software and Services
Details
Unlock automation with AI agent solutions

Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/month |
|---|---|---|
Enterprise SW Offer | Check Point security private Software offer | $10,000.00 |
Enterprise PS Offer | Check Point security private PS hours offer | $10,000.00 |
Enterprise HW Offer | Check Point security private HW offer | $10,000.00 |
Vendor refund policy
No Refund
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Support
Vendor support
https://www.checkpoint.com/support-services/contact-support/Â 24x7 email support with emergency phone number. Premier support available for enterprise customers.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Unifying security tools has streamlined responses and reduced complexity
What is our primary use case?
Check Point Infinity is used in our environment to unify security across network, cloud, including AWS and Azure , and endpoints under a single architecture. It is used most often to protect against advanced threats by leveraging real-time threat intelligence and automated prevention. It helps reduce complexity because instead of managing multiple disconnected products, one integrated solution covers firewall, endpoint protection, email security, and cloud workloads.
A specific example of how Check Point Infinity was used in the environment was during a phishing campaign that targeted several employees with email containing malicious attachments. The system automatically detected the threat across email and endpoint channels and blocked the attachment before it could be opened. At the same time, the firewall component prevented the compromised domain from being reached, which stopped the attack from spreading. This unified response saved the team a lot of time because coordination between different products was not necessary, and this solution is centralized in one portal.
Check Point Infinity fits into the daily workflow by reducing the need to jump between different security consoles. Previously, separate tools existed for firewall, endpoints, and email protection, which made monitoring and response slower. Now, everything is centralized, so the team can quickly see alerts, investigate incidents, and apply policies from one place. This saves time and helps the team stay focused on other IT priorities while still maintaining strong security.
What is most valuable?
The automation and orchestration that Check Point Infinity brings to ease of response is invaluable. Instead of teams manually chasing down alerts across different systems, Check Point Infinity can automatically correlate events and apply prevention measures across endpoints, network, clouds, and applications at the same time.
Check Point Infinity has positively impacted the organization because it has allowed the consolidation of multiple security tools into one unified platform, which immediately reduced complexity and saved time for the team and IT department.
The team has definitely noticed a significant difference since switching to Check Point Infinity. Incident response is much faster because alerts are consolidated in one console.
What needs improvement?
One area where Check Point Infinity could be improved is its user interface. It brings together a lot of powerful features, but sometimes the console feels overwhelming and requires extra time to navigate.
The documentation of Check Point Infinity is not always intuitive.
Integration with third-party tools is an area that could make Check Point Infinity even stronger.
For how long have I used the solution?
Check Point Infinity has been in use for around six years.
What do I think about the stability of the solution?
Check Point Infinity is stable.
What do I think about the scalability of the solution?
Check Point Infinity's scalability is good.
How are customer service and support?
Customer support for Check Point Infinity is excellent because it is very fast.
What was our ROI?
The time saved is considered a significant return on investment.
What other advice do I have?
My advice for others looking into using Check Point Infinity is that when the company needs to protect different options or tools, they should have them centralized in Check Point Infinity portal. Centralized tools and security through Check Point Infinity are important considerations. I would rate this product 9 out of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Unified Security Management with Powerful AI Threat Prevention
Helps prevent advanced threats and reduce incident response times through unified security policies
What is our primary use case?
My main use case for Check Point Infinity is designing to provide unified protection across networks, cloud, mobile, and points environments, and its main use case is preventing advanced cyber threats by consolidating multiple security layers in one integration solution.
For example, I use Check Point Infinity in a typical day when employees connect remotely; as soon as someone logs in through VPN, Infinity automatically enforces security policies, scans traffic for malware, and blocks suspicious attacks in real time.
What is most valuable?
The best feature Check Point Infinity offers for me is threat prevention, which is effective at blocking malware, ransomware, and phishing, as well as preventing zero-day attacks before they reach users or systems.
For our team, the threat prevention in Check Point Infinity works by layering multiple defenses that stop attacks before they reach users or systems, and the most effective feature for us is the specific SandBlast Zero-Day Prevention, which uses advanced sandboxing and threat emulation to detonate suspicious files in a safe environment.
Check Point Infinity has impacted my organization positively, as I have seen a reduction in security incidents and response times, with threats that used to slip through different point solutions now being blocked automatically thanks to the unified prevention layers.
What needs improvement?
I think Check Point Infinity needs to improve the documentation for deploying it the first time, making it more intuitive and providing better facilities for searching different investigations or deployments about this product.
Another improvement that would make our experience smoother with Check Point Infinity is simplifying the initial setup and configuration process; while powerful, it can feel overwhelming for smaller teams without dedicated security engineers, so more guides, wizards, or automatic best practice templates would be helpful.
For how long have I used the solution?
I have been using Check Point Infinity for around four years.
What do I think about the stability of the solution?
Check Point Infinity is very stable.
What do I think about the scalability of the solution?
Check Point Infinity's scalability is good in my experience.
How are customer service and support?
The customer support is very fast, and I do not have problems with it.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I did not use a different solution before Check Point Infinity.
How was the initial setup?
Another improvement that would make our experience smoother with Check Point Infinity is simplifying the initial setup and configuration process; while powerful, it can feel overwhelming for smaller teams without dedicated security engineers, so more guides, wizards, or automatic best practice templates would be helpful.
What was our ROI?
The best metric regarding return on investment is time saved, as employees have more free time when I need to investigate different threats on the job.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing is great because I do not have any problem with the pricing; for me, it is good.
Which other solutions did I evaluate?
I did not evaluate other options before choosing Check Point Infinity.
What other advice do I have?
Check Point Infinity is a centralized solution; it is a great perimeter and combines other tools into the portal, which presents a great opportunity for me to make my company, network, and organization better. I would rate this product a 9 out of 10.
Seamless Hybrid Security Integration Across All Environments
Centralized monitoring and unified policy management have accelerated incident response across hybrid environments
What is our primary use case?
My main use case for Check Point Infinity is to centralize and streamline our security operations across both cloud and on-premise environments.
I use Check Point Infinity for monitoring and managing security alerts across a hybrid infrastructure, since we have resources both in Azure and on-premise, and it helps consolidate visibility into a single dashboard.
Check Point Infinity has helped us simplify policy management across different environments.
What is most valuable?
The best features that Check Point Infinity offers include an intuitive interface that is accessible from anywhere, with the Azure Infinity portal hosting multiple security solutions under one roof.
Since adopting Check Point Infinity, I have seen a noticeable improvement in how we manage and respond to security threats across our infrastructure.
I have observed saved time by the support department.
What needs improvement?
One area where Check Point Infinity could improve is in the reporting and analytics customization.
I would definitely expand the reporting and analytics side, as while Check Point Infinity does a solid job of aggregating logs and presenting threat data, the customization options for dashboards and reports could be more flexible.
For how long have I used the solution?
I have been working in my current field for three years.
What other advice do I have?
The main cloud provider we use is Azure.
Some hosts we purchase Check Point Infinity through the Azure Marketplace and others directly in the Check Point Infinity portal.
My advice to others looking into using Check Point Infinity is that it is a great centralized security tool. I would rate this review a 9.