Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Check Point Infinity Platform and Services

Check Point Software Technologies

Reviews from AWS customer

1 AWS reviews
  • 5 star
    0
  • 1
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

49 reviews
from and

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    Hailemichael Y.

Check Point Infinity Platform: Consolidated Security for Gen V Threats

  • May 23, 2025
  • Review provided by G2

What do you like best about the product?
What stands out most about Check Point Infinity Platform is its ability to unify threat prevention across network, cloud, endpoint, and mobile with AI-driven intelligence and centralized management—delivering scalable, streamlined security for complex enterprise environments.
What do you dislike about the product?
Check Point Infinity Platform’s biggest drawbacks are its complex licensing model, high pricing, and occasional latency in cloud provisioning, which can hinder deployment efficiency and clarity for enterprise teams
What problems is the product solving and how is that benefiting you?
Check Point Infinity Platform solves the challenge of fragmented security by delivering unified, real-time threat prevention across networks, cloud, and endpoints—benefiting me by streamlining operations, reducing incidents, and enabling efficient, centralized management in complex enterprise environments.


    CBMMishra

Security posture enhances with responsive support and seamless integration, though analytics features can improve

  • May 21, 2025
  • Review provided by PeerSpot

What is our primary use case?

Within my organization, I primarily use Check Point Infinity for bandwidth utilization, load balancing, and we analyze all the spams, filters, and blocks.

Another feature of Check Point Infinity that I utilize is blocking all unwanted traffic, restricting around the web, and alerting me about bad actors anytime they attack.

What is most valuable?

The Threat Prevention technology in Check Point Infinity has enhanced my security posture; that's very great, excellent, and helpful.

Check Point Infinity provides financial benefits and cost savings. Without this, our business would not continue at all, as our business depends on this. If we cannot keep our data secret, all our customers will be lost.

What needs improvement?

I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.

For how long have I used the solution?

I have been familiar with Check Point Infinity for the last four years.

What was my experience with deployment of the solution?

I did not face many challenges or difficulties with installing Check Point Infinity. Initially, the first installation presented a problem, but otherwise, there are not too many issues.

How are customer service and support?

Check Point support is very responsive. I give it a ten.

How would you rate customer service and support?

Positive

How was the initial setup?

I do not remember exactly how much time the installation required, but it was one hour only, although there were some issues which were resolved by the tech people.

What about the implementation team?

Only one or two people took part in the installation of Check Point Infinity.

What was our ROI?

I would say we can save about 90% of our budget with Check Point Infinity.

What's my experience with pricing, setup cost, and licensing?

In terms of pricing, I find Check Point Infinity to be an expensive product. In fact, we are evaluating even the spam filter for emails from Check Point, but it was prohibitively costly, so we dropped it and are using Microsoft Defender.

Which other solutions did I evaluate?

Before choosing Check Point Infinity, we evaluated Cisco as another option.

We chose Check Point Infinity instead of Cisco because we found that the price is good, and the ease of use and implementation were better.

What other advice do I have?

I am familiar with Check Point Infinity to some extent.

It is a scalable solution, prominently so.

In the future, I am planning on increasing the number of devices for Check Point Infinity.

My overall rating for Check Point Infinity is eight out of ten.

Which deployment model are you using for this solution?

On-premises


    Samrawit T.

Check Point Infinity Platform: Unifying Security for the Modern Enterprises

  • May 15, 2025
  • Review provided by G2

What do you like best about the product?
1. Truly Unified Security Architecture
2. Consistent Policy Enforcement Everywhere
3. Provides robust protection for the cloud environments, ensuring data security across hybrid infrastructures
What do you dislike about the product?
1. Expensive Price
2. Inconsistent support quality
What problems is the product solving and how is that benefiting you?
1. Stopping Advanced multi-vector attacks
2. Eliminating security silos
3. Simplifying Hybrid/Multi-Cloud security
4. Reducing operational overhead


    Etsub A.

Exploring the Check Point Infinity Platform

  • May 15, 2025
  • Review provided by G2

What do you like best about the product?
1. Provides end-to-end security across networks, endpoints, and cloud environments, ensuring robust protection
2. Utilizes advanced threat prevention technologies
3. Offers a unified management console
4. Easily scales to meet the demands of growing organizations, adapting to evolving security needs
What do you dislike about the product?
1. Initial configuration can be intricate
2. The platform's extensive features can lead to a steep learning curve
3. Higher cost for small business
What problems is the product solving and how is that benefiting you?
Check Point Infinity Platform solves critical problems:
1. Provides advanced threat prevention capabilities to combat sophisticated cyber threats across various environments
2. Reduce the complexity of managing multiple security tools and solutions
3. Enhances visibility into network traffic and security incidents, allowing for better monitoring and quicker response


    LuisPerez3

Unified portal streamlines cybersecurity integration and administration

  • April 22, 2025
  • Review provided by PeerSpot

What is our primary use case?

In my job, I design and propose different solutions from Check Point Infinity for some final customers in final champ profiles. With Check Point Infinity solutions, I can integrate different tools of Check Point like security appliances such as Quantum or Quantum Smart or the orchestrator under Smart Events like different tools of Harmony, Harmony Mail, Harmony Point, and Harmony Browse. I use the Infinity Portal to take control of the administration of these tools and orchestrate and integrate all the information to bring the logs to the final customer to deploy new strategies for cybersecurity or change or update the architecture of security policies.

What is most valuable?

One of the valuable aspects of Check Point Infinity is that I can use one unified portal for the administration of all these tools. I can integrate other tools from other brands too, to consolidate and unify cybersecurity strategies. Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.

What needs improvement?

If Check Point continues reforms of AI and takes more information from different origins, not only from its database but also from other brands, it can complete this information and make it stronger.

For how long have I used the solution?

I have had about three years of experience with Check Point Infinity.

What do I think about the scalability of the solution?

Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.

How are customer service and support?

The technical support is excellent with quick response times and high-quality answers to provide the best solutions needed.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup is not complex; it is straightforward. It depends on the reality of the moment for the final customer and what they want for their roadmap. The deployment is usually in a short time as this technology enables quick deployment into the customer's architecture.

What about the implementation team?

The required number of people depends on the size of the final customer, but maybe three to five people, including analysts, engineers, and someone senior, are sufficient for this.

What was our ROI?

The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.

What's my experience with pricing, setup cost, and licensing?

The pricing is good as Check Point Infinity includes many tools and details that others might not have. The cost depends on the different architecture or needs of the final customer.

Which other solutions did I evaluate?

Some brands like Trend Micro, Sophos, and Fortinet offer good solutions too. However, I prefer Check Point as an expert brand in cybersecurity.

What other advice do I have?

I rate Check Point Infinity a nine out of ten.


    Muluken Mekonene

Empowering security with seamless AI-guided configurations

  • December 06, 2024
  • Review provided by PeerSpot

What is our primary use case?

We have been deploying Check Point Infinity as a new technology for security purposes with our biggest customer in Ethiopia. It serves to secure endpoints and protect from intrusion and various threats. The product is deployed as a SaaS solution, and we use it to protect mobile users and other aspects of the organization.

What is most valuable?

Check Point Infinity offers a multi-layered security approach that enhances our IT security environment. It provides tracking protection, intrusion prevention, and supports mobile users efficiently. 

The AI integration helps in guiding configurations and installations, making the process smoother. 

Additionally, Check Point is a supportive vendor, offering notable assistance and knowledge sharing during installations and configurations.

What needs improvement?

I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity. This would help users to easily understand and deploy the solution.

For how long have I used the solution?

We have been working with Check Point Infinity for one year, as it was deployed with the aid of professional service last year.

What do I think about the stability of the solution?

For the time being, Check Point Infinity is stable with no issues concerning stability.

What do I think about the scalability of the solution?

The product is scalable. If customers require scalability, we can scale the product accordingly to suit organizational growth.

How are customer service and support?

Check Point provides excellent support. As soon as we raise a ticket, they engage promptly, indicating strong vendor support. User support has not presented any issues.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We are also working with IBM, Cisco, and FortiGate along with Check Point, for different solutions.

How was the initial setup?

The initial setup is quite seamless and smooth. We follow the solutions easily without encountering any challenges.

What about the implementation team?

The deployment was conducted with the assistance of professional services. This external team has been very supportive and provided necessary guidance throughout the process.

What was our ROI?

We are currently not assessing the financial benefits or return on investment for Check Point Infinity, as we are in the process of deploying it.

What's my experience with pricing, setup cost, and licensing?

I am not aware of the financial cost of the licensing for Check Point Infinity, as I am involved in the technical aspects. The product, as supported by Check Point, offers invaluable assistance for ease of deployment.

Which other solutions did I evaluate?

We are also working with other vendors such as IBM, Cisco, and FortiGate.

What other advice do I have?

I recommend Check Point Infinity to other customers due to its notable benefits and positive experiences with a major financial institution. 

I rate Check Point Infinity nine out of ten for its overall satisfactory and scalable features.

Which deployment model are you using for this solution?

On-premises


    Martin Ellmann

Helps to connect various locations worldwide through VPN

  • August 08, 2024
  • Review provided by PeerSpot

What is our primary use case?

Our company used Check Point Infinity to connect various locations worldwide through VPN, specifically using IPsec, rather than for cybersecurity. We implemented it in on-premises networks to collect data in data centers from different locations.

What needs improvement?

The solution is expensive.

What do I think about the stability of the solution?

The tool is 100 percent stable. 

What do I think about the scalability of the solution?

Check Point Infinity is scalable. 

How was the initial setup?

The initial deployment took about a month, subsequent deployments were much faster, typically taking only a few days.

What's my experience with pricing, setup cost, and licensing?

The solution's  price is quite high, and the licensing model requires extra licenses for various features like SD-WAN.

What other advice do I have?

The tool is one of the most secure and stable products, with clear administration. I rate the overall product an eight out of ten. 

I recommend Check Point Infinity to others, especially if they aren't planning to use Fortinet or Palo Alto. All three solutions—Check Point Infinity, Fortinet, and Palo Alto—offer similar levels of security. However, one thing to consider is that the tool's licensing can be expensive and complex. 


    Anuraj Nair

We can navigate to all the products very easily because it is written in a normal installation

  • April 26, 2024
  • Review provided by PeerSpot

What is our primary use case?

Infinity is a single platform where you can integrate all the Check Point solutions such as Check Point Email Security, Check Point Endpoint Protection, Check Point SaaS, Check Point web proxy solutions, and Check Point Firewall. It can be integrated into the Infinity portal, and we can manage and configure it from the Infiniti portal.

What is most valuable?

Infinity is a technical console where we have to log in, and we can navigate to all the products very easily because it is written in a normal installation. People who know about the product can click and take care of their activity.

What needs improvement?

Technical support is pretty delayed. It's very slow, and they have not yet received their IT. Compared to other OEMs, Check Point's response is a bit slow but could have been improved. There are two areas to improve: The latency of the sandboxing and the technical support efficacy.

For how long have I used the solution?

I have been using Check Point Infinity for five years.

What do I think about the stability of the solution?

I never felt any downtime or any login issues. Whenever I try to log in, it happens properly and normally.

I rate the solution’s stability a nine out of ten.

What do I think about the scalability of the solution?

5,000 end users are using the solution.

I rate the solution’s scalability a nine out of ten.

How was the initial setup?

The initial setup is very straightforward. Also, the OEM vendor will help you with the login, configure the authentication, get into the login, or get into the console, load your device, and start configuring it.

What was our ROI?

Check Point Infinity offers numerous benefits. It provides peace of mind by simplifying security management. It is responsible for on-premises security, allowing users to configure it anywhere. Additionally, it enables seamless remote connection, even if the user is away from the central point. It's the latest in security technology, offering immense value.

What's my experience with pricing, setup cost, and licensing?

Customers need to pay yearly.

What other advice do I have?

Infiniti is a portal that integrates multiple products.

It's a unified management console. I'm able to manage all the solutions and products from my single Infinity console regardless of multiple branches across the globe, anywhere in the world, and they can be controlled from a single console. The major benefit is the SaaS offering. So, customers don't have to manage everything or keep any infrastructure on-premises; it's completely provided by Check Point, with data centers integrated into Infinity. Thus, there are no data integration problems.

Check Point Infinity is well known for its CDR (Content Disarm and Reconstruction) technology rather than CRO (Customer Revenue Optimization) debt protection. This technology is primarily associated with its sandboxing capabilities. However, there is room for improvement in terms of latency when scanning and delivering attachments, links, or files. Although the delay is often negligible, competitors may offer faster results with their sandboxing solutions.

For customers prioritizing robust security, performance, and stability, Check Point can be an excellent choice. Their extensive technical expertise and global deployments contribute to the reliability of their products. With the Infinity architecture, which facilitates comprehensive threat coverage, Check Point offers scalability, reliability, and expandability across various infrastructure needs.

Overall, I rate the solution a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud


    Geraldo Freitas

Offers integration with Active Directory, where you can allow or deny traffic based on users or groups of users from Active Directory

  • April 11, 2024
  • Review provided by PeerSpot

What is our primary use case?

We have main offices in Brazil and branch offices in each of our state capitals. So, we have 26 branch offices in total. Each branch office used to have a small Check Point appliance. We're moving away from that model; they won't access the internet directly anymore. Instead, they'll pass through a central kind of star network.

We use two levels of firewalls: an external firewall and an internal firewall. We have a DMZ between these two firewall clusters with high availability. Each firewall has IPS, web content filtering, bot protection, and antivirus enabled. We'll contract some of those features as part of an MSSP service. We don't buy products or appliances directly.

Our procurement requirements allow other manufacturers to participate. The decision isn't ours or the integrator's – it's how we buy in Brazil. The vendor offering the lowest price for a product that meets the requirements wins. We cannot choose a specific brand or product name.

How has it helped my organization?

Before contracting the MSSP, we had an IPS (I don't remember if it was Check Point). However, we only detected signatures; we weren't confident enough to block them due to false positives. For the past 10 years, we have had a procedure where we get new signatures weekly, test for false positives, and set exclusions. Most relevant signatures are now in use, so the IPS is an important layer of protection for us. So, Check Point Infinity's threat prevention capabilities benefitted our organization.

We haven't had any problems with integration, but we don't need many integrations. The main one is with SIEM. The bigger issue is that we use ArcSight as our SIEM. It's very difficult to migrate from one SIEM solution to another.

We are on the journey of moving to the cloud right now. We had on-premises services, but we are going to move to a cloud environment where we have Azure and AWS Cloud. Because of this, the new solution will have virtual firewalls at the edge of each cloud.

What is most valuable?

I like all the features because within the suite we use, it's sometimes hard to know exactly which features are being used and where they come from. 

But, the main feature is the integration with Active Directory, where you can allow or deny traffic based on users or groups of users from Active Directory.

What needs improvement?

We have had some performance issues. Because of this, we had to redirect traffic to be analyzed by other appliances. I'm not sure if higher-end appliances would still have this problem. 

We also experienced issues with deploying new configuration versions to all branch appliances, but we won't be using this setup anymore. We don't know exactly how the virtual appliances will work to protect the cloud. It's a new thing for us.

For how long have I used the solution?

I have been using it for 14 years now.

What do I think about the stability of the solution?

I would rate the stability an eight out of ten. We've had some problems in the past.

What do I think about the scalability of the solution?

We had an issue with scalability before. We think the technology changes caused by mobile traffic impacted our appliances. Since we're buying a bigger solution now, I think we won't have this problem this time. 

Check Point engineers were involved, and they suggested we use a virtual appliance to remove this traffic from our physical appliance.

How are customer service and support?

We've had some difficult experiences sometimes, such as we have to send again files and information.  

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We had another solution a long time ago. It was a small, free solution, very difficult to compare. We've used Check Point for a long time, so it's impossible to make a fair comparison.

We also use Azure Sentinel, but we do not receive logs from security solutions. It's possible we'll migrate to Azure Sentinel in the future. Nowadays, it's difficult to use a SIEM that is local and not cloud-based.

How was the initial setup?

The initial setup will be done by the MSSP provider, not us. They'll handle the appliances, configuration, and integration. When we pay, everything must be working perfectly, and the documentation must be delivered to us.

The first deployment took about nine months because we changed the active tool. The second deployment was a bit different and took about six months. This timeline includes everything: equipment and features, but it also has solutions that aren't exactly Check Point firewalls, like the WAF (Web Application Firewall) or integration with SIEMs—also, the implementation of use cases in the SIEM.

What about the implementation team?

There are two teams involved in the deployment: our team and the supplier's team. Usually, there are three or four people from the supplier and the same number from us.

It's maintained by the supplier. We have an SLA (Service Level Agreement) in place. They install, maintain, and manage the entire solution. We are a user of the solution; we open tickets to them, and they make the configurations. They're also responsible for availability and other aspects.

What other advice do I have?

I would recommend it. However, Check Point could improve its tech support systems. If they had more engineers in Brazil, I think it would be good.

Overall, I would rate the solution a nine out of ten.

Which deployment model are you using for this solution?

On-premises


    Babu Kp

Has centralized management console but technical support lags

  • February 29, 2024
  • Review provided by PeerSpot

What is most valuable?

The tool's most valuable feature for threat prevention is the encryption alarm. 
I find the centralized management console, including the log analyzer and reports in Check Point Infinity, extremely beneficial for enhancing security and operations efficiency in our enterprise. I would rate it a perfect ten out of ten, as it effectively helps us analyze logs,  and detect potential attacks. 

What needs improvement?

The tool's technical support lags. 

For how long have I used the solution?

I have been using the product for six to seven months. 

What do I think about the stability of the solution?

I rate the solution's stability a nine out of ten. 

What do I think about the scalability of the solution?

I rate the tool's scalability an eight point five out of ten. 

Which solution did I use previously and why did I switch?

We used Trend Mico before Check Point Infinity.We currently have approximately 500 endpoints deployed. So far, the system is working seamlessly, and we haven't encountered any security issues. I'm confident in the product's security features. We are currently the documentation, and the support portal has been reliable, providing us with ample resources to troubleshoot any issues.


What's my experience with pricing, setup cost, and licensing?

When it comes to price, the paramount consideration is the strength of the security. If the security measures provided by the product, such as Check Point Infinity, are robust and meet our requirements, price becomes a secondary concern.

What other advice do I have?

For those considering Check Point Infinity, my advice is to gain hands-on experience and acquire a foundational understanding of the product before diving into the implementation process. I rate it a nine out of ten.