Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Check Point Infinity Platform and Services

Check Point Software Technologies

Reviews from AWS customer

1 AWS reviews
  • 5 star
    0
  • 1
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

49 reviews
from and

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    Nuno Faria

Provides robust cybersecurity with a comprehensive suite of features, expert support, and scalable cloud-based architecture, ensuring effective threat detection and continuous improvement

  • January 05, 2024
  • Review provided by PeerSpot

What is our primary use case?

The use case involves managing various aspects, including endpoint security, SaaS interface, and firewall management within the Check Point Infinity architecture. The Infinity portal serves as a centralized hub for overseeing all components of the Check Point security suite. The architecture incorporates XDR and MDR, enabling automatic correlation of information. In scenarios where a security issue arises, the system can automatically analyze data from diverse platforms, such as endpoints, firewalls, and Office 365. T

How has it helped my organization?

It offers significant benefits as a cybersecurity leader, known for pioneering the logical firewall and excelling with its Infinity suite. The expertise of Check Point professionals ensures efficient handling of challenges.

What is most valuable?

I have a positive history with Check Point, having worked with their firewall models since the nineties. A notable aspect that I appreciate is their ongoing effort to redesign the portal, giving it a fresh and centralized appearance. This is particularly significant as the transition from Check Point on-premises solutions to the cloud.

What needs improvement?

I've observed some challenges in terms of usability and performance, particularly since the shift to a service-oriented model like Infinity. It seems that the performance varies, likely influenced by the client's size and the provisioning of resources.

For how long have I used the solution?

We have been using it for several years, and since it was released we have become partners.

What do I think about the stability of the solution?

The stability is influenced by the specific configuration and the capabilities of the machine itself. Currently, I can confidently rate the stability at eight out of ten.

What do I think about the scalability of the solution?

The scalability and power seem to impact the interface quality; larger clients with more resources receive a better interface experience. In cases where clients initially buy licenses for a certain number of machines and later realize they need more, Check Point offers flexibility. Clients can purchase additional licenses even if it's mid-year, without the need to synchronize license renewal dates.

How are customer service and support?

My experiences with Check Point's tech support have been positive. They responded promptly to issues, even conducting a video call for clarification. A licensing complication was swiftly addressed, showing their commitment to resolving bugs.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

The deployment time varies depending on the specific machine and its configuration, however, in general, the implementation and installation processes are relatively quick. The deployment process is contingent on the specific configuration and the underlying infrastructure. However, due to our familiarity with the products, deployment is straightforward and typically doesn't extend over days. Instead, it can be accomplished in a matter of hours or even minutes, particularly in smaller cases. The process begins with obtaining the necessary licenses through a purchase order. Once acquired, we seamlessly integrate them into the Check Point dashboard, either through a physical conversion or by utilizing the Infinity portal. Subsequently, if configuration is required, we create the tenant and apply the license to it. From this point onward, the deployment process is quite straightforward and efficient.

What was our ROI?

The price is justified by the security it provides. In a world where security breaches can lead to significant financial losses, the investment in robust cybersecurity solutions is seen as essential. Moreover, the ongoing improvements in the dashboard experience further enhance the overall value proposition of Check Point Infinity, making it a comprehensive and worthwhile security solution for businesses in Portugal.

What's my experience with pricing, setup cost, and licensing?

In Portugal, pricing for security solutions, particularly Check Point, is not a fixed rate. It's determined by factors like the brand's prominence and whether the product is flagged. The flexibility in pricing is advantageous, and being a special partner allows for negotiating special rates based on the project requirements. Unlike services like Office 365, Check Point licenses are not based on users but rather on machines. Clients are required to pay when submitting a purchase order. However, for those interested in trying the product, whether for a Proof of Concept or other purposes, we can facilitate trials. As partners, we have the ability to request trials from Check Point or conduct trials ourselves for one to three months. While trial versions can't be extended, we can release a new license with an additional thirty days, allowing clients to continue testing the product. After the trial period, we can convert the tenants and apply for a full license, enabling clients to choose the desired products for implementation.

What other advice do I have?

Overall, I would rate it nine out of ten.


    Michael Mugagga

Easy to deploy with a nice GUI and good AI

  • October 17, 2023
  • Review provided by PeerSpot

What is our primary use case?

We required a first line of defense to protect, monitor, and ensure that no confidential information leaves the internal network. We also required a device that can segment our network so that different subnets like the DMZ, Production network, and testing environments. Threat prevention that required AI and ML capabilities was another reason to acquire the Check Point Quantum Spark NGFW. Finally, it offers an all-in-one solution that was a necessity where the same instance could manage and monitor VPNs, application control, web filtering, intrusion detection, and email security.

How has it helped my organization?

With Check Point Quantum Spark, we have a first line of defense in our environment, seated just after the router that connects to the ISP's endpoint, all traffic entering and leaving the network is monitored, and filtered depending on the different rules created. 

The functionality of AI helps further in the threat detection field. This NGFW is able to support a large number of VPN connections and at the same time monitor these connections for any anomaly. 

Finally, for any flagged threats, a sandbox functionality is also provided making it even more robust in detecting zero-day attacks.

What is most valuable?

The sandblast threat emulation is great. We are able to visualize the extent of specific threats without necessarily having them deployed in our environment. The Sandbox feature is able to virtualize an environment that can mirror what we have in the internal environment.

The quality of Service for different traffic types is excellent. We are able to prioritize business-critical traffic over other types of traffic like streaming.

Artificial intelligence threat profiling has helped a lot in detecting and protecting the internal network from zero-day, DNS, and DDoS attacks. 

What needs improvement?

We'd like to see support for fiber connections. With the growth of the network, we would expect that more and more traffic is going through this device and soon enough, the bottleneck will be the type of connection being used to transfer data to the router and further to the ISP. A throughput of 1GBPS will hinder performance on the network.

Configuring fault tolerance for specific features, for example, power sources would ensure that the chances of the system shutting down due to a power surge are highly limited. This can further increase the SLA to 99.99%

For how long have I used the solution?

We've used the solution for three years and we just recently upgraded to the 1535 series.

What do I think about the stability of the solution?

The system is stable and able to perform with the advised load without fail. 

What do I think about the scalability of the solution?

Quantum Spark is designed for small to medium businesses. With this in mind, the scalability is perfect and will support up to a firewall throughput of 1GBPS which is favorable for an SMB.

How are customer service and support?

The Check Point customer service is prompt and with their knowledge base, the majority of the issues incurred are already cleared noted with a list of multiple solutions. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously we used the Sophos XGS series. The Sophos XGS firewall no longer met the business' growing needs as it further led to a slowness in the performance of the network hence the search for a new system that would fix this.

How was the initial setup?

The initial setup was straightforward. Check Point's GUI interfaces are user-friendly, and it also provides a lot of information on setting up their devices.

What about the implementation team?

This was an in-house deployment. 

What was our ROI?

With the increased internal network performance and a decrease in the threats being exposed to the network; the return on investment for this is roughly in the range of 40% to 60%.

What's my experience with pricing, setup cost, and licensing?

Quantum Spark has different subscription models where you can add more functionality as required. For a constrained budget, you can specifically pick out the functionalities you want, and pay for that.

Which other solutions did I evaluate?

We also considered:

  • Cisco ASA 5500 series
  • Cisco FirePower 1000s

Which deployment model are you using for this solution?

On-premises


    Hendrik-Du Plooy

An easy-to-use tool that provides visibility and offers protection to data

  • October 03, 2023
  • Review provided by PeerSpot

What is our primary use case?

My company's clients use Check Point Infinity to protect their data.

What is most valuable?

The most valuable features of the solution stem from factors like ease of use, visibility, and cost to the enterprise.

What needs improvement?

Endpoints are an area of concern when it comes to Check Point Infinity. There are some issues around the marketing of the endpoint solution, because of which it is not as prominent as other players in the market. The endpoint solutions offered by Check Point are not prominent enough in the market due to Check Point's poor marketing efforts. If the marketing for the endpoint solutions offered by Check Point is done properly, then Check Point can get a more thorough positioning in the marketplace.

For how long have I used the solution?

I have been using Check Point Infinity for two years. My company is a reseller of products from Check Point and Palo Alto. I have experience with the solution's latest version.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a nine out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution an eight out of ten.

My company's clients who use Check Point Infinity are mostly enterprise-sized companies.

How are customer service and support?

I rate the technical support a nine out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The deployment process of the tool can be completed in a few hours.

The solution is deployed on the cloud and on-premises.

What's my experience with pricing, setup cost, and licensing?

I rate the product's price a six on a scale of one to ten, where one is cheap, and ten is expensive.

A payment of 15,000 USD needs to be made towards the licensing costs attached to the solution. There are no costs in addition to the standard licensing costs attached to the solution.

What other advice do I have?

I recommend the solution to those who plan to use it.

I rate the overall solution an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud


    MONICA HERRRA

Stable platform with good technical support services

  • August 08, 2023
  • Review provided by PeerSpot

What is most valuable?

It is a good tool. If we plan to change the password, we don't have to change the MX Points or SPF settings, as it works with Microsoft 365. It helps us prevent losing emails.

What needs improvement?

Check Point Infinity is not compatible with Windows 8.

For how long have I used the solution?

We have been using Check Point Infinity for two months. We did a POC for it.

What do I think about the stability of the solution?

It is a stable product. 

What do I think about the scalability of the solution?

It is a scalable product.

How are customer service and support?

The technical support services are good. We reach them regarding technical errors. They reply with the solutions in a few hours.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup process is complex.

What's my experience with pricing, setup cost, and licensing?

The product has good pricing considering the features and a global approach. I rate its pricing an eight out of ten.

What other advice do I have?

I rate Check Point Infinity a nine out of ten.


    William Cambronero

Helps with monitoring, reinforces security architecture, and allows for real-time threat prevention

  • July 27, 2022
  • Review provided by PeerSpot

What is our primary use case?

At the end of 2020, the company was growing its staff. In addition, the pandemic was beginning, and as a result of these two factors, the company needed to protect the organization. It was there that the Check Point Infinity tool was used. 

It is characterized as a great tool against the latest generation of cyber attacks all these attacks are found on mobile devices, endpoints, etc. Always in the security part, companies must be aware of technologies since it is an essential part of organizations, and Check Point Infinity is an excellent tool for these functions.

How has it helped my organization?

The Check Point Infinity tool came in to reinforce security in the organization since a basic security had been implemented that put our data at risk. Using these new technologies, it has also focused on zero-trust and is able to generate complexity and security gaps in the platform of the organization so we can avoid future attacks and errors and be able to provide a quick solution. 

Infinity contains all the modern Check Point components like DLP, IPS, VPN, etc. We currently use R80.10 and it helped us a lot with security and implementations.

What is most valuable?

It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security, those characteristics that it has that different cover devices regardless of the brand, also to help us maintain full control of our employees' devices and thus be able to monitor and ensure more and more security breaches. Infinity helped us a lot in real-time threat prevention, and with continuous updates, it is one of the most important points of all Check Point solutions.

What needs improvement?

One of the main improvements that can be made is the latency in the portal. It is one of the most common errors of the Check Point tools, another of the improvements is that the unlimited licenses are based on the number of users. This confuses larger organizations, where not all users need all services. 

Finally, they must improve the technical support they provide to users since we have opened several cases and they take time to attend to them or contact us, and in certain cases, they do not provide a quick solution. They take a long time to solve the error problem in question, which is worrying since, due to this inefficiency, they could attack the organization since there may be a gap in the infrastructure of the organization.

For how long have I used the solution?

The tool was implemented four years ago..

What do I think about the stability of the solution?

In recent years, the stabilized one has done very well. The only thing is the latency to the portal, however, in general, it has behaved very well.

What do I think about the scalability of the solution?

Regarding the scalability of the tool, it is very scalable depending on your implementation.

How are customer service and support?

The experience with support has not been very good since we have had problems with support. It took a long time to answer or solve a problem.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not have any professional security tools.

How was the initial setup?

The implementation was very simple and fast. All you have to do is meet the primary requirements.

What about the implementation team?

The implementation was done in conjunction with the supplier and an internal engineer. The experience was very good; he knew how to do his job.

What was our ROI?

The director of the company will be continuity since if it were not safe there would have been losses.

What's my experience with pricing, setup cost, and licensing?

Check Point maintains competitive prices in the market. It must be taken into account that for the security of an organization is very important to invest in.

Which other solutions did I evaluate?

Check Point Infinity was one of the first options we had in mind due to its great reach in the security market.

What other advice do I have?

The only thing would be to improve the latency in the graphical interface and technical support.

Which deployment model are you using for this solution?

Public Cloud


    Erdal .

Infinity Total Protection

  • October 08, 2021
  • Review provided by G2

What do you like best about the product?
It is a structure that I find very useful in terms of quickly identifying security vulnerabilities and reducing the total cost.Thanks to the real-time action mechanism, we are constantly one step ahead.
What do you dislike about the product?
As a result of my reviews, I did not encounter a bad or negative comment or user experience in general. Pricing can be confusing at times.
What problems is the product solving and how is that benefiting you?
It simply protects the entire architecture of your company or operations against external or internal threats.


    Rachel S.

Great tool of threat prevention

  • August 19, 2021
  • Review provided by G2

What do you like best about the product?
I like this solution because it protects the entire IT infrastructure: network protection, cloud protection, desktop protection... I also appreciate the quality of the IT support and its availability (24 hours a day, 7 days a week)
What do you dislike about the product?
So far, I have not noticed any aspect that I don't like. The only criticism I can make is about the price, but this is understandable given the quality of the service.
What problems is the product solving and how is that benefiting you?
We strengthened the security of the company. Since the installation of infinity total protection, the company has no longer been the victim of cyber-attack


    Printing

Best. Simply.

  • February 01, 2019
  • Review provided by G2

What do you like best about the product?
The best thing is that it is extremely reliable. Its Endpoint function is the best in the market without any doubt. And its advanced threat prevention system is impressive. It is undoubtedly the best in the market.
What do you dislike about the product?
Obviously, it is CISCO, so the only thing that is fucked up is the price. Very good, but very good.
What problems is the product solving and how is that benefiting you?
Defense of the external-internal network.
Recommendations to others considering the product:
If you have money and you want the best this is your option.


    Telecommunications

Check point

  • January 02, 2019
  • Review provided by G2

What do you like best about the product?
I like that it is easy to use and connects instantly after putting incredientials.
What do you dislike about the product?
I dislike nothing. It is an easy tool to use and it takes no time at all to use it.
What problems is the product solving and how is that benefiting you?
Connecting to my system so that I use it to connect to my network from my business internet to my internal system .