Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

5 AWS reviews

External reviews

74 reviews
from and

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    Alex Duarte

Consolidated Security Tools Drive Faster Responses and Lower Complexity

  • November 19, 2025
  • Review from a verified AWS customer

What is our primary use case?

Check Point Infinity is used in our environment to unify security across network, cloud, including AWS and Azure, and endpoints under a single architecture. It is used most often to protect against advanced threats by leveraging real-time threat intelligence and automated prevention. It helps reduce complexity because instead of managing multiple disconnected products, one integrated solution covers firewall, endpoint protection, email security, and cloud workloads.

A specific example of how Check Point Infinity was used in the environment was during a phishing campaign that targeted several employees with email containing malicious attachments. The system automatically detected the threat across email and endpoint channels and blocked the attachment before it could be opened. At the same time, the firewall component prevented the compromised domain from being reached, which stopped the attack from spreading. This unified response saved the team a lot of time because coordination between different products was not necessary, and this solution is centralized in one portal.

Check Point Infinity fits into the daily workflow by reducing the need to jump between different security consoles. Previously, separate tools existed for firewall, endpoints, and email protection, which made monitoring and response slower. Now, everything is centralized, so the team can quickly see alerts, investigate incidents, and apply policies from one place. This saves time and helps the team stay focused on other IT priorities while still maintaining strong security.

What is most valuable?

The automation and orchestration that Check Point Infinity brings to ease of response is invaluable. Instead of teams manually chasing down alerts across different systems, Check Point Infinity can automatically correlate events and apply prevention measures across endpoints, network, clouds, and applications at the same time.

Check Point Infinity has positively impacted the organization because it has allowed the consolidation of multiple security tools into one unified platform, which immediately reduced complexity and saved time for the team and IT department.

The team has definitely noticed a significant difference since switching to Check Point Infinity. Incident response is much faster because alerts are consolidated in one console.

What needs improvement?

One area where Check Point Infinity could be improved is its user interface. It brings together a lot of powerful features, but sometimes the console feels overwhelming and requires extra time to navigate.

The documentation of Check Point Infinity is not always intuitive.

Integration with third-party tools is an area that could make Check Point Infinity even stronger.

For how long have I used the solution?

Check Point Infinity has been in use for around six years.

What do I think about the stability of the solution?

Check Point Infinity is stable.

What do I think about the scalability of the solution?

Check Point Infinity's scalability is good.

How are customer service and support?

Customer support for Check Point Infinity is excellent because it is very fast.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

yes

What was our ROI?

The time saved is considered a significant return on investment.

What's my experience with pricing, setup cost, and licensing?

excellent

What other advice do I have?

My advice for others looking into using Check Point Infinity is that when the company needs to protect different options or tools, they should have them centralized in Check Point Infinity portal. Centralized tools and security through Check Point Infinity are important considerations. I would rate this product 9 out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Raxit Manandhar

Managing security tools from one platform has reduced manual effort and improved threat visibility

  • October 31, 2025
  • Review from a verified AWS customer

What is our primary use case?

Check Point Infinity Portal is currently used for Harmony Email and Collaborations. Harmony Email and Collaborations can only be accessed through Check Point Infinity Portal, which is one of Check Point Infinity's products.

Check Point Infinity Portal offers a centralized platform for different Check Point products, such as Quantum and CloudGuard. You can integrate all of the products and use them from a single platform.

Having everything integrated in one place makes it easier because you don't have to access everything from separate software. For example, you would normally require a different SmartConsole server to push policies to Check Point's next generation firewall. If you integrate Smart-1 Cloud, you can manage it from Check Point Infinity Portal, as well as mobile device management, Harmony Email and Collaborations, and Check Point Infinity Playblocks.

What is most valuable?

Check Point Infinity has impacted our organization positively because we went through a trial phase for Check Point Infinity Playblocks. If it violates a certain rule, then the malicious IP would be blocked, which allows you to create a customized rule.

We have seen a faster response time and reduced effort from the network and security engineers while going through logs. They don't have to go through logs that block, and we also get insight into how many people from which country are targeting our servers. This kind of insight is available beforehand without digging into logs from our email address.

Since the automation is in place, there is less time needed and fewer engineers are required to check the logs, as well as report incidents and generate logs.

What needs improvement?

Check Point Infinity should have its own cloud rather than just relying on AWS and Azure. The reason for this is that it only depends on AWS and Azure. If something were to happen to AWS and Azure, our system would also be affected, our mail flow would be affected, and everything would be affected. It should only be dependent on Check Point for this.

One point that led to the nine rating was an incident about two months ago where our inbound and outbound mail were going to quarantine and we could not do anything. We did not get any response from the Check Point team indicating that there was a problem with the HEC, when there actually was one. There needs to be an improvement for this.

For how long have I used the solution?

I have been using Check Point Infinity Portal for a year.

What do I think about the stability of the solution?

Check Point Infinity Portal is stable.

What do I think about the scalability of the solution?

Check Point Infinity scalability is relatively good since it is SASE-based. We have not faced any issues with scalability.

How are customer service and support?

The user interface is very easy, fast, and very comprehendible. The support is also very fast and reliable.

The customer support is reliable and prompt.

How was the initial setup?

Pricing, setup cost, and licensing were good. We received a relative discount for this.

What's my experience with pricing, setup cost, and licensing?

Pricing, setup cost, and licensing were good. We received a relative discount for this.

Which other solutions did I evaluate?

We did not evaluate other options. Since we already have different Check Point products, we strictly went with Check Point Infinity.

What other advice do I have?

Everyone who has a Check Point device should opt for Check Point Infinity because there are different things that you can integrate with your product. We are a partner of Check Point Infinity. The overall review rating for this product is 9.


    reviewer2751120

Consolidation of management and protection at a fair price gives peace of mind

  • September 08, 2025
  • Review from a verified AWS customer

What is our primary use case?

The most common use case for Check Point Infinity is for managing all my gateways in one place and deploying everything from one place.

What is most valuable?

The Infinity portal combines all Check Point solutions in one place, including the endpoint, SASE, and the SMP.

I am using real-time threat intelligence in Check Point Infinity with ThreatCloud and AI.

The analytics capabilities in Check Point Infinity are very good, and it provides an all-in-one solution.

What needs improvement?

Something that should be better in Check Point Infinity is the customization, though I don't have any specific suggestions at this time.

What do I think about the stability of the solution?

Check Point Infinity is a very stable solution; I don't remember experiencing any downtime.

What do I think about the scalability of the solution?

It is a scalable solution.

How are customer service and support?

I would rate technical support from Check Point a perfect score because when I call them, they answer before I could breathe.

How was the initial setup?

My initial setup of Check Point Infinity was very easy. Setting up the gateway and connecting it to the Infinity portal was very simple.

What was our ROI?

The price of the solution is very fair because it provides good protection at a reasonable cost.

What other advice do I have?

I'm not sure if I purchased the solution through the vendor or AWS marketplace.

I don't use the automations in Check Point Infinity.

I am a customer using Check Point products.

On a scale of 1-10, I rate Check Point Infinity a 9.


    Geraldo Freitas

Offers integration with Active Directory, where you can allow or deny traffic based on users or groups of users from Active Directory

  • April 11, 2024
  • Review from a verified AWS customer

What is our primary use case?

We have main offices in Brazil and branch offices in each of our state capitals. So, we have 26 branch offices in total. Each branch office used to have a small Check Point appliance. We're moving away from that model; they won't access the internet directly anymore. Instead, they'll pass through a central kind of star network.

We use two levels of firewalls: an external firewall and an internal firewall. We have a DMZ between these two firewall clusters with high availability. Each firewall has IPS, web content filtering, bot protection, and antivirus enabled. We'll contract some of those features as part of an MSSP service. We don't buy products or appliances directly.

Our procurement requirements allow other manufacturers to participate. The decision isn't ours or the integrator's – it's how we buy in Brazil. The vendor offering the lowest price for a product that meets the requirements wins. We cannot choose a specific brand or product name.

How has it helped my organization?

Before contracting the MSSP, we had an IPS (I don't remember if it was Check Point). However, we only detected signatures; we weren't confident enough to block them due to false positives. For the past 10 years, we have had a procedure where we get new signatures weekly, test for false positives, and set exclusions. Most relevant signatures are now in use, so the IPS is an important layer of protection for us. So, Check Point Infinity's threat prevention capabilities benefitted our organization.

We haven't had any problems with integration, but we don't need many integrations. The main one is with SIEM. The bigger issue is that we use ArcSight as our SIEM. It's very difficult to migrate from one SIEM solution to another.

We are on the journey of moving to the cloud right now. We had on-premises services, but we are going to move to a cloud environment where we have Azure and AWS Cloud. Because of this, the new solution will have virtual firewalls at the edge of each cloud.

What is most valuable?

I like all the features because within the suite we use, it's sometimes hard to know exactly which features are being used and where they come from.

But, the main feature is the integration with Active Directory, where you can allow or deny traffic based on users or groups of users from Active Directory.

What needs improvement?

We have had some performance issues. Because of this, we had to redirect traffic to be analyzed by other appliances. I'm not sure if higher-end appliances would still have this problem.

We also experienced issues with deploying new configuration versions to all branch appliances, but we won't be using this setup anymore. We don't know exactly how the virtual appliances will work to protect the cloud. It's a new thing for us.

For how long have I used the solution?

I have been using it for 14 years now.

What do I think about the stability of the solution?

I would rate the stability an eight out of ten. We've had some problems in the past.

What do I think about the scalability of the solution?

We had an issue with scalability before. We think the technology changes caused by mobile traffic impacted our appliances. Since we're buying a bigger solution now, I think we won't have this problem this time.

Check Point engineers were involved, and they suggested we use a virtual appliance to remove this traffic from our physical appliance.

How are customer service and support?

We've had some difficult experiences sometimes, such as we have to send again files and information.

Which solution did I use previously and why did I switch?

We had another solution a long time ago. It was a small, free solution, very difficult to compare. We've used Check Point for a long time, so it's impossible to make a fair comparison.

We also use Azure Sentinel, but we do not receive logs from security solutions. It's possible we'll migrate to Azure Sentinel in the future. Nowadays, it's difficult to use a SIEM that is local and not cloud-based.

How was the initial setup?

The initial setup will be done by the MSSP provider, not us. They'll handle the appliances, configuration, and integration. When we pay, everything must be working perfectly, and the documentation must be delivered to us.

The first deployment took about nine months because we changed the active tool. The second deployment was a bit different and took about six months. This timeline includes everything: equipment and features, but it also has solutions that aren't exactly Check Point firewalls, like the WAF (Web Application Firewall) or integration with SIEMs—also, the implementation of use cases in the SIEM.

What about the implementation team?

There are two teams involved in the deployment: our team and the supplier's team. Usually, there are three or four people from the supplier and the same number from us.

It's maintained by the supplier. We have an SLA (Service Level Agreement) in place. They install, maintain, and manage the entire solution. We are a user of the solution; we open tickets to them, and they make the configurations. They're also responsible for availability and other aspects.

What other advice do I have?

I would recommend it. However, Check Point could improve its tech support systems. If they had more engineers in Brazil, I think it would be good.

Overall, I would rate the solution a nine out of ten.


showing 1 - 4