Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Infinity GenAI Protect

Check Point Software Technologies

Reviews from AWS customer

5 AWS reviews

External reviews

75 reviews
from and

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    Computer & Network Security

Good detection capabilities

  • December 27, 2022
  • Review provided by G2

What do you like best about the product?
Easy to work with, good accuracy rate, supports many file types.
What do you dislike about the product?
There are occasional performance issues and bugs.
What problems is the product solving and how is that benefiting you?
Good sandbox for firewall and endpoint.


    William Cambronero

Helps with monitoring, reinforces security architecture, and allows for real-time threat prevention

  • July 27, 2022
  • Review provided by PeerSpot

What is our primary use case?

At the end of 2020, the company was growing its staff. In addition, the pandemic was beginning, and as a result of these two factors, the company needed to protect the organization. It was there that the Check Point Infinity tool was used.

It is characterized as a great tool against the latest generation of cyber attacks all these attacks are found on mobile devices, endpoints, etc. Always in the security part, companies must be aware of technologies since it is an essential part of organizations, and Check Point Infinity is an excellent tool for these functions.

How has it helped my organization?

The Check Point Infinity tool came in to reinforce security in the organization since a basic security had been implemented that put our data at risk. Using these new technologies, it has also focused on zero-trust and is able to generate complexity and security gaps in the platform of the organization so we can avoid future attacks and errors and be able to provide a quick solution.

Infinity contains all the modern Check Point components like DLP, IPS, VPN, etc. We currently use R80.10 and it helped us a lot with security and implementations.

What is most valuable?

It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security, those characteristics that it has that different cover devices regardless of the brand, also to help us maintain full control of our employees' devices and thus be able to monitor and ensure more and more security breaches. Infinity helped us a lot in real-time threat prevention, and with continuous updates, it is one of the most important points of all Check Point solutions.

What needs improvement?

One of the main improvements that can be made is the latency in the portal. It is one of the most common errors of the Check Point tools, another of the improvements is that the unlimited licenses are based on the number of users. This confuses larger organizations, where not all users need all services.

Finally, they must improve the technical support they provide to users since we have opened several cases and they take time to attend to them or contact us, and in certain cases, they do not provide a quick solution. They take a long time to solve the error problem in question, which is worrying since, due to this inefficiency, they could attack the organization since there may be a gap in the infrastructure of the organization.

For how long have I used the solution?

The tool was implemented four years ago..

What do I think about the stability of the solution?

In recent years, the stabilized one has done very well. The only thing is the latency to the portal, however, in general, it has behaved very well.

What do I think about the scalability of the solution?

Regarding the scalability of the tool, it is very scalable depending on your implementation.

How are customer service and support?

The experience with support has not been very good since we have had problems with support. It took a long time to answer or solve a problem.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not have any professional security tools.

How was the initial setup?

The implementation was very simple and fast. All you have to do is meet the primary requirements.

What about the implementation team?

The implementation was done in conjunction with the supplier and an internal engineer. The experience was very good; he knew how to do his job.

What was our ROI?

The director of the company will be continuity since if it were not safe there would have been losses.

What's my experience with pricing, setup cost, and licensing?

Check Point maintains competitive prices in the market. It must be taken into account that for the security of an organization is very important to invest in.

Which other solutions did I evaluate?

Check Point Infinity was one of the first options we had in mind due to its great reach in the security market.

What other advice do I have?

The only thing would be to improve the latency in the graphical interface and technical support.


    Muhammed Ali .

Agile & Secure Architecture

  • June 16, 2022
  • Review provided by G2

What do you like best about the product?
First of all it gives you secure connect
What do you dislike about the product?
-gives you a secure connection with authorized users and devices and this module gives you full inspection and blocking capabilities.
-CPX SDP focuses on authentications and enables secure user authentication and device connection to inbound connections.
-last but not least, it decreases lateral movements significantly with zero trust ideology.
What problems is the product solving and how is that benefiting you?
- easy to deploy into the network
- gives you full visibility
- with the user and device authentication, SDP manages the connections and security during COVID and home office days.
- reduce lateral movements
Recommendations to others considering the product:
if you looking after zero trust model, this is what you looking for


    Semih G.

Sandbox Solution

  • January 10, 2022
  • Review provided by G2

What do you like best about the product?
It is hard to bypass sandbox as a threat
What do you dislike about the product?
Vendor can improve inter active sessions.
What problems is the product solving and how is that benefiting you?
It solves advanced threat attacks


    Erdal .

Infinity Total Protection

  • October 08, 2021
  • Review provided by G2

What do you like best about the product?
It is a structure that I find very useful in terms of quickly identifying security vulnerabilities and reducing the total cost.Thanks to the real-time action mechanism, we are constantly one step ahead.
What do you dislike about the product?
As a result of my reviews, I did not encounter a bad or negative comment or user experience in general. Pricing can be confusing at times.
What problems is the product solving and how is that benefiting you?
It simply protects the entire architecture of your company or operations against external or internal threats.


    SAnchez R.

Excellente security solution

  • September 20, 2021
  • Review provided by G2

What do you like best about the product?
I appreciate the innovative side of the software. They use technologies that have machine learning capability to help identify new threats.
What do you dislike about the product?
Nothing. Up to now we have never had problems with Check Point.
What problems is the product solving and how is that benefiting you?
We have strengthened the security of our network and more particularly the remote access for our employees.


    Rachel S.

Great tool of threat prevention

  • August 19, 2021
  • Review provided by G2

What do you like best about the product?
I like this solution because it protects the entire IT infrastructure: network protection, cloud protection, desktop protection... I also appreciate the quality of the IT support and its availability (24 hours a day, 7 days a week)
What do you dislike about the product?
So far, I have not noticed any aspect that I don't like. The only criticism I can make is about the price, but this is understandable given the quality of the service.
What problems is the product solving and how is that benefiting you?
We strengthened the security of the company. Since the installation of infinity total protection, the company has no longer been the victim of cyber-attack


    Bethanie C.

great software to detect and block any malware

  • October 26, 2019
  • Review provided by G2

What do you like best about the product?
I love SandBlast Threat Emulation because it is a really fantastic software that allows me to prevent infections of any type of malware and targeted attacks, in an unparalleled way. This software stands out among other competing software since it has a set of features that make it unique. Among which I find most important to highlight is, that it has the highest capture rate of unknown malware, zero-day attacks and specific attacks, since once it detects a potential threat it is quickly blocked; It has a versatile, intuitive and very clean interface that makes it easy to use and easy to configure; It provides very detailed reports informing the amanaza that I try to penetrate the security system and as if that were not enough, it supports multiple operating systems.
What do you dislike about the product?
So far I do not find any negative characteristics that I should complain about since the software generally works quite well. On one occasion I had a problem with the interface, but it was solved almost immediately by the technical support team.
What problems is the product solving and how is that benefiting you?
Since we started implementing SandBlast Threat Emulation in our company, the benefits that this security measure has provided us have been countless, since unlike other services that offer a static and behavioral analysis, or solutions based on heuristics, This software carries out the evaluation of the possible cyber threat at the instruction level, so the exploits cannot hide, and when detected so quickly, it does not give malware the opportunity to deploy
Recommendations to others considering the product:
If speed, simplicity and ease of use mean a lot to you, SandBlast Threat Emulation is the best solution.


    Sharlotte D.

Excellent alternative for blocking attacks directed at our CPU

  • September 10, 2019
  • Review provided by G2

What do you like best about the product?
The main reason I like this product SandBlast Threat Emulation is because it is an easy-to-use software, it has a wide variety of functions that allows us to keep our CPU out of any targeted attack as well as new malware, it monitors Fast and efficient where when detecting any known or unknown malware blocks it immediately, it is able to protect any type of files such as PDF and Java through an analysis carried out on them, provides better visibility regarding threats They affect the business environment which helps to reduce costs and improve security management regardless of the size of the company and this is thanks to the fact that it provides extremely detailed reports of any threat found in them.
What do you dislike about the product?
The only drawback with which I have encountered this service is that a really advanced configuration is required to be able to establish a good operation of it, however with the help of its support team it was solved correctly and quickly.
What problems is the product solving and how is that benefiting you?
Implementing this software is an excellent security measure since the one that grants monitoring, analysis of more than forty files and the detection of known or unknown malwares and a very complete visualization of any threat that wants to affect the business environment allows us to save costs and to keep abreast of these new malwares so through their reports that are easy to understand to solve any problem in the shortest possible time.
Recommendations to others considering the product:
If I recommend this software to those who are looking for the mitigation of new malware or attacks aimed at business CPU or their files, since this is responsible for evading through rapid monitoring, analyze all these threats so that you can always be aware of all possible threats.


    Printing

Best. Simply.

  • February 01, 2019
  • Review provided by G2

What do you like best about the product?
The best thing is that it is extremely reliable. Its Endpoint function is the best in the market without any doubt. And its advanced threat prevention system is impressive. It is undoubtedly the best in the market.
What do you dislike about the product?
Obviously, it is CISCO, so the only thing that is fucked up is the price. Very good, but very good.
What problems is the product solving and how is that benefiting you?
Defense of the external-internal network.
Recommendations to others considering the product:
If you have money and you want the best this is your option.