We performed a comparison between Check Point Infinity and Palo Alto Networks VM-Series based on real PeerSpot user reviews.
Find out in this report how the two Advanced Threat Protection (ATP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Powerful cyber security functionalities track workflows to block all threats that may arise and affect the workflow chain."
"I would rate the stability a ten out of ten. Stability is always important. I haven't faced any issues with the Infinity Portal in the last six or seven years."
"It is one of the best brands and products in terms of centralization."
"The product, a cloud-based unified security solution, facilitates the automation of security threat detection and vulnerability management across various endpoints, including mobile and IoT devices. A notable feature is the centralized administration, allowing monitoring of existing solutions from web and mobile devices in a unified interface."
"It is a scalable product."
"The detection and reaction rates are good."
"It has come to reinforce the security architecture of the organization since it covers all the necessary pieces of security."
"The product's excellent scalability features have allowed our organization to seamlessly adapt to the growing demand. The consensus mechanism and smart contract capabilities have optimized our workflow, resulting in an overall reduction in the complexity of our organization."
"The most valuable feature is that you can control your traffic flowing out and coming it, allowing you to apply malware and threat protection, as well as vulnerability checks."
"The most valuable feature is the CLI."
"What I like about the VM-Series is that you can launch them in a very short time."
"Using Palo Alto Networks Panorama, we were able to deploy a single point of management and visualization of the firewall infrastructure in cloud, on-premise and integrated with Azure to automate scale up. Its security features, i.e. anti-malware, threat prevention, URL Filtering, VPN, and antivirus are the most valuable. The ID-User integrated with AD and 2FA features are also very useful to provide secure access to servers and some users in the company. "
"The main advantage of Palo Alto Networks VM-Series stems from the fact that you can access it with the help of cloud services."
"Palo Alto Networks VM-Series is very easy to use."
"Palo Alto Networks VM-Series is easy to maintain...From a security point of view, I find Palo Alto Networks VM-Series to be a better product compared to the other solutions in the market."
"App-ID and User-ID have repeatedly shown value in securing business critical systems."
"The console at the beginning also has the section on where to save the logs, however, if by mistake we choose a very remote area, this detail cannot be corrected unless the change of data center where the logs are housed, which is requested through support, which can become a management difficulty."
"The cost of maintaining and purchasing the security components is high."
"While Check Point Infinity is a robust and innovative solution, some areas could benefit from improvement. One area is the user-friendly integration of privacy-focused features."
"The tool should focus on improving artificial intelligence and customer support services."
"The management console has given us some trouble, and the documentation is a little bit rigid in its solution paths."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"The solution's reports should be easy to understand and work with."
"The endpoint solutions offered by Check Point are not prominent enough in the market due to Check Point's poor marketing efforts."
"In the next release, I would like to see better integration of multi-factor authentication vendors."
"We have ran into issues with Palo Alto’s limitations for resolving large IP lists from DNS lookups, as well as the antivirus interfering with App-ID."
"The product could provide protection above Layer 3, which gets into the application layer and provides better visibility into those aspects of application security."
"From time to time, they have released some content updates that have some issues, maybe twice a year."
"The disadvantage with Palo Alto is that they don't have a cloud-based solution that includes a secure web gateway."
"The command-line interface is something that some people struggle with and I think that they should have an option to go straight to the GUI."
"In the next release, I would like to see better integration between the endpoints and the firewalls."
"AWS doesn't integrate well with third-party firewalls."
Check Point Infinity is ranked 14th in Advanced Threat Protection (ATP) with 26 reviews while Palo Alto Networks VM-Series is ranked 10th in Advanced Threat Protection (ATP) with 53 reviews. Check Point Infinity is rated 8.8, while Palo Alto Networks VM-Series is rated 8.6. The top reviewer of Check Point Infinity writes "Provide unified threat prevention and response across our entire decentralized finance system". On the other hand, the top reviewer of Palo Alto Networks VM-Series writes "Many features are optimized for troubleshooting real-time scenarios, saving a lot of time". Check Point Infinity is most compared with CyberArk Privileged Access Manager, Cisco Secure Network Analytics, Skybox Security Suite, Proofpoint Email Protection and Microsoft Defender for Office 365, whereas Palo Alto Networks VM-Series is most compared with Azure Firewall, Fortinet FortiGate-VM, Fortinet FortiGate, Cisco Secure Firewall and Palo Alto Networks NG Firewalls. See our Check Point Infinity vs. Palo Alto Networks VM-Series report.
See our list of best Advanced Threat Protection (ATP) vendors.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.