We have been deploying Check Point Infinity as a new technology for security purposes with our biggest customer in Ethiopia. It serves to secure endpoints and protect from intrusion and various threats. The product is deployed as a SaaS solution, and we use it to protect mobile users and other aspects of the organization.
Network Engineer at a outsourcing company with 201-500 employees
Empowering security with seamless AI-guided configurations
Pros and Cons
- "Check Point Infinity offers a multi-layered security approach that enhances our IT security environment."
- "I recommend Check Point Infinity to other customers due to its notable benefits and positive experiences with a major financial institution."
- "I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity."
- "I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity."
What is our primary use case?
What is most valuable?
Check Point Infinity offers a multi-layered security approach that enhances our IT security environment. It provides tracking protection, intrusion prevention, and supports mobile users efficiently.
The AI integration helps in guiding configurations and installations, making the process smoother.
Additionally, Check Point is a supportive vendor, offering notable assistance and knowledge sharing during installations and configurations.
What needs improvement?
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity. This would help users to easily understand and deploy the solution.
For how long have I used the solution?
We have been working with Check Point Infinity for one year, as it was deployed with the aid of professional service last year.
Buyer's Guide
Check Point Infinity
January 2026
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
What do I think about the stability of the solution?
For the time being, Check Point Infinity is stable with no issues concerning stability.
What do I think about the scalability of the solution?
The product is scalable. If customers require scalability, we can scale the product accordingly to suit organizational growth.
How are customer service and support?
Check Point provides excellent support. As soon as we raise a ticket, they engage promptly, indicating strong vendor support. User support has not presented any issues.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are also working with IBM, Cisco, and FortiGate along with Check Point, for different solutions.
How was the initial setup?
The initial setup is quite seamless and smooth. We follow the solutions easily without encountering any challenges.
What about the implementation team?
The deployment was conducted with the assistance of professional services. This external team has been very supportive and provided necessary guidance throughout the process.
What was our ROI?
We are currently not assessing the financial benefits or return on investment for Check Point Infinity, as we are in the process of deploying it.
What's my experience with pricing, setup cost, and licensing?
I am not aware of the financial cost of the licensing for Check Point Infinity, as I am involved in the technical aspects. The product, as supported by Check Point, offers invaluable assistance for ease of deployment.
Which other solutions did I evaluate?
We are also working with other vendors such as IBM, Cisco, and FortiGate.
What other advice do I have?
I recommend Check Point Infinity to other customers due to its notable benefits and positive experiences with a major financial institution.
I rate Check Point Infinity nine out of ten for its overall satisfactory and scalable features.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
Network Security Engineer at a computer software company with 51-200 employees
Has simplified multi-location security management through a unified cloud dashboard
Pros and Cons
- "Check Point Infinity Portal is a cloud-based SaaS platform that serves as a unified security management control for an organization's entire infrastructure, including network, cloud, endpoint, mobile, and IoT."
- "Sometimes when Check Point Infinity cloud is stuck and the policy takes a long time to push, this is not a good feature."
What is our primary use case?
I use Check Point Infinity Portal for my multiple locations and manage them via a single dashboard.
What is most valuable?
Check Point Infinity Portal is a cloud-based SaaS platform that serves as a unified security management control for an organization's entire infrastructure, including network, cloud, endpoint, mobile, and IoT. It provides a single pane of glass view across network, cloud, endpoint, and mobile security with simplified management.
What needs improvement?
Sometimes when Check Point Infinity cloud is stuck and the policy takes a long time to push, this is not a good feature.
For how long have I used the solution?
I have been using Check Point Infinity Portal for the last one year.
What do I think about the stability of the solution?
I have experienced issues where the cloud team has indicated there is a cloud issue affecting policy deployment.
What other advice do I have?
I advise others looking into using Check Point Infinity to understand which part of their environment they want to secure, whether that is network gateway, cloud workload, endpoint, mobile, or IoT, as Check Point Infinity platform offers broad coverage across all those areas. Establishing clear goals such as improving visibility, unified policies, management, and reduction is important as it reduces management complexity and consolidates control into a single platform. I would rate this solution a 9.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Nov 8, 2025
Flag as inappropriateBuyer's Guide
Check Point Infinity
January 2026
Learn what your peers think about Check Point Infinity. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
Security and Compliance Architect at a manufacturing company with 1,001-5,000 employees
A unified security system offering intelligent threat prevention but the training is difficult
Pros and Cons
- "Check Point Infinity has significantly improved our workflow within the ecosystem, making processes smoother and more efficient."
- "Some aspects of the reporting in Check Point may take time to learn and become comfortable with."
What is our primary use case?
We leveraged Check Point Infinity primarily for gateway security, cloud security, endpoint security, and infrastructure as a service.
How has it helped my organization?
Architecturally, Check Point functions as a unified security system. Only one policy management section enables administrators to manage all policies from one console. The platform offers intelligent threat prevention capabilities, flagging suspicious activities and preventing potential threats before they impact your network, cloud, or mobile environments.
What is most valuable?
The whole process of consolidation, centralization, and obtaining a single pane of glass view into the current state, necessary changes, and areas for improvement.
Check Point Infinity has significantly improved our workflow within the ecosystem, making processes smoother and more efficient. It hasn’t added unnecessary work; instead, it has streamlined operations and simplified tasks.
What needs improvement?
Some aspects of the reporting in Check Point may take time to learn and become comfortable with. Training is necessary for certain areas, as some features might not be as intuitive. It's important to understand the workflow and how various components function.
For how long have I used the solution?
I have been using Check Point Infinity for one year.
What do I think about the stability of the solution?
It was very fairly stable.
I rate the stability an eight out of ten.
What do I think about the scalability of the solution?
It is a scalable solution. It can accommodate an increase in user count, handle new requirements and changes, and address emerging attack vectors, ensuring continued functionality and security.
It is used by security analysts, security engineers, and some architects.
I rate the scalability an eight out of ten.
Which solution did I use previously and why did I switch?
We were using CrowdStrike.
How was the initial setup?
The initial setup is straightforward. The deployment process involves a team of network architects, security architects, security analysts, and security engineers.
I rate it an eight out of ten.
What was our ROI?
It saved our time by 25%.
What's my experience with pricing, setup cost, and licensing?
It costs around 40k to 50k. We ended up getting a premium one. There was some additional cost.
What other advice do I have?
We could have faced it if Check Point Infinity had not prevented it. This includes understanding the potential security incident we were looking at, gaining insights into where the attempt was being made from, identifying the associated IOCs, and potentially attributing who might be targeting us.
Maintenance wasn't much needed. The fifteen people we had were sufficient. We had coverage across different time zones, so they were able to cover it.
I recommend the solution.
Overall, I rate the solution a seven out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Analista de TI - suporte a redes e segurança at a government with 1,001-5,000 employees
Offers integration with Active Directory, where you can allow or deny traffic based on users or groups of users from Active Directory
Pros and Cons
- "Check Point Infinity's threat prevention capabilities benefitted our organization."
- "We have had some performance issues. Because of this, we had to redirect traffic to be analyzed by other appliances."
What is our primary use case?
We have main offices in Brazil and branch offices in each of our state capitals. So, we have 26 branch offices in total. Each branch office used to have a small Check Point appliance. We're moving away from that model; they won't access the internet directly anymore. Instead, they'll pass through a central kind of star network.
We use two levels of firewalls: an external firewall and an internal firewall. We have a DMZ between these two firewall clusters with high availability. Each firewall has IPS, web content filtering, bot protection, and antivirus enabled. We'll contract some of those features as part of an MSSP service. We don't buy products or appliances directly.
Our procurement requirements allow other manufacturers to participate. The decision isn't ours or the integrator's – it's how we buy in Brazil. The vendor offering the lowest price for a product that meets the requirements wins. We cannot choose a specific brand or product name.
How has it helped my organization?
Before contracting the MSSP, we had an IPS (I don't remember if it was Check Point). However, we only detected signatures; we weren't confident enough to block them due to false positives. For the past 10 years, we have had a procedure where we get new signatures weekly, test for false positives, and set exclusions. Most relevant signatures are now in use, so the IPS is an important layer of protection for us. So, Check Point Infinity's threat prevention capabilities benefitted our organization.
We haven't had any problems with integration, but we don't need many integrations. The main one is with SIEM. The bigger issue is that we use ArcSight as our SIEM. It's very difficult to migrate from one SIEM solution to another.
We are on the journey of moving to the cloud right now. We had on-premises services, but we are going to move to a cloud environment where we have Azure and AWS Cloud. Because of this, the new solution will have virtual firewalls at the edge of each cloud.
What is most valuable?
I like all the features because within the suite we use, it's sometimes hard to know exactly which features are being used and where they come from.
But, the main feature is the integration with Active Directory, where you can allow or deny traffic based on users or groups of users from Active Directory.
What needs improvement?
We have had some performance issues. Because of this, we had to redirect traffic to be analyzed by other appliances. I'm not sure if higher-end appliances would still have this problem.
We also experienced issues with deploying new configuration versions to all branch appliances, but we won't be using this setup anymore. We don't know exactly how the virtual appliances will work to protect the cloud. It's a new thing for us.
For how long have I used the solution?
I have been using it for 14 years now.
What do I think about the stability of the solution?
I would rate the stability an eight out of ten. We've had some problems in the past.
What do I think about the scalability of the solution?
We had an issue with scalability before. We think the technology changes caused by mobile traffic impacted our appliances. Since we're buying a bigger solution now, I think we won't have this problem this time.
Check Point engineers were involved, and they suggested we use a virtual appliance to remove this traffic from our physical appliance.
How are customer service and support?
We've had some difficult experiences sometimes, such as we have to send again files and information.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We had another solution a long time ago. It was a small, free solution, very difficult to compare. We've used Check Point for a long time, so it's impossible to make a fair comparison.
We also use Azure Sentinel, but we do not receive logs from security solutions. It's possible we'll migrate to Azure Sentinel in the future. Nowadays, it's difficult to use a SIEM that is local and not cloud-based.
How was the initial setup?
The initial setup will be done by the MSSP provider, not us. They'll handle the appliances, configuration, and integration. When we pay, everything must be working perfectly, and the documentation must be delivered to us.
The first deployment took about nine months because we changed the active tool. The second deployment was a bit different and took about six months. This timeline includes everything: equipment and features, but it also has solutions that aren't exactly Check Point firewalls, like the WAF (Web Application Firewall) or integration with SIEMs—also, the implementation of use cases in the SIEM.
What about the implementation team?
There are two teams involved in the deployment: our team and the supplier's team. Usually, there are three or four people from the supplier and the same number from us.
It's maintained by the supplier. We have an SLA (Service Level Agreement) in place. They install, maintain, and manage the entire solution. We are a user of the solution; we open tickets to them, and they make the configurations. They're also responsible for availability and other aspects.
What other advice do I have?
I would recommend it. However, Check Point could improve its tech support systems. If they had more engineers in Brazil, I think it would be good.
Overall, I would rate the solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Presales Engineer at a comms service provider with 51-200 employees
We can navigate to all the products very easily because it is written in a normal installation
Pros and Cons
- "Infinity is a technical console where we have to log in, and we can navigate to all the products very easily because it is written in a normal installation. People who know about the product can click and take care of their activity."
- "Technical support is pretty delayed."
What is our primary use case?
Infinity is a single platform where you can integrate all the Check Point solutions such as Check Point Email Security, Check Point Endpoint Protection, Check Point SaaS, Check Point web proxy solutions, and Check Point Firewall. It can be integrated into the Infinity portal, and we can manage and configure it from the Infiniti portal.
What is most valuable?
Infinity is a technical console where we have to log in, and we can navigate to all the products very easily because it is written in a normal installation. People who know about the product can click and take care of their activity.
What needs improvement?
Technical support is pretty delayed. It's very slow, and they have not yet received their IT. Compared to other OEMs, Check Point's response is a bit slow but could have been improved. There are two areas to improve: The latency of the sandboxing and the technical support efficacy.
For how long have I used the solution?
I have been using Check Point Infinity for five years.
What do I think about the stability of the solution?
I never felt any downtime or any login issues. Whenever I try to log in, it happens properly and normally.
I rate the solution’s stability a nine out of ten.
What do I think about the scalability of the solution?
5,000 end users are using the solution.
I rate the solution’s scalability a nine out of ten.
How was the initial setup?
The initial setup is very straightforward. Also, the OEM vendor will help you with the login, configure the authentication, get into the login, or get into the console, load your device, and start configuring it.
What was our ROI?
Check Point Infinity offers numerous benefits. It provides peace of mind by simplifying security management. It is responsible for on-premises security, allowing users to configure it anywhere. Additionally, it enables seamless remote connection, even if the user is away from the central point. It's the latest in security technology, offering immense value.
What's my experience with pricing, setup cost, and licensing?
Customers need to pay yearly.
What other advice do I have?
Infiniti is a portal that integrates multiple products.
It's a unified management console. I'm able to manage all the solutions and products from my single Infinity console regardless of multiple branches across the globe, anywhere in the world, and they can be controlled from a single console. The major benefit is the SaaS offering. So, customers don't have to manage everything or keep any infrastructure on-premises; it's completely provided by Check Point, with data centers integrated into Infinity. Thus, there are no data integration problems.
Check Point Infinity is well known for its CDR (Content Disarm and Reconstruction) technology rather than CRO (Customer Revenue Optimization) debt protection. This technology is primarily associated with its sandboxing capabilities. However, there is room for improvement in terms of latency when scanning and delivering attachments, links, or files. Although the delay is often negligible, competitors may offer faster results with their sandboxing solutions.
For customers prioritizing robust security, performance, and stability, Check Point can be an excellent choice. Their extensive technical expertise and global deployments contribute to the reliability of their products. With the Infinity architecture, which facilitates comprehensive threat coverage, Check Point offers scalability, reliability, and expandability across various infrastructure needs.
Overall, I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer.
Senior Technical Consultant- Cyber Security at a tech services company with 51-200 employees
Centralizes the management of all our Check Point products in one place and offers robust stability
Pros and Cons
- "I would rate the stability a ten out of ten. Stability is always important. I haven't faced any issues with the Infinity Portal in the last six or seven years."
- "The updates could be less frequent."
What is our primary use case?
The Infinity Portal is primarily a management tool. It's a single pane of glass to access and control all our Check Point products from one central location.
I work extensively with the Infinity Portal. It's the central management interface for all our Check Point products.
How has it helped my organization?
It has brought value. For example, a customer already has Check Point solutions in place. Rather than opening a separate console for each product, they can use the Infinity Portal. Just open Infinity, and with a single click, they're redirected to the product they need – email security, Harmony Connect, Harmony Internet Access, for example. It eliminates the need to open multiple interfaces.
It's how we manage products like Harmony Mobile, which enhances our mobile security.
Infinity is a platform. The zero-day protection capabilities would come from the specific products we use within it.
My primary work involves Check Point firewalls and the Harmony product portfolio. We've definitely seen a lot of focus and new business growth in areas like Harmony and Arbor.
What is most valuable?
It's very easy to access and works fine for me. Centralizing the management of all our Check Point products in one place saves our team a ton of time.
Infinity is a platform rather than a specific security feature. It provides a central access point for our purchased Check Point products like Harmony Email, Harmony Connect, Harmony Browser, Harmony VPN, etc.
The unified management console enhances security operations. We manage all our products through a single console instead of needing to open separate interfaces for each one.
What needs improvement?
The updates could be less frequent.
For how long have I used the solution?
I have been using it for six years now.
What do I think about the stability of the solution?
I would rate the stability a ten out of ten. Stability is always important. I haven't faced any issues with the Infinity Portal in the last six or seven years.
What do I think about the scalability of the solution?
There is no need for scalability as it is a ready-made and web-based product that we got from Check Point. Most of our customers use it, for example, firewalls, Harmony product portfolio, and cloud/network security. Most of these customers find the Infinity Portal beneficial because of its convenience.
There are easily over a hundred customers. Customers already using Check Point products are, by default, using the Infinity Portal to access them. Even I use it.
How are customer service and support?
The customer service and support are very good. It is very fast and customer friendly. It has been very friendly.
How was the initial setup?
It's incredibly easy. Once you have a Check Point account, the portal is ready to use. All you need is the URL.
As a cloud-based platform, so, there wasn't easy to difficult. It is a one-minute job. There are no specific requirements for the platform.
One of the benefits is that there's no deployment required for the Infinity Portal itself. It's accessible via a simple URL.
What's my experience with pricing, setup cost, and licensing?
There's no additional license requirement.
What other advice do I have?
Overall, I would rate the solution a ten out of ten. It's reliable, stable, and very easy for anyone to access from anywhere.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Managing Partner at a non-tech company with 1,001-5,000 employees
Provides robust cybersecurity with a comprehensive suite of features, expert support, and scalable cloud-based architecture, ensuring effective threat detection and continuous improvement
Pros and Cons
- "A notable aspect that I appreciate is their ongoing effort to redesign the portal, giving it a fresh and centralized appearance."
- "It seems that the performance varies, likely influenced by the client's size and the provisioning of resources."
What is our primary use case?
The use case involves managing various aspects, including endpoint security, SaaS interface, and firewall management within the Check Point Infinity architecture. The Infinity portal serves as a centralized hub for overseeing all components of the Check Point security suite. The architecture incorporates XDR and MDR, enabling automatic correlation of information. In scenarios where a security issue arises, the system can automatically analyze data from diverse platforms, such as endpoints, firewalls, and Office 365. T
How has it helped my organization?
It offers significant benefits as a cybersecurity leader, known for pioneering the logical firewall and excelling with its Infinity suite. The expertise of Check Point professionals ensures efficient handling of challenges.
What is most valuable?
I have a positive history with Check Point, having worked with their firewall models since the nineties. A notable aspect that I appreciate is their ongoing effort to redesign the portal, giving it a fresh and centralized appearance. This is particularly significant as the transition from Check Point on-premises solutions to the cloud.
What needs improvement?
I've observed some challenges in terms of usability and performance, particularly since the shift to a service-oriented model like Infinity. It seems that the performance varies, likely influenced by the client's size and the provisioning of resources.
For how long have I used the solution?
We have been using it for several years, and since it was released we have become partners.
What do I think about the stability of the solution?
The stability is influenced by the specific configuration and the capabilities of the machine itself. Currently, I can confidently rate the stability at eight out of ten.
What do I think about the scalability of the solution?
The scalability and power seem to impact the interface quality; larger clients with more resources receive a better interface experience. In cases where clients initially buy licenses for a certain number of machines and later realize they need more, Check Point offers flexibility. Clients can purchase additional licenses even if it's mid-year, without the need to synchronize license renewal dates.
How are customer service and support?
My experiences with Check Point's tech support have been positive. They responded promptly to issues, even conducting a video call for clarification. A licensing complication was swiftly addressed, showing their commitment to resolving bugs.
How was the initial setup?
The initial setup was straightforward.
What about the implementation team?
The deployment time varies depending on the specific machine and its configuration, however, in general, the implementation and installation processes are relatively quick. The deployment process is contingent on the specific configuration and the underlying infrastructure. However, due to our familiarity with the products, deployment is straightforward and typically doesn't extend over days. Instead, it can be accomplished in a matter of hours or even minutes, particularly in smaller cases. The process begins with obtaining the necessary licenses through a purchase order. Once acquired, we seamlessly integrate them into the Check Point dashboard, either through a physical conversion or by utilizing the Infinity portal. Subsequently, if configuration is required, we create the tenant and apply the license to it. From this point onward, the deployment process is quite straightforward and efficient.
What was our ROI?
The price is justified by the security it provides. In a world where security breaches can lead to significant financial losses, the investment in robust cybersecurity solutions is seen as essential. Moreover, the ongoing improvements in the dashboard experience further enhance the overall value proposition of Check Point Infinity, making it a comprehensive and worthwhile security solution for businesses in Portugal.
What's my experience with pricing, setup cost, and licensing?
In Portugal, pricing for security solutions, particularly Check Point, is not a fixed rate. It's determined by factors like the brand's prominence and whether the product is flagged. The flexibility in pricing is advantageous, and being a special partner allows for negotiating special rates based on the project requirements. Unlike services like Office 365, Check Point licenses are not based on users but rather on machines. Clients are required to pay when submitting a purchase order. However, for those interested in trying the product, whether for a Proof of Concept or other purposes, we can facilitate trials. As partners, we have the ability to request trials from Check Point or conduct trials ourselves for one to three months. While trial versions can't be extended, we can release a new license with an additional thirty days, allowing clients to continue testing the product. After the trial period, we can convert the tenants and apply for a full license, enabling clients to choose the desired products for implementation.
What other advice do I have?
Overall, I would rate it nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Systems Integrator at a tech services company with 51-200 employees
Easy to deploy with a nice GUI and good AI
Pros and Cons
- "The sandblast threat emulation is great."
- "We'd like to see support for fiber connections."
What is our primary use case?
We required a first line of defense to protect, monitor, and ensure that no confidential information leaves the internal network. We also required a device that can segment our network so that different subnets like the DMZ, Production network, and testing environments. Threat prevention that required AI and ML capabilities was another reason to acquire the Check Point Quantum Spark NGFW. Finally, it offers an all-in-one solution that was a necessity where the same instance could manage and monitor VPNs, application control, web filtering, intrusion detection, and email security.
How has it helped my organization?
With Check Point Quantum Spark, we have a first line of defense in our environment, seated just after the router that connects to the ISP's endpoint, all traffic entering and leaving the network is monitored, and filtered depending on the different rules created.
The functionality of AI helps further in the threat detection field. This NGFW is able to support a large number of VPN connections and at the same time monitor these connections for any anomaly.
Finally, for any flagged threats, a sandbox functionality is also provided making it even more robust in detecting zero-day attacks.
What is most valuable?
The sandblast threat emulation is great. We are able to visualize the extent of specific threats without necessarily having them deployed in our environment. The Sandbox feature is able to virtualize an environment that can mirror what we have in the internal environment.
The quality of Service for different traffic types is excellent. We are able to prioritize business-critical traffic over other types of traffic like streaming.
Artificial intelligence threat profiling has helped a lot in detecting and protecting the internal network from zero-day, DNS, and DDoS attacks.
What needs improvement?
We'd like to see support for fiber connections. With the growth of the network, we would expect that more and more traffic is going through this device and soon enough, the bottleneck will be the type of connection being used to transfer data to the router and further to the ISP. A throughput of 1GBPS will hinder performance on the network.
Configuring fault tolerance for specific features, for example, power sources would ensure that the chances of the system shutting down due to a power surge are highly limited. This can further increase the SLA to 99.99%
For how long have I used the solution?
We've used the solution for three years and we just recently upgraded to the 1535 series.
What do I think about the stability of the solution?
The system is stable and able to perform with the advised load without fail.
What do I think about the scalability of the solution?
Quantum Spark is designed for small to medium businesses. With this in mind, the scalability is perfect and will support up to a firewall throughput of 1GBPS which is favorable for an SMB.
How are customer service and support?
The Check Point customer service is prompt and with their knowledge base, the majority of the issues incurred are already cleared noted with a list of multiple solutions.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously we used the Sophos XGS series. The Sophos XGS firewall no longer met the business' growing needs as it further led to a slowness in the performance of the network hence the search for a new system that would fix this.
How was the initial setup?
The initial setup was straightforward. Check Point's GUI interfaces are user-friendly, and it also provides a lot of information on setting up their devices.
What about the implementation team?
This was an in-house deployment.
What was our ROI?
With the increased internal network performance and a decrease in the threats being exposed to the network; the return on investment for this is roughly in the range of 40% to 60%.
What's my experience with pricing, setup cost, and licensing?
Quantum Spark has different subscription models where you can add more functionality as required. For a constrained budget, you can specifically pick out the functionalities you want, and pay for that.
Which other solutions did I evaluate?
We also considered:
- Cisco ASA 5500 series
- Cisco FirePower 1000s
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Infinity Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
AI-Powered Cybersecurity Platforms Advanced Threat Protection (ATP) AI Security AI ObservabilityPopular Comparisons
Microsoft Defender for Endpoint
Microsoft Defender for Office 365
Darktrace
Cortex XDR by Palo Alto Networks
Proofpoint Email Protection
Trend Vision One
Vectra AI
Cortex XSIAM
Palo Alto Networks WildFire
Microsoft Defender Vulnerability Management
Palo Alto Networks VM-Series
IRONSCALES
Google Security Operations
Trellix Advanced Threat Defense
Buyer's Guide
Download our free Check Point Infinity Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:



















