Try our new research platform with insights from 80,000+ expert users

Check Point Infinity vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
5.8
Check Point Infinity enhances security and ROI with streamlined management, remote connectivity, and justified pricing for Portuguese businesses.
Sentiment score
6.6
Organizations gain enhanced security, compliance, and cost savings with CyberArk, improving efficiency, user adoption, and risk reduction.
When I use different Check Point tools, I save support time overall.
IT at a security firm with 51-200 employees
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
PM at SECURE SOFT
I would say we can save about 90% of our budget with Check Point Infinity.
Advisor at Rossell Techsys (Division of Rossell India Limited)
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
Cyber Security Engineer at Isolutions Associates Ltd (ISOLS)
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
Senior Engineer at a tech vendor with 1,001-5,000 employees
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
Head of Sales Services Department at a comms service provider with 51-200 employees
 

Customer Service

Sentiment score
6.2
Check Point Infinity's customer service is praised for responsiveness and knowledge, but some users experience delays and slow ticket processes.
Sentiment score
6.5
CyberArk's support receives mixed reviews, praised for expertise but criticized for delays, especially at Tier One, yet committed to improvement.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
Network Engineer at Insa
The technical support is excellent with quick response times.
PM at SECURE SOFT
Check Point support is very responsive.
Advisor at Rossell Techsys (Division of Rossell India Limited)
CyberArk has been exceptional in coming back to us with immediate responses.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
It could be forever until you talk to someone who knows what they are doing.
Senior PAM Consultant at iC Consult GmbH
Based on the issue resolution and support quality, I rate the support 10 out of 10.
Operation Specialists at a tech vendor with 10,001+ employees
 

Scalability Issues

Sentiment score
7.6
Check Point Infinity offers scalable flexibility, efficiently managing growth and diverse requirements for businesses of all sizes and capacities.
Sentiment score
7.6
CyberArk Privileged Access Manager scales efficiently for diverse needs, with flexible deployment options and positive user feedback on growth adaptability.
The Infinity Portal lets us manage on-premises, cloud and edge environments from a single elastic console.
Network Security Engineer at Arrow PC Network Pvt Ltd
We have not faced any issues with scalability.
Team Lead, Network & Security at Max international
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
PM at SECURE SOFT
The CPM can reportedly handle up to 50,000 accounts independently without issue.
Privileged Access Management Engineer at a hospitality company with 10,001+ employees
I would rate it a ten out of ten for scalability.
IT Cyber Security Lead at a mining and metals company with 1,001-5,000 employees
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
Senior PAM Consultant at iC Consult GmbH
 

Stability Issues

Sentiment score
8.5
Check Point Infinity is highly rated for stability, with mature components and minimal issues, often scoring 8-10 out of 10.
Sentiment score
7.7
CyberArk Privileged Access Manager is praised for its robust stability and high availability, with minor issues noted under heavy load.
Check Point Infinity is a very stable solution; I don't remember experiencing any downtime.
Private User at a educational organization with 5,001-10,000 employees
Check Point Infinity is very stable for our company.
IT Support at a security firm with 51-200 employees
Check Point Infinity has achieved a 99.9% block rate on zero-day malware in the 2025 Miercom test.
Network Security Engineer at Arrow PC Network Pvt Ltd
Proper fine-tuning and expertise ensure the product performs well.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
Overall, the stability of the solution is high.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It has a large customer base and positive feedback within my network.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
 

Room For Improvement

Check Point Infinity suffers from slow support, high costs, unclear documentation, confusing licensing, and a cumbersome user experience.
CyberArk Privileged Access Manager needs UI, integration, documentation, performance, complexity improvements, better plugins, licensing, reporting, and support.
A more guided setup process or contextual help within the dashboard would make it easier for new team members to get up to speed.
Cloud Support at a security firm with 51-200 employees
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
Network Engineer at Insa
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
Advisor at Rossell Techsys (Division of Rossell India Limited)
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
Presales Engineer at a computer software company with 201-500 employees
We cannot generate a plug-in for web-based applications.
Contractor at a pharma/biotech company with 5,001-10,000 employees
If they want clients to move to the cloud, they need to support them in real-time.
Senior Manager at a consultancy with 11-50 employees
 

Setup Cost

Enterprises have mixed views on Check Point Infinity's pricing, appreciating flexibility but finding costs high for certain features.
CyberArk Privileged Access Manager is costly but offers robust features and security, providing value despite higher pricing.
In terms of pricing, I find Check Point Infinity to be an expensive product.
Advisor at Rossell Techsys (Division of Rossell India Limited)
The setup cost or license is very high.
Cloud Support at a security firm with 51-200 employees
We received a relative discount for this.
Team Lead, Network & Security at Max international
CyberArk is expensive compared to other products I know.
Cybersecurity Specialist at a comms service provider with 5,001-10,000 employees
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
Presales Engineer at a computer software company with 201-500 employees
CyberArk's SaaS solution is particularly expensive.
Senior Manager at a energy/utilities company with 1,001-5,000 employees
 

Valuable Features

Check Point Infinity provides centralized security management with AI-driven threat prevention, enhancing efficiency and reducing complexity across platforms.
CyberArk Privileged Access Manager offers password management, session monitoring, and threat analytics to enhance security and compliance.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
PM at SECURE SOFT
Check Point Infinity has positively impacted my organization by making everything better, including the speed of the network and the security.
Private User at a educational organization with 5,001-10,000 employees
We have seen a faster response time and reduced effort from the network and security engineers while going through logs.
Team Lead, Network & Security at Max international
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
Senior Cybersecurity Manager at a financial services firm with 10,001+ employees
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
Senior Manager at a consultancy with 11-50 employees
It can integrate with Splunk, SNMP, and other solutions and technologies.
Technical Support Analyst at Capgemini
 

Categories and Ranking

Check Point Infinity
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
41
Ranking in other categories
Advanced Threat Protection (ATP) (9th), AI-Powered Cybersecurity Platforms (7th), AI Security (4th), AI Observability (11th)
CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

While both are Network Security Systems solutions, they serve different purposes. Check Point Infinity is designed for AI-Powered Cybersecurity Platforms and holds a mindshare of 1.7%.
CyberArk Privileged Access Manager, on the other hand, focuses on Privileged Access Management (PAM), holds 11.6% mindshare, down 20.0% since last year.
AI-Powered Cybersecurity Platforms Market Share Distribution
ProductMarket Share (%)
Check Point Infinity1.7%
CrowdStrike Falcon17.7%
Darktrace15.2%
Other65.4%
AI-Powered Cybersecurity Platforms
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.6%
WALLIX Bastion5.1%
Delinea Secret Server5.0%
Other78.3%
Privileged Access Management (PAM)
 

Featured Reviews

Chetan Bhati - PeerSpot reviewer
Network Security Engineer at Arrow PC Network Pvt Ltd
Improves daily threat prevention with real-time detection and requires better alert tuning for faster prioritization
Check Point Infinity is powerful, but there are a few areas that could improve. The learning curve for new users can be steep, especially when managing multiple modules like CloudGuard, Quantum, and Harmony together. Some alerts can be overwhelming, making it harder to prioritize without fine-tuning. While automation helps, occasional manual adjustments are still needed. Overall, it is strong, but simplifying onboarding and alert management would make it even better. Integration with third-party tools could be smoother. The reporting dashboard could be more customizable for quick insights. Performance on very large networks can sometimes slow during updates. Overall, while the platform is strong, improving user experience, alert management, and integration would make it even more efficient for daily operations.
SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.
report
Use our free recommendation engine to learn which AI-Powered Cybersecurity Platforms solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Security Firm
21%
Educational Organization
10%
Computer Software Company
10%
Manufacturing Company
10%
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business40
Midsize Enterprise9
Large Enterprise10
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
 

Questions from the Community

What do you like most about Check Point Infinity?
Check Point Infinity's threat prevention capabilities benefitted our organization.
What needs improvement with Check Point Infinity?
Check Point Infinity could be improved with more intuitive documentation.
What is your primary use case for Check Point Infinity?
Check Point Infinity is used primarily for consolidating security across networks, including cloud and on-premise, and endpoints under one architecture. It is relied upon most for unified threat pr...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
 

Also Known As

R80, Infinity
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

Edel AG
Rockwell Automation
Find out what your peers are saying about CrowdStrike, Palo Alto Networks, Trend Micro and others in AI-Powered Cybersecurity Platforms. Updated: January 2026.
881,082 professionals have used our research since 2012.