

Check Point Infinity and Microsoft Defender for Office 365 are leading solutions in the cybersecurity sector, offering comprehensive protection for various IT environments. Check Point Infinity holds an edge in providing a unified security architecture with advanced zero-trust capabilities, while Microsoft Defender excels in integrating with Microsoft ecosystems.
Features: Check Point Infinity includes a unified security architecture that covers data centers, clouds, and endpoints with robust Zero Trust capabilities. Its real-time threat prevention and centralized management via a console are noteworthy. Microsoft Defender for Office 365 provides comprehensive email security and threat detection within the Office suite. It is particularly valued for its seamless integration with existing Microsoft products and data loss prevention across multiple platforms.
Room for Improvement: Check Point Infinity could benefit from better documentation, a clearer licensing model, and improved support responsiveness and effectiveness. Users also report occasional latency issues. Microsoft Defender for Office 365 should enhance its scalability, provide more detailed security reports, simplify its interface, and work on reducing false positives. Users also wish for better integration with third-party apps and improved phishing detection.
Ease of Deployment and Customer Service: Check Point Infinity offers flexible deployment across on-premises, hybrid, and cloud environments, though users face challenges with slow support and complex licensing. Microsoft Defender for Office 365 is praised for its easy integration within Microsoft ecosystems and operates well in hybrid and cloud settings. Its customer service is generally responsive but could improve in resource support allocation.
Pricing and ROI: Check Point Infinity's pricing is high due to its complex licensing, but it is seen as delivering significant ROI with comprehensive security enhancements. Microsoft Defender for Office 365 follows a subscription model linked to Microsoft licensing plans and is considered expensive, especially for smaller businesses, though it offers significant value within its ecosystem.
When I use different Check Point tools, I save support time overall.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
I would say we can save about 90% of our budget with Check Point Infinity.
It has also decreased our time to detection and response by about 15 to 20 percent.
Overall, cost of owning and operating our system goes down.
It's hard to quantify the return on investment we've seen from Microsoft Defender for Office 365.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
The technical support is excellent with quick response times.
Check Point support is very responsive.
Over the past two years, there have been no critical problems.
we opened tickets, and they typically resolve them quickly.
With a subscription for Microsoft Defender for Office 365, it is an eight. Without it, it is a six.
The Infinity Portal lets us manage on-premises, cloud and edge environments from a single elastic console.
We have not faced any issues with scalability.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
We have never faced scalability problems, and Microsoft manages it effectively.
Microsoft Defender for Office 365 scales transparently for us, as we grew from 1,000 users to 3,000 users, and we didn't notice much difference.
Microsoft Defender for Office 365 scales with the growing needs of my company well.
Check Point Infinity is a very stable solution; I don't remember experiencing any downtime.
Check Point Infinity is very stable for our company.
Check Point Infinity has achieved a 99.9% block rate on zero-day malware in the 2025 Miercom test.
I would rate the stability of Microsoft Defender for Office 365 as 10 over 10 because it's highly available, it works, and it does the job it is meant to do.
I have not experienced any downtime, crashes, or performance issues because of Defender.
The solution is stable, as we have been using it for the past two years.
A more guided setup process or contextual help within the dashboard would make it easier for new team members to get up to speed.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
The main area for improvement is simplifying the implementation and rollout process.
Microsoft could improve by offering recommendations for domain spoofing attacks, especially scenarios where DNS records like SPF, DKIM, and DMARC are not properly published.
There is a different console for different things; I just want one consolidated console.
In terms of pricing, I find Check Point Infinity to be an expensive product.
The setup cost or license is very high.
We received a relative discount for this.
We've likely saved 30% of costs.
Money-wise, it is a part of the Office 365 suite, making it slightly more expensive compared to Trend Micro.
Microsoft is quite affordable with a lot of features available for any size organization.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
Check Point Infinity has positively impacted my organization by making everything better, including the speed of the network and the security.
We have seen a faster response time and reduced effort from the network and security engineers while going through logs.
It ranks the threats and allows us to prioritize those hitting us the hardest, such as email threats.
It provides end-to-end visibility on email threats such as phishing, extending beyond Exchange Online Protection.
The value of the DLP feature is significant to us because we have internal data, sometimes sensitive, and the users may not always be aware of security and privacy, which might lead them to send out information mistakenly to external parties.
| Product | Mindshare (%) |
|---|---|
| Microsoft Defender for Office 365 | 6.7% |
| Check Point Infinity | 2.7% |
| Other | 90.6% |


| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 9 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 24 |
| Midsize Enterprise | 12 |
| Large Enterprise | 31 |
Check Point Infinity offers unified security management, integrating with Active Directory for a streamlined experience. It centralizes network, endpoint, and cloud security, enhancing efficiency and visibility while employing AI-driven threat prevention.
Check Point Infinity simplifies operations with its unified console, providing seamless integration across enterprise environments. With ThreatCloud AI, real-time analytics, and automation, Infinity enables proactive threat prevention and policy enforcement, strengthening security and reducing manual workloads. However, performance issues, a steep learning curve, and complex setup are challenges users may face. Its interface demands a detailed onboarding process, and while centralization improves threat prevention and policy consistency, the platform has complex licensing and costly implementation, especially for large organizations.
What are the most notable features?In industries like finance, healthcare, and telecommunications, Check Point Infinity is implemented to protect critical infrastructure from advanced cyber threats. Organizations utilize its centralized dashboard for firewall management and comprehensive threat detection, ensuring compliance and data security.
Microsoft Defender for Office 365 offers real-time email security, enhancing threat detection through integration within the Microsoft ecosystem. Its user-friendly interface and central management streamline operations, providing robust protection against phishing, ransomware, and malware.
Defender for Office 365 is focused on efficiently securing email communication by safeguarding against phishing, malware, and spam threats. With its strong integration with other Microsoft services, it is tailored to improve endpoint security and identity protection. Its centralized management tools simplify threat prioritization, while the automated threat response capabilities ensure swift actions against potential risks. Organizations leverage its capabilities to efficiently manage their cybersecurity efforts, particularly in remote work environments, while maintaining a secure system across Office 365 applications and Azure-hosted services.
What are the key features?Implementations of Defender for Office 365 vary across industries, optimizing email security for sectors such as finance, healthcare, and education. In finance, it aids in protecting sensitive financial data from phishing and fraud. Healthcare benefits from secure communications, ensuring patient data privacy. Educational institutions use it to maintain secure virtual learning environments against cyber threats.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.