

Find out in this report how the two Advanced Threat Protection (ATP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
When I use different Check Point tools, I save support time overall.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
I would say we can save about 90% of our budget with Check Point Infinity.
The ideal situation would be to have all these portals combined into one unified dashboard.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
The technical support is excellent with quick response times.
Check Point support is very responsive.
I am familiar with the granular policy control feature of Proofpoint Email Protection, and I find their support excellent for modifying those policies.
I rate customer support a three out of ten mainly because of the phishing attacks that are getting through.
Sometimes I get some really great responses and analysts, but sometimes when their cloud services have a failure, they are slow to respond and tell me about it, though they have been improving.
The Infinity Portal lets us manage on-premises, cloud and edge environments from a single elastic console.
We have not faced any issues with scalability.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
Proofpoint is scalable for multi-site organizations with thousands of users.
Proofpoint Email Protection is a scalable solution that very much fits our capacity requirements.
Check Point Infinity is a very stable solution; I don't remember experiencing any downtime.
Check Point Infinity is very stable for our company.
Check Point Infinity has achieved a 99.9% block rate on zero-day malware in the 2025 Miercom test.
When evaluating the stability of Proofpoint Email Protection in regards to downtime, bugs, and glitches, it comes and goes in waves.
A more guided setup process or contextual help within the dashboard would make it easier for new team members to get up to speed.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
Proofpoint could expand its phishing detection capabilities to improve its efficiency.
More security could be implemented.
Proofpoint Email Protection can improve in how it analyzes alerts by using more AI within its product suite to eliminate repeat alerts, such as filtering down the same attack to generate only one alert.
In terms of pricing, I find Check Point Infinity to be an expensive product.
The setup cost or license is very high.
We received a relative discount for this.
Customers pay around $90,000 yearly for a 1,000-user organization, with the subscription license being the main expense, apart from implementation fees.
Additional costs do come in, but it enhances security.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
Check Point Infinity has positively impacted my organization by making everything better, including the speed of the network and the security.
We have seen a faster response time and reduced effort from the network and security engineers while going through logs.
The main feature I find most effective is that Proofpoint Email Protection scans emails and quarantines the doubtful ones.
The most beneficial feature of Proofpoint Email Protection is mostly spam filtering; it was very efficient, and we were very happy with the functionality as only relevant emails were allowed for mailboxes.
I appreciate that it's the industry leader, and its firewalling is very easy to manage and implement.
| Product | Market Share (%) |
|---|---|
| Proofpoint Email Protection | 7.1% |
| Check Point Infinity | 2.5% |
| Other | 90.4% |


| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 9 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 14 |
| Large Enterprise | 18 |
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
Proofpoint Email Protection provides powerful filtering against spam, phishing, and malware, leveraging effective threat detection and blocking capabilities. This solution integrates smoothly with platforms like Office 365, offering a user-friendly dashboard for seamless operations.
Proofpoint Email Protection focuses on email security, ensuring protection against phishing, malware, and spam. It includes features like URL scanning, anti-phishing, anti-virus protection, and sandboxing for comprehensive threat analysis. Its advanced analytics through TAP and TRAP, along with strong integration abilities, make it appealing for handling email threats. While scalability and ease of deployment are advantages, challenges such as integration in complex environments, the cost, and limited local support require attention. Enhancements in search functionality, email encryption, and improved phishing detection are also needed.
What are the key features of Proofpoint Email Protection?
What benefits and ROI should users look for in reviews?
Industries adopting Proofpoint Email Protection include finance, healthcare, and education sectors, which benefit from its robust email security measures. Educational institutions prioritize safe communication for staff and students, while healthcare organizations focus on protecting sensitive patient data. Financial services benefit from preventing data breaches and fraud through advanced threats management.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.