

Check Point Infinity and SentinelOne Singularity Identity compete in the cybersecurity market. Check Point seems to have the upper hand due to its integrated approach offering single-platform visibility and control.
Features: Check Point Infinity offers comprehensive security management with a unified infrastructure, centralized management, and robust Zero Trust implementations. It integrates well across devices and cloud environments. SentinelOne Singularity Identity excels in behavior-based threat detection, provides strong identity protection, and offers customizable dashboards with seamless third-party integrations.
Room for Improvement: Check Point Infinity faces issues with pricing complexity, technical support response times, and documentation improvement needs. Users suggest better license agreement handling and enhanced cloud performance to address latency. SentinelOne Singularity Identity could improve in endpoint management, agent update simplicity, and support responsiveness. Its management console could be more user-friendly, and web filtering support needs enhancement.
Ease of Deployment and Customer Service: Check Point Infinity offers flexible deployment across on-premises, hybrid, and public cloud environments, appealing to businesses seeking versatility. However, its technical support receives mixed reviews due to resolution delays. SentinelOne Singularity Identity focuses on cloud deployment, and its support also experiences challenges in responsiveness and efficiency, posing integration hurdles for on-premises users.
Pricing and ROI: Check Point Infinity is seen as expensive, focusing on comprehensive licensing which provides strong ROI through advanced security features. Despite its complex pricing being a barrier for smaller enterprises, its performance and management advantages justify the cost. SentinelOne Singularity Identity is competitively priced compared to rivals like CrowdStrike, though recent price hikes and transparency are concerns. It offers good value with its dynamic threat detection features and flexible package offerings.
When I use different Check Point tools, I save support time overall.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
I would say we can save about 90% of our budget with Check Point Infinity.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
The technical support is excellent with quick response times.
Check Point support is very responsive.
They have been responsive to our needs as integrators and those of the client.
The Infinity Portal lets us manage on-premises, cloud and edge environments from a single elastic console.
We have not faced any issues with scalability.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
Check Point Infinity is a very stable solution; I don't remember experiencing any downtime.
Check Point Infinity is very stable for our company.
Check Point Infinity has achieved a 99.9% block rate on zero-day malware in the 2025 Miercom test.
A more guided setup process or contextual help within the dashboard would make it easier for new team members to get up to speed.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
There is a clear roadmap for improvements, including enhancing capabilities with AI and seamless functionality in an MSP model for deeper visibility across multiple agencies.
In terms of pricing, I find Check Point Infinity to be an expensive product.
The setup cost or license is very high.
We received a relative discount for this.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
Check Point Infinity has positively impacted my organization by making everything better, including the speed of the network and the security.
We have seen a faster response time and reduced effort from the network and security engineers while going through logs.
With visibility into endpoint telemetry, SentinelOne does provide useful information to find threat actors and empowers those who are in the business of threat hunting.
| Product | Mindshare (%) |
|---|---|
| Check Point Infinity | 2.7% |
| SentinelOne Singularity Identity | 2.0% |
| Other | 95.3% |


| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 9 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
Check Point Infinity offers unified security management, integrating with Active Directory for a streamlined experience. It centralizes network, endpoint, and cloud security, enhancing efficiency and visibility while employing AI-driven threat prevention.
Check Point Infinity simplifies operations with its unified console, providing seamless integration across enterprise environments. With ThreatCloud AI, real-time analytics, and automation, Infinity enables proactive threat prevention and policy enforcement, strengthening security and reducing manual workloads. However, performance issues, a steep learning curve, and complex setup are challenges users may face. Its interface demands a detailed onboarding process, and while centralization improves threat prevention and policy consistency, the platform has complex licensing and costly implementation, especially for large organizations.
What are the most notable features?In industries like finance, healthcare, and telecommunications, Check Point Infinity is implemented to protect critical infrastructure from advanced cyber threats. Organizations utilize its centralized dashboard for firewall management and comprehensive threat detection, ensuring compliance and data security.
SentinelOne Singularity Identity offers AI-driven detection, prevention, and cloud protection, providing real-time coverage and streamlined security management through its unified console and customizable interface.
Singularity Identity enhances threat detection with dynamic capabilities, facilitating real-time protection and easy user workflows. Its management console offers a unified view for deeper risk analysis, boosting operational security. Through behavioral analysis and adaptable interfaces, threat response becomes efficient. Key elements include identity guarding and quick incident mitigation. Automated remediation options and rollback features are impactful, ensuring decreased response times. Challenges include improving user accessibility, especially for non-IT individuals, and enhancing customer support with faster solutions and robust reporting. Performance issues like CPU usage demand solutions, while endpoint management and agent updates could benefit from automation. Adding network response features and lowering costs may enhance engagement.
What are the most important features?Industries leverage SentinelOne Singularity Identity for comprehensive threat monitoring across networks. It ensures cloud and endpoint security, plus control over identity and data breaches. By replacing outdated antivirus systems, organizations emphasize proactive defense, visibility, incident response, and detecting lateral movements. Implementing this solution supports strong network and endpoint security, enhances cloud management, and maintains a robust security framework.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.