

Check Point Infinity and Trellix Advanced Threat Defense are competing security platforms in the cybersecurity category. Check Point Infinity leads in pricing and customer support satisfaction, while Trellix Advanced Threat Defense is seen as superior in feature offerings, justifying its higher cost.
Features: Check Point Infinity offers threat prevention capabilities, a unified security management platform, and real-time threat intelligence. Trellix Advanced Threat Defense provides advanced malware detection, dynamic threat analysis, and extensive integration capabilities.
Room for Improvement: Check Point Infinity could benefit from enhanced feature offerings to compete with Trellix's advanced technical capabilities. Expanding integration options and malware detection features may also enhance Check Point's value. Trellix could improve its deployment simplicity and cost efficiency, making its solution more accessible to users with budget constraints.
Ease of Deployment and Customer Service: Check Point Infinity features straightforward deployment along with efficient support services. Trellix Advanced Threat Defense endorses a complex deployment model but balances it with responsive customer service.
Pricing and ROI: Check Point Infinity is notable for a lower setup cost and reasonable ROI, appealing to budget-conscious buyers. Trellix Advanced Threat Defense involves higher setup costs yet offers superior ROI through its advanced feature set. While Check Point emphasizes cost-efficiency, Trellix provides higher ROI potential.
| Product | Mindshare (%) |
|---|---|
| Check Point Infinity | 2.7% |
| Trellix Advanced Threat Defense | 2.1% |
| Other | 95.2% |

| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 9 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 4 |
| Large Enterprise | 5 |
Check Point Infinity offers unified security management, integrating with Active Directory for a streamlined experience. It centralizes network, endpoint, and cloud security, enhancing efficiency and visibility while employing AI-driven threat prevention.
Check Point Infinity simplifies operations with its unified console, providing seamless integration across enterprise environments. With ThreatCloud AI, real-time analytics, and automation, Infinity enables proactive threat prevention and policy enforcement, strengthening security and reducing manual workloads. However, performance issues, a steep learning curve, and complex setup are challenges users may face. Its interface demands a detailed onboarding process, and while centralization improves threat prevention and policy consistency, the platform has complex licensing and costly implementation, especially for large organizations.
What are the most notable features?In industries like finance, healthcare, and telecommunications, Check Point Infinity is implemented to protect critical infrastructure from advanced cyber threats. Organizations utilize its centralized dashboard for firewall management and comprehensive threat detection, ensuring compliance and data security.
Trellix Advanced Threat Defense offers efficient threat detection and automatic threat remediation, featuring seamless management and integration with operating systems and extensions.
Providing robust malware defense, Trellix Advanced Threat Defense is easy to set up and use. Its components work collaboratively, with standout features like behavioral analysis, retro-inspection, and ePolicy Orchestration. Despite its strengths, users suggest improvements in Active Directory integration, cloud readiness, artificial intelligence, and faster sandboxing. The API interface and scalability need enhancement, while better compatibility with platforms like Cisco could elevate its function. Effective for server and endpoint security, it effectively blocks threats like WannaCry and disperses attack data through the DXL client quickly.
What are the notable features of Trellix Advanced Threat Defense?Trellix Advanced Threat Defense is widely used across numerous industries for server and desktop protection, ensuring endpoint security and halting attacks without failure. Its integration with diverse technologies enhances protection in varied environments, making it a valuable tool in enterprise security management.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.