

Trellix Network Detection and Response and Check Point Infinity compete in the network and endpoint security category. Check Point Infinity appears to have the upper hand due to its broader integration and management capabilities.
Features: Trellix Network Detection and Response provides excellent detection capabilities, especially against zero-day attacks and APTs, along with a strong incident response tool. Its sandboxing and malware analysis features provide comprehensive malicious software analysis. Check Point Infinity offers a wide security architecture that covers devices, networks, and cloud environments. It combines endpoint protection and real-time threat prevention, allowing simplified management through a unified console and excellent application visibility and control.
Room for Improvement: Trellix could improve network visibility and integration with third-party solutions. Enhancements in analytics influenced by McAfee and FireEye integration are needed, along with better cloud integration for malware detection. Check Point Infinity needs a more straightforward price structure and improved user-friendly documentation. Its support services and portal performance, including latency, require enhancements. Compatibility with newer platforms could also improve.
Ease of Deployment and Customer Service: Trellix Network Detection and Response is designed for on-premises setups with robust technical support. Check Point Infinity supports diverse deployment options, including hybrid and public cloud, offering great flexibility. Customer service for both is high, but Check Point’s complex pricing might hinder smaller businesses.
Pricing and ROI: Trellix's pricing is considered high due to its comprehensive features, but the ROI is positive for threat prevention efficiency. Check Point Infinity has competitive pricing, though some users find it expensive, specifically the license structure needing simplification. Both solutions show substantial ROI, with investments seen as valuable for threat prevention, increasing productivity, and reducing breach response times.
When I use different Check Point tools, I save support time overall.
The value is in the capacity to protect against problems or attacks with technology, developing and strengthening cybersecurity policies and administration.
I would say we can save about 90% of our budget with Check Point Infinity.
As soon as we raise a ticket, they engage promptly, indicating strong vendor support.
The technical support is excellent with quick response times.
Check Point support is very responsive.
Technical support needs improvement as sometimes engineers are not available promptly, especially during high-severity incidents.
The customer support for Trellix Network Detection and Response is great.
The Infinity Portal lets us manage on-premises, cloud and edge environments from a single elastic console.
We have not faced any issues with scalability.
Check Point Infinity is scalable because Check Point has a deployment ecosystem with technical support and the quality of the final information from these tools.
Check Point Infinity is a very stable solution; I don't remember experiencing any downtime.
Check Point Infinity is very stable for our company.
Check Point Infinity has achieved a 99.9% block rate on zero-day malware in the 2025 Miercom test.
A more guided setup process or contextual help within the dashboard would make it easier for new team members to get up to speed.
I would recommend having more comprehensive documentation, including a guide for installation and configuration of Check Point Infinity.
I would improve Check Point Infinity by embedding some sort of analytics that indicates which attacks are coming from specific IP addresses very often so that we can block those IP addresses.
There should be improvements in AI intelligence, faster decision-making, and a more responsive technical support team.
I would like to see in Trellix Network Detection and Response more explanation about some details of the threat.
In terms of pricing, I find Check Point Infinity to be an expensive product.
The setup cost or license is very high.
We received a relative discount for this.
Check Point uses robust AI software to detect and recognize all cyber-attacks, giving me the ability to prevent these attacks.
Check Point Infinity has positively impacted my organization by making everything better, including the speed of the network and the security.
We have seen a faster response time and reduced effort from the network and security engineers while going through logs.
Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch.
What makes Trellix Network Detection and Response stand out for me compared to other tools is the way you can detect threats. It is very easy and comfortable to use, and the detection shows clearly on the screen, which is very easy to understand.
| Product | Mindshare (%) |
|---|---|
| Check Point Infinity | 2.7% |
| Trellix Network Detection and Response | 4.1% |
| Other | 93.2% |


| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 9 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 8 |
| Large Enterprise | 19 |
Check Point Infinity offers unified security management, integrating with Active Directory for a streamlined experience. It centralizes network, endpoint, and cloud security, enhancing efficiency and visibility while employing AI-driven threat prevention.
Check Point Infinity simplifies operations with its unified console, providing seamless integration across enterprise environments. With ThreatCloud AI, real-time analytics, and automation, Infinity enables proactive threat prevention and policy enforcement, strengthening security and reducing manual workloads. However, performance issues, a steep learning curve, and complex setup are challenges users may face. Its interface demands a detailed onboarding process, and while centralization improves threat prevention and policy consistency, the platform has complex licensing and costly implementation, especially for large organizations.
What are the most notable features?In industries like finance, healthcare, and telecommunications, Check Point Infinity is implemented to protect critical infrastructure from advanced cyber threats. Organizations utilize its centralized dashboard for firewall management and comprehensive threat detection, ensuring compliance and data security.
Trellix Network Detection and Response provides robust threat protection with advanced detection of zero-day attacks and APTs. Its user-friendly dashboard and real-time response capabilities enhance security and visibility across networks.
Trellix Network Detection and Response stands out with its MVX engine, leveraging virtual machines for comprehensive behavioral analysis. The solution supports detection of advanced cyber threats through features like sandboxing and application filtering, offering real-time response and packet capture for detailed contextual insights. Companies benefit from seamless integration with other platforms, enhancing usability and overall protection. User-friendly interfaces improve network visibility, while stability and ease of configuration safeguard against both signature-based and signature-less threats.
What key features does Trellix offer?Companies in sectors like finance, healthcare, and enterprise security utilize Trellix Network Detection and Response for tasks such as network intrusion detection, endpoint protection, and securing data transmission paths. It aids in threat investigations, pre-sales demos, and network forensics, reducing risks by protecting against cyber threats like phishing.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.