Check Point Infinity is used primarily for consolidating security across networks, including cloud and on-premise, and endpoints under one architecture. It is relied upon most for unified threat prevention. Having a single framework that shares intelligence and policy makes it easier to spot and block attacks consistently. Having everything unified makes daily operations less fragmented. Instead of juggling separate tools for network, cloud, and endpoint security, one architecture shares intelligence across all layers. The consistency has reduced gaps and made it easier for the team to stay focused on prevention rather than troubleshooting.
Security Support at a non-tech company with 201-500 employees
Real User
Top 5
Nov 19, 2025
Check Point Infinity is used in our environment to unify security across network, cloud, including AWS and Azure, and endpoints under a single architecture. It is used most often to protect against advanced threats by leveraging real-time threat intelligence and automated prevention. It helps reduce complexity because instead of managing multiple disconnected products, one integrated solution covers firewall, endpoint protection, email security, and cloud workloads. A specific example of how Check Point Infinity was used in the environment was during a phishing campaign that targeted several employees with email containing malicious attachments. The system automatically detected the threat across email and endpoint channels and blocked the attachment before it could be opened. At the same time, the firewall component prevented the compromised domain from being reached, which stopped the attack from spreading. This unified response saved the team a lot of time because coordination between different products was not necessary, and this solution is centralized in one portal. Check Point Infinity fits into the daily workflow by reducing the need to jump between different security consoles. Previously, separate tools existed for firewall, endpoints, and email protection, which made monitoring and response slower. Now, everything is centralized, so the team can quickly see alerts, investigate incidents, and apply policies from one place. This saves time and helps the team stay focused on other IT priorities while still maintaining strong security.
My main use case for Check Point Infinity is designing to provide unified protection across networks, cloud, mobile, and points environments, and its main use case is preventing advanced cyber threats by consolidating multiple security layers in one integration solution. For example, I use Check Point Infinity in a typical day when employees connect remotely; as soon as someone logs in through VPN, Infinity automatically enforces security policies, scans traffic for malware, and blocks suspicious attacks in real time.
My main use case for Check Point Infinity is to centralize and streamline our security operations across both cloud and on-premise environments. I use Check Point Infinity for monitoring and managing security alerts across a hybrid infrastructure, since we have resources both in Azure and on-premise, and it helps consolidate visibility into a single dashboard. Check Point Infinity has helped us simplify policy management across different environments.
My main use case for Check Point Infinity is to control different tools around security over the factory. In this case, I use different features, for example, Harmony and SmartCloud One, for controlling my gateways and other tools within the Infinity service. When I need to get into SmartOne Cloud, I use the Infinity Portal and other features. Another tool that I utilize is Harmony, which is also a Check Point tool. When I need to use a centralized environment over my security tools, Check Point Infinity helps me manage and unify security across our cloud and on-premise environments.
My main use case for Check Point Infinity is to use different applications of Check Point in cloud. In my work, I use Check Point Infinity with a gateway in Azure, but I don't have security management. For this reason, I use the license to use the security management in Infinity Portal.
Advisor at Rossell Techsys (Division of Rossell India Limited)
Real User
Top 5
May 21, 2025
Within my organization, I primarily use Check Point Infinity for bandwidth utilization, load balancing, and we analyze all the spams, filters, and blocks. Another feature of Check Point Infinity that I utilize is blocking all unwanted traffic, restricting around the web, and alerting me about bad actors anytime they attack.
In my job, I design and propose different solutions from Check Point Infinity for some final customers in final champ profiles. With Check Point Infinity solutions, I can integrate different tools of Check Point like security appliances such as Quantum or Quantum Smart or the orchestrator under Smart Events like different tools of Harmony, Harmony Mail, Harmony Point, and Harmony Browse. I use the Infinity Portal to take control of the administration of these tools and orchestrate and integrate all the information to bring the logs to the final customer to deploy new strategies for cybersecurity or change or update the architecture of security policies.
We have been deploying Check Point Infinity as a new technology for security purposes with our biggest customer in Ethiopia. It serves to secure endpoints and protect from intrusion and various threats. The product is deployed as a SaaS solution, and we use it to protect mobile users and other aspects of the organization.
Analista de TI - suporte a redes e segurança at Tribunal de Contas da União
Real User
Top 5
Apr 11, 2024
We have main offices in Brazil and branch offices in each of our state capitals. So, we have 26 branch offices in total. Each branch office used to have a small Check Point appliance. We're moving away from that model; they won't access the internet directly anymore. Instead, they'll pass through a central kind of star network. We use two levels of firewalls: an external firewall and an internal firewall. We have a DMZ between these two firewall clusters with high availability. Each firewall has IPS, web content filtering, bot protection, and antivirus enabled. We'll contract some of those features as part of an MSSP service. We don't buy products or appliances directly. Our procurement requirements allow other manufacturers to participate. The decision isn't ours or the integrator's – it's how we buy in Brazil. The vendor offering the lowest price for a product that meets the requirements wins. We cannot choose a specific brand or product name.
We use the solution for testing and conducting. For instance, we test this product using open-source samples containing different ransomware tools and another element.
Check Point Infinity helps in developing centralized applications within an enterprise. Its primary use case is to enhance security and scalability in enterprise systems. It provides a robust framework for creating, managing, and securing centralized networks, ensuring data and transaction integrity. Check Point Infinity addresses scalability challenges by offering a solution capable of handling the growing volume of transactions while maintaining decentralization.
The use case involves managing various aspects, including endpoint security, SaaS interface, and firewall management within the Check Point Infinity architecture. The Infinity portal serves as a centralized hub for overseeing all components of the Check Point security suite. The architecture incorporates XDR and MDR, enabling automatic correlation of information. In scenarios where a security issue arises, the system can automatically analyze data from diverse platforms, such as endpoints, firewalls, and Office 365. T
We required a first line of defense to protect, monitor, and ensure that no confidential information leaves the internal network. We also required a device that can segment our network so that different subnets like the DMZ, Production network, and testing environments. Threat prevention that required AI and ML capabilities was another reason to acquire the Check Point Quantum Spark NGFW. Finally, it offers an all-in-one solution that was a necessity where the same instance could manage and monitor VPNs, application control, web filtering, intrusion detection, and email security.
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 20
Jan 28, 2023
We were looking for a solution that would allow us to establish a configuration with the different security devices remotely while centralizing management and including other products available at the security level. We looked into different options and brands that allowed us to establish, achieve and fulfill this need. This was one of the solutions that met all of these aforementioned characteristics, thus giving us 360º protection and accommodation in terms of managing security services.
We needed to handle the administration of the tools that we have with Check Point without the use of administration servers and from the cloud. With this product, we can centrally manage our security environments for the company through a web portal. It is really easy to do it this way as the portal is managed directly by Check Point. We can detach ourselves from the portal and focus on the security of the infrastructure itself. The portal is extremely intuitive for admins.
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Real User
Nov 6, 2022
Today we have the need to protect various infrastructures we have. We have infrastructure on-premise and in the cloud, and we have a variety of branches. All of the infrastructures has demanded greater security from us. We needed a new and evolved way of managing equipment and the security of our infrastructure. As a result of all these concerns, we have been adopting innovative security technologies, and this is where we have added additional value to the protection that we want to give to each of the places where we have hosted data and information. We have been adopting the themes of Infinity Cloud to have total protection.
As part of a large organization, this product gained the visibility of our security team thanks to its reputation of having the most advanced technology against the latest cyber threats. It protects everything, from cloud and company networks to endpoints and mobile devices, by adopting Check Point Infinity security architecture as a strategy to neutralize fifth-generation threats that spread fast and at a large scale through different vectors. We also saved money in our security implementation measures with this solution.
Check Point Infinity is used to protect information that is moved to the cloud. For example, when you upload your documents to the cloud wherever you are, that document can be encrypted so that no one can access it outside that domain. If they try to impersonate a user they won't be able to access it. There is verification that takes place if they are requesting to access a document with a password and a username to gain access.
As we adapt to the changes left by the pandemic, we must adapt our technologies, our equipment, and the traditional scheme in which we worked must evolve. As a result of these changes, we have been adopting security and much of the administration with fully cloud services to be able to adapt to these changes and give greater adaptability to our technologies. With Check Point Infinity, we have the possibility of managing our platform from the cloud. It also offers us centralization and other solutions of the same portfolio in one place, taking advantage of great advantages; it is at this point where Check Point allows us to take advantage of a secure and centralized administration.
At the end of 2020, the company was growing its staff. In addition, the pandemic was beginning, and as a result of these two factors, the company needed to protect the organization. It was there that the Check Point Infinity tool was used. It is characterized as a great tool against the latest generation of cyber attacks all these attacks are found on mobile devices, endpoints, etc. Always in the security part, companies must be aware of technologies since it is an essential part of organizations, and Check Point Infinity is an excellent tool for these functions.
Cloud Support at a tech company with 1-10 employees
User
Top 5
Jul 27, 2022
The first use we had of this portal with these characteristics was Check Point Smart Cloud to manage our approved gateways in Microsoft Azure. Our vendor told us about the solution. It was not required to use a management server since this portal provided the same service of free or licensed with the same licenses already obtained from our gateways. It is really very easy to implement and offers very versatile usage, giving us economy since we do not have to use a server to be able to administer it. We are really happy with the service.
We have used the Infinity Check Point portal to use two edges, Harmony Connect, and the SmartConsole. We have managed our Check Point gateways through the web SmartConsole administration, which helps us not to have or depend on virtual or physical management, the licensing is included with the gateway license. On the other hand, we have also used the functionality of Check Point Harmony connect, all these functionalities integrated into a portal that has many more to complement all security departments.
We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors. These sophisticated attacks are on mobile devices, endpoints, cloud, and various enterprise networks. They easily bypass the conventional, static detection-based systems used by organizations today. The legacy perimeter-focused security approaches have become ineffective. The outdated assumption that everything inside the security perimeter can be trusted leaves organizations exposed for vulnerability and attack. To protect the organization, we need to move up to the latest generation of cybersecurity tools. These combine real-time threat prevention, shared intelligence, and the most advanced zero-trust security across network, cloud, endpoint, and mobile devices.
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
Check Point Infinity is used primarily for consolidating security across networks, including cloud and on-premise, and endpoints under one architecture. It is relied upon most for unified threat prevention. Having a single framework that shares intelligence and policy makes it easier to spot and block attacks consistently. Having everything unified makes daily operations less fragmented. Instead of juggling separate tools for network, cloud, and endpoint security, one architecture shares intelligence across all layers. The consistency has reduced gaps and made it easier for the team to stay focused on prevention rather than troubleshooting.
Check Point Infinity is used in our environment to unify security across network, cloud, including AWS and Azure, and endpoints under a single architecture. It is used most often to protect against advanced threats by leveraging real-time threat intelligence and automated prevention. It helps reduce complexity because instead of managing multiple disconnected products, one integrated solution covers firewall, endpoint protection, email security, and cloud workloads. A specific example of how Check Point Infinity was used in the environment was during a phishing campaign that targeted several employees with email containing malicious attachments. The system automatically detected the threat across email and endpoint channels and blocked the attachment before it could be opened. At the same time, the firewall component prevented the compromised domain from being reached, which stopped the attack from spreading. This unified response saved the team a lot of time because coordination between different products was not necessary, and this solution is centralized in one portal. Check Point Infinity fits into the daily workflow by reducing the need to jump between different security consoles. Previously, separate tools existed for firewall, endpoints, and email protection, which made monitoring and response slower. Now, everything is centralized, so the team can quickly see alerts, investigate incidents, and apply policies from one place. This saves time and helps the team stay focused on other IT priorities while still maintaining strong security.
My main use case for Check Point Infinity is designing to provide unified protection across networks, cloud, mobile, and points environments, and its main use case is preventing advanced cyber threats by consolidating multiple security layers in one integration solution. For example, I use Check Point Infinity in a typical day when employees connect remotely; as soon as someone logs in through VPN, Infinity automatically enforces security policies, scans traffic for malware, and blocks suspicious attacks in real time.
My main use case for Check Point Infinity is to centralize and streamline our security operations across both cloud and on-premise environments. I use Check Point Infinity for monitoring and managing security alerts across a hybrid infrastructure, since we have resources both in Azure and on-premise, and it helps consolidate visibility into a single dashboard. Check Point Infinity has helped us simplify policy management across different environments.
My main use case for Check Point Infinity is to control different tools around security over the factory. In this case, I use different features, for example, Harmony and SmartCloud One, for controlling my gateways and other tools within the Infinity service. When I need to get into SmartOne Cloud, I use the Infinity Portal and other features. Another tool that I utilize is Harmony, which is also a Check Point tool. When I need to use a centralized environment over my security tools, Check Point Infinity helps me manage and unify security across our cloud and on-premise environments.
My main use case for Check Point Infinity is to use different applications of Check Point in cloud. In my work, I use Check Point Infinity with a gateway in Azure, but I don't have security management. For this reason, I use the license to use the security management in Infinity Portal.
The most common use case for Check Point Infinity is for managing all my gateways in one place and deploying everything from one place.
Within my organization, I primarily use Check Point Infinity for bandwidth utilization, load balancing, and we analyze all the spams, filters, and blocks. Another feature of Check Point Infinity that I utilize is blocking all unwanted traffic, restricting around the web, and alerting me about bad actors anytime they attack.
In my job, I design and propose different solutions from Check Point Infinity for some final customers in final champ profiles. With Check Point Infinity solutions, I can integrate different tools of Check Point like security appliances such as Quantum or Quantum Smart or the orchestrator under Smart Events like different tools of Harmony, Harmony Mail, Harmony Point, and Harmony Browse. I use the Infinity Portal to take control of the administration of these tools and orchestrate and integrate all the information to bring the logs to the final customer to deploy new strategies for cybersecurity or change or update the architecture of security policies.
We have been deploying Check Point Infinity as a new technology for security purposes with our biggest customer in Ethiopia. It serves to secure endpoints and protect from intrusion and various threats. The product is deployed as a SaaS solution, and we use it to protect mobile users and other aspects of the organization.
We leveraged Check Point Infinity primarily for gateway security, cloud security, endpoint security, and infrastructure as a service.
We have main offices in Brazil and branch offices in each of our state capitals. So, we have 26 branch offices in total. Each branch office used to have a small Check Point appliance. We're moving away from that model; they won't access the internet directly anymore. Instead, they'll pass through a central kind of star network. We use two levels of firewalls: an external firewall and an internal firewall. We have a DMZ between these two firewall clusters with high availability. Each firewall has IPS, web content filtering, bot protection, and antivirus enabled. We'll contract some of those features as part of an MSSP service. We don't buy products or appliances directly. Our procurement requirements allow other manufacturers to participate. The decision isn't ours or the integrator's – it's how we buy in Brazil. The vendor offering the lowest price for a product that meets the requirements wins. We cannot choose a specific brand or product name.
We use the solution for testing and conducting. For instance, we test this product using open-source samples containing different ransomware tools and another element.
Check Point Infinity helps in developing centralized applications within an enterprise. Its primary use case is to enhance security and scalability in enterprise systems. It provides a robust framework for creating, managing, and securing centralized networks, ensuring data and transaction integrity. Check Point Infinity addresses scalability challenges by offering a solution capable of handling the growing volume of transactions while maintaining decentralization.
The use case involves managing various aspects, including endpoint security, SaaS interface, and firewall management within the Check Point Infinity architecture. The Infinity portal serves as a centralized hub for overseeing all components of the Check Point security suite. The architecture incorporates XDR and MDR, enabling automatic correlation of information. In scenarios where a security issue arises, the system can automatically analyze data from diverse platforms, such as endpoints, firewalls, and Office 365. T
We required a first line of defense to protect, monitor, and ensure that no confidential information leaves the internal network. We also required a device that can segment our network so that different subnets like the DMZ, Production network, and testing environments. Threat prevention that required AI and ML capabilities was another reason to acquire the Check Point Quantum Spark NGFW. Finally, it offers an all-in-one solution that was a necessity where the same instance could manage and monitor VPNs, application control, web filtering, intrusion detection, and email security.
My company's clients use Check Point Infinity to protect their data.
We were looking for a solution that would allow us to establish a configuration with the different security devices remotely while centralizing management and including other products available at the security level. We looked into different options and brands that allowed us to establish, achieve and fulfill this need. This was one of the solutions that met all of these aforementioned characteristics, thus giving us 360º protection and accommodation in terms of managing security services.
We needed to handle the administration of the tools that we have with Check Point without the use of administration servers and from the cloud. With this product, we can centrally manage our security environments for the company through a web portal. It is really easy to do it this way as the portal is managed directly by Check Point. We can detach ourselves from the portal and focus on the security of the infrastructure itself. The portal is extremely intuitive for admins.
Today we have the need to protect various infrastructures we have. We have infrastructure on-premise and in the cloud, and we have a variety of branches. All of the infrastructures has demanded greater security from us. We needed a new and evolved way of managing equipment and the security of our infrastructure. As a result of all these concerns, we have been adopting innovative security technologies, and this is where we have added additional value to the protection that we want to give to each of the places where we have hosted data and information. We have been adopting the themes of Infinity Cloud to have total protection.
As part of a large organization, this product gained the visibility of our security team thanks to its reputation of having the most advanced technology against the latest cyber threats. It protects everything, from cloud and company networks to endpoints and mobile devices, by adopting Check Point Infinity security architecture as a strategy to neutralize fifth-generation threats that spread fast and at a large scale through different vectors. We also saved money in our security implementation measures with this solution.
Check Point Infinity is used to protect information that is moved to the cloud. For example, when you upload your documents to the cloud wherever you are, that document can be encrypted so that no one can access it outside that domain. If they try to impersonate a user they won't be able to access it. There is verification that takes place if they are requesting to access a document with a password and a username to gain access.
As we adapt to the changes left by the pandemic, we must adapt our technologies, our equipment, and the traditional scheme in which we worked must evolve. As a result of these changes, we have been adopting security and much of the administration with fully cloud services to be able to adapt to these changes and give greater adaptability to our technologies. With Check Point Infinity, we have the possibility of managing our platform from the cloud. It also offers us centralization and other solutions of the same portfolio in one place, taking advantage of great advantages; it is at this point where Check Point allows us to take advantage of a secure and centralized administration.
At the end of 2020, the company was growing its staff. In addition, the pandemic was beginning, and as a result of these two factors, the company needed to protect the organization. It was there that the Check Point Infinity tool was used. It is characterized as a great tool against the latest generation of cyber attacks all these attacks are found on mobile devices, endpoints, etc. Always in the security part, companies must be aware of technologies since it is an essential part of organizations, and Check Point Infinity is an excellent tool for these functions.
The first use we had of this portal with these characteristics was Check Point Smart Cloud to manage our approved gateways in Microsoft Azure. Our vendor told us about the solution. It was not required to use a management server since this portal provided the same service of free or licensed with the same licenses already obtained from our gateways. It is really very easy to implement and offers very versatile usage, giving us economy since we do not have to use a server to be able to administer it. We are really happy with the service.
We have used the Infinity Check Point portal to use two edges, Harmony Connect, and the SmartConsole. We have managed our Check Point gateways through the web SmartConsole administration, which helps us not to have or depend on virtual or physical management, the licensing is included with the gateway license. On the other hand, we have also used the functionality of Check Point Harmony connect, all these functionalities integrated into a portal that has many more to complement all security departments.
We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors. These sophisticated attacks are on mobile devices, endpoints, cloud, and various enterprise networks. They easily bypass the conventional, static detection-based systems used by organizations today. The legacy perimeter-focused security approaches have become ineffective. The outdated assumption that everything inside the security perimeter can be trusted leaves organizations exposed for vulnerability and attack. To protect the organization, we need to move up to the latest generation of cybersecurity tools. These combine real-time threat prevention, shared intelligence, and the most advanced zero-trust security across network, cloud, endpoint, and mobile devices.
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.
We primarily implement the solution for our clients.