+
+

Related Products

  • ThreatLocker
    478 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,088 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Auth0
    907 Ratings
    Visit Website
  • Cisco Duo
    1,360 Ratings
    Visit Website
  • Google Chrome Enterprise
    1,912 Ratings
    Visit Website
  • Keeper Security
    1,696 Ratings
    Visit Website
  • Blumira
    144 Ratings
    Visit Website
  • Venn
    27 Ratings
    Visit Website
  • Kasm Workspaces
    126 Ratings
    Visit Website

About

Organizations frequently implement multiple cyber security solutions in pursuit of better protections. As a result, they are frequently left with a patchwork security architecture that results in a high TCO. By adopting a consolidated security approach with Check Point Infinity architecture, businesses realize preemptive protection against advanced fifth-generation attacks, while achieving a 50% increase in operational efficiency and 20% reduction in security costs. The first consolidated security architecture across networks, cloud, mobile and IoT, providing the highest level of threat prevention against both known and unknown cyber-threats. 64 different threat prevention engines blocking against known and unknown threats, powered by threat intelligence. Infinity-Vision is the unified management platform for Check Point Infinity, the first modern, consolidated cyber security architecture built to prevent today’s most sophisticated attacks across networks, cloud, endpoints, etc.

About

Juniper Advanced Threat Prevention (ATP) is the threat intelligence hub for your network. It contains a litany of built-in advanced security services that use the power of AI and machine learning to detect attacks early and optimize policy enforcement networkwide. Juniper ATP runs as a cloud-enabled service on an SRX Series Firewall or as a virtual appliance deployed locally. It finds and blocks commodity and zero-day malware within files, IP traffic, and DNS requests. The service assesses risk from encrypted and decrypted network traffic and connected devices, including IoT devices, and distributes that intelligence throughout the network, drastically decreasing your attack surface and helping avoid breaches. Automatically discover and mitigate known and zero-day threats. Identify and stop threats hiding within encrypted traffic without decrypting. Detect targeted attacks on your network, including high-risk users and devices, and automatically mobilize your defenses.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations in search of a consolidated security solution to reduce TCO and increase protection

Audience

Organizations looking for a solution to discover and mitigate known and zero-day threats

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Check Point
Founded: 1993
United States
www.checkpoint.com/infinity-vision/total-protection-architecture/

Company Information

Juniper Networks
Founded: 1996
United States
www.juniper.net/us/en/products/security/advanced-threat-prevention.html

Alternatives

Alternatives

SandBlast Network

SandBlast Network

Check Point Software Technologies
CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike
Palo Alto ATP

Palo Alto ATP

Palo Alto
Trend Vision One

Trend Vision One

Trend Micro
Cyberstanc Vortex

Cyberstanc Vortex

Cyberstanc

Categories

Categories

Integrations

Check Point CloudGuard
CrowdStrike Falcon
CyBlock
CySight
Cynerio
Forescout Medical Device Security
HID SAFE
Handy Photo
IBM Cloud
Logz.io
Medigate
Siemplify
Splunk Cloud Platform
Tenable One
ThreatConnect Risk Quantifier (RQ)
Tufin
Vectra AI

Integrations

Check Point CloudGuard
CrowdStrike Falcon
CyBlock
CySight
Cynerio
Forescout Medical Device Security
HID SAFE
Handy Photo
IBM Cloud
Logz.io
Medigate
Siemplify
Splunk Cloud Platform
Tenable One
ThreatConnect Risk Quantifier (RQ)
Tufin
Vectra AI
Claim Check Point Infinity and update features and information
Claim Check Point Infinity and update features and information
Claim Juniper Advanced Threat Protection and update features and information
Claim Juniper Advanced Threat Protection and update features and information