Check Point ThreatCloud vs. Juniper SecIntel Threat Intelligence

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Check Point ThreatCloud
Score 8.9 out of 10
N/A
Check Point Software Technologies provides threat intelligence via the Check Point ThreatCloud.N/A
SecIntel
Score 9.9 out of 10
N/A
SecIntel, from Juniper Networks, enables the threat-aware network with a feed of aggregated and verified security data that’s continuously collected from Juniper and multiple other sources. It delivers regularly updated, actionable intelligence to SRX Series firewalls, MX Series routers, Juniper wireless access points, and EXSeries and QFX Series switches.N/A
Pricing
Check Point ThreatCloudJuniper SecIntel Threat Intelligence
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Check Point ThreatCloudSecIntel
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details——
More Pricing Information
Community Pulse
Check Point ThreatCloudJuniper SecIntel Threat Intelligence
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Best Alternatives
Check Point ThreatCloudJuniper SecIntel Threat Intelligence
Small Businesses
AlienVault USM
AlienVault USM
Score 8.0 out of 10
AlienVault USM
AlienVault USM
Score 8.0 out of 10
Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Check Point ThreatCloudJuniper SecIntel Threat Intelligence
Likelihood to Recommend
8.6
(2 ratings)
10.0
(1 ratings)
User Testimonials
Check Point ThreatCloudJuniper SecIntel Threat Intelligence
Likelihood to Recommend
Check Point Software Technologies
If you have the Check Point environment and want to utilize the Checkpoint environment, you should use the [Check Point] ThreatCloud. Without [Check Point] ThreatCloud, there’s no way to stop the 0days or APTs. However, [Check Point] ThreatCloud relies on the Checkpoint infrastructure to be used and integrated. If you have other firewall and/or endpoint vendors, [Check Point] ThreatCloud is not the best service to be used. Checkpoint also offers 24x7 threat cloud-managed security services to [...] organizations. Threat cloud-managed security services leverage the threat cloud decreasing the detection time and false-positive rates via increasing protection rates.
Read full review
Juniper Networks
It is well suited in cases if you want good threat intelligence software that can collect data from multiple sources. A tool with threat logging and detection/enforcement capabilities that enable you to identify, monitor passively, and block known threats at the firewall. Although it is very costly compared to its competitors it is worth it in terms of the functionality it provides to organizations.
Read full review
Pros
Check Point Software Technologies
  • anti virus
  • anti bot
Read full review
Juniper Networks
  • Feeds on malicious IP, URLs and domains.
  • Infected host and custom threat feed.
  • Allows data from third party sources.
Read full review
Cons
Check Point Software Technologies
  • SOAR integration, Checkpoint does not have built in SOAR
  • Automation throughout the findings of [Check Point] ThreatCloud
  • Special team for threat intelligence
  • K8s threat cloud integration and K8S forensics
  • Native SIEM integration
Read full review
Juniper Networks
  • Free trial / free version should be there.
  • Licensing cost should be less.
  • Customer support service can be improved.
Read full review
Alternatives Considered
Check Point Software Technologies
As Checkpoint next generation firewalls were already implemented in the network, ThreatCloud was easy to implement and had better features and reputation than competitors
Read full review
Juniper Networks
No answers on this topic
Return on Investment
Check Point Software Technologies
  • High score rates [are] seen on breach systems after deploying systems integrated with [Check Point] ThreatCloud
  • Catch rates are very high compared to other vendors
  • One missing thing is the detection for localized URLs and IPs
  • Purchasing within the 3-year perspective is cheap compared to other solutions; ROI is generally six months
  • [Check Point] ThreatCloud eliminates the need [for] other additional services that may need to be deployed like dedicated IPS, Dedicated Sandbox, DNS solution, etc.
Read full review
Juniper Networks
  • Increase in compliance with regulatory requirements.
  • Increase in customers and clients trust.
  • Overall organization security posture has been improved.
Read full review
ScreenShots