Check Point ThreatCloud vs. Mandiant Advantage Threat Intelligence

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Check Point ThreatCloud
Score 8.9 out of 10
N/A
Check Point Software Technologies provides threat intelligence via the Check Point ThreatCloud.N/A
Mandiant Advantage Threat Intelligence
Score 8.7 out of 10
Enterprise companies (1,001+ employees)
Since 2004, Mandiant has been a partner to security-conscious organizations. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats.N/A
Pricing
Check Point ThreatCloudMandiant Advantage Threat Intelligence
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Check Point ThreatCloudMandiant Advantage Threat Intelligence
Free Trial
NoYes
Free/Freemium Version
NoYes
Premium Consulting/Integration Services
NoYes
Entry-level Setup FeeNo setup feeOptional
Additional DetailsPriced by company size
More Pricing Information
Community Pulse
Check Point ThreatCloudMandiant Advantage Threat Intelligence
Considered Both Products
Check Point ThreatCloud

No answer on this topic

Mandiant Advantage Threat Intelligence
Chose Mandiant Advantage Threat Intelligence
Recorded Future and ThreatQuotient are in the same ballpark when it comes to price. Mandiant Advantage Threat Intelligence had, at the time of use, the best tracking of unclassified threat actors and the best methodology for assessing the overlap between campaigns and actors. …
Top Pros
Top Cons
Features
Check Point ThreatCloudMandiant Advantage Threat Intelligence
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Check Point ThreatCloud
-
Ratings
Mandiant Advantage Threat Intelligence
7.7
6 Ratings
0% below category average
Infection Remediation00 Ratings7.76 Ratings
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
Check Point ThreatCloud
-
Ratings
Mandiant Advantage Threat Intelligence
8.0
10 Ratings
6% above category average
Network Analytics00 Ratings7.99 Ratings
Threat Recognition00 Ratings8.09 Ratings
Vulnerability Classification00 Ratings7.710 Ratings
Automated Alerts and Reporting00 Ratings8.19 Ratings
Threat Analysis00 Ratings7.910 Ratings
Threat Intelligence Reporting00 Ratings8.210 Ratings
Automated Threat Identification00 Ratings7.99 Ratings
Best Alternatives
Check Point ThreatCloudMandiant Advantage Threat Intelligence
Small Businesses
AlienVault USM
AlienVault USM
Score 8.0 out of 10
AlienVault USM
AlienVault USM
Score 8.0 out of 10
Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Check Point ThreatCloudMandiant Advantage Threat Intelligence
Likelihood to Recommend
8.6
(2 ratings)
8.1
(18 ratings)
Usability
-
(0 ratings)
7.8
(18 ratings)
User Testimonials
Check Point ThreatCloudMandiant Advantage Threat Intelligence
Likelihood to Recommend
Check Point Software Technologies
If you have the Check Point environment and want to utilize the Checkpoint environment, you should use the [Check Point] ThreatCloud. Without [Check Point] ThreatCloud, there’s no way to stop the 0days or APTs. However, [Check Point] ThreatCloud relies on the Checkpoint infrastructure to be used and integrated. If you have other firewall and/or endpoint vendors, [Check Point] ThreatCloud is not the best service to be used. Checkpoint also offers 24x7 threat cloud-managed security services to [...] organizations. Threat cloud-managed security services leverage the threat cloud decreasing the detection time and false-positive rates via increasing protection rates.
Read full review
Mandiant
Usually SOC leverages Intel from mutiple sources. The scenarios are: 1.Suitable: In large scale SOC where more than 5000 devices are being monitored and the tech stack is wide, Mandiant will play an excellent role in that scenario. 2.Not Suitable: In small scale SOCs wherein limited devices belonging to the same tech stack is being used then the analysts can rely on OSINT and it is not useful to buy the solution.
Read full review
Pros
Check Point Software Technologies
  • anti virus
  • anti bot
Read full review
Mandiant
  • accelerated threat response feature, prioritizing threats according to requirement.
  • Optimization of the threat intelligence , and can be integrated with 3rd party tools.
  • Features like - Breach ,Adversary, Machine and Operational Intelligence.
  • Mandiant dynamic host and the malware views along with indicators.
Read full review
Cons
Check Point Software Technologies
  • SOAR integration, Checkpoint does not have built in SOAR
  • Automation throughout the findings of [Check Point] ThreatCloud
  • Special team for threat intelligence
  • K8s threat cloud integration and K8S forensics
  • Native SIEM integration
Read full review
Mandiant
  • Paywalls exist throughout the data set and can halt an investigation without the right model
  • Some data was incomplete or broken up between pay tiers
  • Navigation through the data lacked a definitive trail or breadcrumbs to retrace steps during investigations
Read full review
Usability
Check Point Software Technologies
No answers on this topic
Mandiant
Mandiant Advantage Threat Intelligence has a very usable platform, with well-differentiated sections for the analyst, as well as the possibility of cross-searching to obtain the desired results. All this is presented with an interface that is easy on the eye and not very messy, which increases productivity and the speed with which work is done.
Read full review
Alternatives Considered
Check Point Software Technologies
As Checkpoint next generation firewalls were already implemented in the network, ThreatCloud was easy to implement and had better features and reputation than competitors
Read full review
Mandiant
It gives more ways to analyze threats and options to fixed it. This device gives more visibility on vulnerability detection and its analysis. It provides detailed reports to have more information of all malwares which help us to increase overall security of our current organization
Read full review
Return on Investment
Check Point Software Technologies
  • High score rates [are] seen on breach systems after deploying systems integrated with [Check Point] ThreatCloud
  • Catch rates are very high compared to other vendors
  • One missing thing is the detection for localized URLs and IPs
  • Purchasing within the 3-year perspective is cheap compared to other solutions; ROI is generally six months
  • [Check Point] ThreatCloud eliminates the need [for] other additional services that may need to be deployed like dedicated IPS, Dedicated Sandbox, DNS solution, etc.
Read full review
Mandiant
  • Improved incident response time
  • Specific investigations that have reduced the attack surface
  • Technical reports on threats not controlled by the bank's local team
Read full review
ScreenShots

Mandiant Advantage Threat Intelligence Screenshots

Screenshot of Mandiant Advantage DashboardScreenshot of Mandiant Advantage Actor DetailsScreenshot of Mandiant Advantage Actor Graph