Check Point ThreatCloud vs. Mandiant Advantage Threat Intelligence

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Check Point ThreatCloud
Score 8.8 out of 10
N/A
Check Point Software Technologies provides threat intelligence via the Check Point ThreatCloud.N/A
Mandiant Advantage Threat Intelligence
Score 8.5 out of 10
Enterprise companies (1,001+ employees)
Since 2004, Mandiant has been a partner to security-conscious organizations. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats.N/A
Pricing
Check Point ThreatCloudMandiant Advantage Threat Intelligence
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Check Point ThreatCloudMandiant Advantage Threat Intelligence
Free Trial
NoYes
Free/Freemium Version
NoYes
Premium Consulting/Integration Services
NoYes
Entry-level Setup FeeNo setup feeOptional
Additional DetailsPriced by company size
More Pricing Information
Community Pulse
Check Point ThreatCloudMandiant Advantage Threat Intelligence
Considered Both Products
Check Point ThreatCloud

No answer on this topic

Mandiant Advantage Threat Intelligence
Chose Mandiant Advantage Threat Intelligence
Recorded Future and ThreatQuotient are in the same ballpark when it comes to price. Mandiant Advantage Threat Intelligence had, at the time of use, the best tracking of unclassified threat actors and the best methodology for assessing the overlap between campaigns and actors. …
Top Pros
Top Cons
Features
Check Point ThreatCloudMandiant Advantage Threat Intelligence
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Check Point ThreatCloud
-
Ratings
Mandiant Advantage Threat Intelligence
8.0
9 Ratings
6% below category average
Infection Remediation00 Ratings8.09 Ratings
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
Check Point ThreatCloud
-
Ratings
Mandiant Advantage Threat Intelligence
8.1
14 Ratings
8% below category average
Network Analytics00 Ratings7.913 Ratings
Threat Recognition00 Ratings8.113 Ratings
Vulnerability Classification00 Ratings8.014 Ratings
Automated Alerts and Reporting00 Ratings8.113 Ratings
Threat Analysis00 Ratings8.014 Ratings
Threat Intelligence Reporting00 Ratings8.314 Ratings
Automated Threat Identification00 Ratings8.013 Ratings
Best Alternatives
Check Point ThreatCloudMandiant Advantage Threat Intelligence
Small Businesses
AlienVault USM
AlienVault USM
Score 7.9 out of 10
AlienVault USM
AlienVault USM
Score 7.9 out of 10
Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.0 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.0 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.0 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Check Point ThreatCloudMandiant Advantage Threat Intelligence
Likelihood to Recommend
8.6
(2 ratings)
8.1
(22 ratings)
Usability
-
(0 ratings)
8.0
(22 ratings)
User Testimonials
Check Point ThreatCloudMandiant Advantage Threat Intelligence
Likelihood to Recommend
Check Point Software Technologies
If you have the Check Point environment and want to utilize the Checkpoint environment, you should use the [Check Point] ThreatCloud. Without [Check Point] ThreatCloud, there’s no way to stop the 0days or APTs. However, [Check Point] ThreatCloud relies on the Checkpoint infrastructure to be used and integrated. If you have other firewall and/or endpoint vendors, [Check Point] ThreatCloud is not the best service to be used. Checkpoint also offers 24x7 threat cloud-managed security services to [...] organizations. Threat cloud-managed security services leverage the threat cloud decreasing the detection time and false-positive rates via increasing protection rates.
Read full review
Mandiant
Threats are expected around the clock, and automated countermeasures are vital as things are time-sensitive. Mandiant has a rich repository of threats reported to date mapped to its ideal defensive response. This helps minimize manual interventions and reduce human errors, which could prove costly. Alert notifications are instantaneous for any compliance actions to follow.
Read full review
Pros
Check Point Software Technologies
  • anti virus
  • anti bot
Read full review
Mandiant
  • accelerated threat response feature, prioritizing threats according to requirement.
  • Optimization of the threat intelligence , and can be integrated with 3rd party tools.
  • Features like - Breach ,Adversary, Machine and Operational Intelligence.
  • Mandiant dynamic host and the malware views along with indicators.
Read full review
Cons
Check Point Software Technologies
  • SOAR integration, Checkpoint does not have built in SOAR
  • Automation throughout the findings of [Check Point] ThreatCloud
  • Special team for threat intelligence
  • K8s threat cloud integration and K8S forensics
  • Native SIEM integration
Read full review
Mandiant
  • Paywalls exist throughout the data set and can halt an investigation without the right model
  • Some data was incomplete or broken up between pay tiers
  • Navigation through the data lacked a definitive trail or breadcrumbs to retrace steps during investigations
Read full review
Usability
Check Point Software Technologies
No answers on this topic
Mandiant
Mandiant provides us with a central console with multiple dashboards to view reports and activities in real-time. However, 99% of the task is performed by Mandiant Engineers remotely, hence giving us the peace of mind and the flexibility to focus our efforts on our regular business.
Read full review
Alternatives Considered
Check Point Software Technologies
As Checkpoint next generation firewalls were already implemented in the network, ThreatCloud was easy to implement and had better features and reputation than competitors
Read full review
Mandiant
There are multiple SaaS based players offering Threat Intel. But Mandiant TI has the following features which makes it one of the best among the competitors: 1.It understands recent actor, malware or vulnerability trends making it very easy for the analysts to do the research 2.Threat Profiling of the organization and setting the rules proactively hunt threat actors targeting the organization. 3.Accelerating the threat response by prioritizing the threats that matter most helping the analysts priortize the threats. 4.Access threat intelligence via the platform, the browser plugin or APIs
Read full review
Return on Investment
Check Point Software Technologies
  • High score rates [are] seen on breach systems after deploying systems integrated with [Check Point] ThreatCloud
  • Catch rates are very high compared to other vendors
  • One missing thing is the detection for localized URLs and IPs
  • Purchasing within the 3-year perspective is cheap compared to other solutions; ROI is generally six months
  • [Check Point] ThreatCloud eliminates the need [for] other additional services that may need to be deployed like dedicated IPS, Dedicated Sandbox, DNS solution, etc.
Read full review
Mandiant
  • Improved time to detect and respond to incidents
  • Makes the analyst job easier by having all the information gathered in the platform
  • Ease to contact with the Mandiant team to solve possible issues
Read full review
ScreenShots

Mandiant Advantage Threat Intelligence Screenshots

Screenshot of Mandiant Advantage DashboardScreenshot of Mandiant Advantage Actor DetailsScreenshot of Mandiant Advantage Actor Graph