<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Infinity External Risk Management (ERM) FAQ in External Risk Management</title>
    <link>https://community.checkpoint.com/t5/External-Risk-Management/Infinity-External-Risk-Management-ERM-FAQ/m-p/235971#M7</link>
    <description>&lt;DIV style="text-align: center;"&gt;&lt;IMG src="https://dannyjung.de/Infinity_ERM.png" border="0" alt="" width="170" height="144" /&gt;&lt;BR /&gt;&lt;STRONG&gt;FAQ&lt;/STRONG&gt; Author: &lt;A href="http://linkedin.com/in/danjun" target="_blank" rel="noopener"&gt;Danny Jung&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/DIV&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;What's the official product site ?&lt;/SPAN&gt;&lt;BR /&gt;A: &lt;A href="https://checkpoint.com/infinity/soc/external-risk-management/" target="_self"&gt;Infinity ERM&lt;/A&gt;&amp;nbsp;| &lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-External-Risk-Management-Solution-Brief/m-p/236225#M1" target="_self"&gt;Solution Brief&lt;/A&gt;&amp;nbsp;|&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=MEMXu3ZBsQc" target="_self"&gt;Video&lt;/A&gt;&amp;nbsp;| &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Managing_Cyber_Risk_Exposure.pdf" target="_self"&gt;Managing Cyber Risk Exposure&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; Who developed the solution ?&lt;BR /&gt;A: The original solution was developed by &lt;A href="https://www.checkpoint.com/press-releases/check-point-software-completes-cyberint-acquisition/" target="_self"&gt;Cyberint&lt;/A&gt;.&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;Where can I find Cyberint datasheets ?&lt;/SPAN&gt;&lt;BR /&gt;A: &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Argos_Platform_Datasheet.pdf" target="_self"&gt;Argos Platform Datasheet&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Attack_Surface_Management_Datasheet_June_2024.pdf" target="_self"&gt;External Attack Surface Management EASM&lt;/A&gt;&amp;nbsp;(&lt;A href="https://e.cyberint.com/hubfs/Raising%20The%20Stakes%20For%20Attack%20Surface%20Management.pdf" target="_self"&gt;+&lt;/A&gt;, &lt;A href="https://cyberint.com/blog/other/attack-surface-management-from-passive-scanning-to-active-security-testing/" target="_self"&gt;++&lt;/A&gt;,&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/Cyberint%20-%20Attack%20Surface%20Monitoring.pdf" target="_self"&gt;Monitoring&lt;/A&gt;) | &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Brand_Protection_Datasheet_Mar_24.pdf" target="_self"&gt;Brand Protection&lt;/A&gt;&amp;nbsp;|&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/Cyberint_Dark_Web_Monitoring_Datasheet_Mar_24.pdf" target="_self"&gt;Deep &amp;amp; Dark Web Monitoring&lt;/A&gt; |&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/Cyberint_Supply_Chain_Intelligence_Datasheet_Mar_24.pdf" target="_self"&gt;Supply Chain Intelligence&lt;/A&gt; |&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/Cyberint_Threat_Intel_Data_Lake_Datasheet_June_2024.pdf" target="_self"&gt;Threat Intel Data Lake&lt;/A&gt; |&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/Cyberint_Threat_Hunting_License_Datasheet.pdf" target="_self"&gt;Threat Hunting&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Phishing_Beacon_Datasheet_June_2024.pdf" target="_self"&gt;Phishing Beacon&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Phishing_Protection_Datasheet_Mar_24.pdf" target="_self"&gt;Phishing Protection&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Active_Vulnerability_Scanning_Datasheet_Oct_2024.pdf" target="_self"&gt;Active Exposure Validation&lt;/A&gt;&amp;nbsp;(&lt;A href="https://cyberint.com/blog/techtalks/the-roi-of-active-exposure-validation/" target="_self"&gt;ROI&lt;/A&gt;) | &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Risk_Intelligence_Feed_Datasheet_June_2024.pdf" target="_self"&gt;Risk Intel Feed&lt;/A&gt;&amp;nbsp;| &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Vulnerability_Intelligence_Datasheet_Mar_24.pdf" target="_self"&gt;Vulnerability Intelligence&lt;/A&gt; |&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/Cyberint_Fraud_Prevention_Datasheet_Mar_24.pdf" target="_self"&gt;Fraud Prevention&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Forensic_Canvas_Module_Datasheet_Mar_24.pdf" target="_self"&gt;Forensic Canvas Module&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; Where can I find Check Point datasheets ?&lt;BR /&gt;A:&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-External-Attack-Surface-Management-Datasheet/m-p/236235#M5" target="_self"&gt;Attack Surface Management&lt;/A&gt;&lt;/SPAN&gt; |&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-Brand-Protection-Datasheet/m-p/236237#M6" target="_self"&gt;Brand Protection&lt;/A&gt; |&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-Deep-amp-Dark-Web-Monitoring-Datasheet/m-p/236227#M2" target="_self"&gt;Deep &amp;amp; Dark Web Monitoring&lt;/A&gt;&amp;nbsp;|&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-Supply-Chain-Intelligence-Datasheet/m-p/236232#M4" target="_self"&gt;Supply Chain Intelligence&lt;/A&gt;&amp;nbsp;|&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-Cyber-Threat-Intelligence-Datasheet/m-p/236230#M3" target="_self"&gt;&lt;SPAN&gt;Threat Intelligence&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; Which features have been added or improved recently ?&lt;BR /&gt;A: &lt;A href="https://cyberint.com/blog/thought-leadership/the-5-biggest-feature-additions-to-cyberint-in-2024/" target="_self"&gt;2024 Feature Additions&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;What does my CISO need to know ?&lt;/SPAN&gt;&lt;BR /&gt;A: &lt;A href="https://e.cyberint.com/hubfs/Ebooks/Cybersecurity%20Debt.pdf" target="_self"&gt;Your Cybersecurity Debt &amp;amp; The Cost of Doing Nothing&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;Where can I find trainings or webinars ?&lt;/SPAN&gt;&lt;BR /&gt;A: &lt;A href="https://community.checkpoint.com/t5/General-Topics/Infinity-External-Risk-Management-Americas-December-2024-Video/td-p/234833" target="_self"&gt;Americas Dec. 2024&lt;/A&gt; | &lt;A href="https://community.checkpoint.com/t5/General-Topics/Introducing-Check-Point-Infinity-External-Risk-Management-EMEA/td-p/234724" target="_self"&gt;EMEA Dec. 2024&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; How is Infinity ERM (Cyberint) recognized by the industry ?&lt;BR /&gt;A: &lt;A href="https://cyberint.com/blog/research/cyberint-mentioned-in-three-2022-gartner-reports/" target="_self"&gt;Gartner&lt;/A&gt; | &lt;A href="https://www.g2.com/products/argos-threat-intelligence-platform/reviews" target="_self"&gt;G2&lt;/A&gt; | &lt;A href="https://l.cyberint.com/frost-and-sullivan-company-year-2023" target="_self"&gt;Frost &amp;amp; Sullivan&lt;/A&gt; | IDC&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt;&amp;nbsp;Where can I find a success story ?&lt;BR /&gt;A: &lt;A href="https://e.cyberint.com/hubfs/Cyberint_%D0%A1ase_Study_Str%C3%B6er_Feb_2024.pdf" target="_self"&gt;Ströer&lt;/A&gt;&amp;nbsp;(&lt;A href="https://e.cyberint.com/hubfs/Str%C3%B6er%20uncovers%20the%20most%20relevant%20external%20risk%20exposures%20-%20at%20scale_DE.pdf" target="_self"&gt;German version&lt;/A&gt;)&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;How do I access the operational dashboard ?&lt;/SPAN&gt;&lt;BR /&gt;A: Currently via &lt;A href="https://www.cyberint.io/argos/operational-dashboard" target="_self"&gt;Cyberint's Argos™ Intelligence Platform&lt;/A&gt;, soon to be available within Check Point's &lt;A href="https://www.checkpoint.com/infinity/portal/" target="_self"&gt;Infinity Portal&lt;/A&gt;.&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;Where can I find more information about the&amp;nbsp;Argos™ platform&amp;nbsp; ?&lt;/SPAN&gt;&lt;BR /&gt;A: &lt;A href="https://cyberint.com/platform/" target="_self"&gt;cyberint.com/platform/&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;How do I get support ?&lt;/SPAN&gt;&lt;BR /&gt;A: &lt;A href="https://cyberint.com/customer-support/" target="_self"&gt;Customer Support&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;What are Take Downs ?&lt;/SPAN&gt;&lt;BR /&gt;A: &lt;A href="https://www.checkpoint.com/resources/items/data-sheet-infinity-external-risk-management-services-data-sheet-takedowns" target="_self"&gt;Service Description&lt;/A&gt; | &lt;A href="https://www.checkpoint.com/services/infinity-global/external-risk-management-services/takedowns-remediation/" target="_self"&gt;Service Offering&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;Where does Check Point add ERM to its security portfolio ?&lt;/SPAN&gt;&lt;BR /&gt;A: &lt;A href="https://www.checkpoint.com/infinity/soc/external-risk-management" target="_self"&gt;ERM&lt;/A&gt; completes Check Point's &lt;A href="https://www.checkpoint.com/infinity/soc/" target="_self"&gt;Infinity SOC&lt;/A&gt; offering besides &lt;A href="https://www.checkpoint.com/infinity/xdr-xpr/" target="_self"&gt;XDR/XPR&lt;/A&gt;, &lt;A href="https://www.checkpoint.com/infinity/playblocks/" target="_self"&gt;Playblocks&lt;/A&gt;, &lt;A href="https://www.checkpoint.com/infinity/events/" target="_self"&gt;Events&lt;/A&gt; and &lt;A href="https://www.checkpoint.com/infinity/mdr-mpr/" target="_self"&gt;MDR/MPR&lt;/A&gt;.&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR bgcolor="#F5F5F5"&gt;
&lt;TD width="20%"&gt;&lt;STRONG&gt;&lt;A href="https://www.checkpoint.com/infinity/soc/external-risk-management" target="_self"&gt;ERM&lt;/A&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="20%"&gt;&lt;A href="https://www.checkpoint.com/infinity/xdr-xpr/" target="_self"&gt;XDR / XPR&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="20%"&gt;&lt;A href="https://www.checkpoint.com/infinity/playblocks/" target="_self"&gt;Playblocks&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="20%"&gt;&lt;A href="https://www.checkpoint.com/infinity/events/" target="_self"&gt;Events&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="20%"&gt;&lt;A href="https://www.checkpoint.com/infinity/mdr-mpr/" target="_self"&gt;MDR / MPR&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%" style="vertical-align: top;"&gt;External Risk Management (ERM) including cyber threat intelligence, deep and dark web monitoring, external attack surface management, and digital risk protection.&lt;/TD&gt;
&lt;TD width="20%" style="vertical-align: top;"&gt;Quickly uncover and prevent cyber attacks by correlating events across your entire security estate.&lt;/TD&gt;
&lt;TD width="20%" style="vertical-align: top;"&gt;Extend the reach of siloed security solutions to stop attacks across your enterprise, with automation and collaboration.&lt;/TD&gt;
&lt;TD width="20%" style="vertical-align: top;"&gt;Complete event unification and visibility across all Check Point products for efficient monitoring, search and threat hunting.&lt;/TD&gt;
&lt;TD width="20%" style="vertical-align: top;"&gt;&lt;SPAN&gt;Prevention-first managed detection and response (MDR) offering complete, powerful SOC operations as a service.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt;&amp;nbsp;What's included in the Infinity ERM packages ?&lt;BR /&gt;A: &lt;A href="https://cyberint.com/pricing/" target="_self"&gt;See Pricing&lt;/A&gt;.&lt;/P&gt;
&lt;TABLE border="1"&gt;
&lt;TBODY&gt;
&lt;TR bgcolor="#F5F5F5"&gt;
&lt;TD width="121.844px" height="25px"&gt;&lt;STRONG&gt;Modules&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="365.672px" height="25px"&gt;&lt;STRONG&gt;Protections&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="107.25px" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;&lt;A href="https://sc1.checkpoint.com/uc/igs/datasheets/Infinity_External_Risk_Management_Essential_Package.pdf" target="_self"&gt;Essential&lt;/A&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;&lt;A href="https://sc1.checkpoint.com/uc/igs/datasheets/Infinity_External_Risk_Management_Advanced_Package.pdf" target="_self"&gt;Advanced&lt;/A&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;&lt;A href="https://sc1.checkpoint.com/uc/igs/datasheets/Infinity_External_Risk_Management_Complete_Package.pdf" target="_self"&gt;Complete&lt;/A&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;&lt;A href="https://sc1.checkpoint.com/uc/igs/datasheets/Infinity_External_Risk_Management_Elite_Package.pdf" target="_self"&gt;Elite&lt;/A&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD rowspan="8" width="121.844px" height="224px"&gt;&lt;SPAN&gt;Application&lt;BR /&gt;Fundamentals&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="365.672px" height="26px" bgcolor="#F5F5F5"&gt;Asset Discovery Engine&lt;/TD&gt;
&lt;TD width="107.25px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="26px" bgcolor="#F5F5F5"&gt;Alerts Center&lt;/TD&gt;
&lt;TD width="107.25px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="25px" bgcolor="#F5F5F5"&gt;Regular users&lt;/TD&gt;
&lt;TD width="107.25px" height="25px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;TD width="107.891px" height="25px" class="lia-align-center"&gt;3&lt;/TD&gt;
&lt;TD width="108.016px" height="25px" class="lia-align-center"&gt;5&lt;/TD&gt;
&lt;TD width="107.297px" height="25px" class="lia-align-center"&gt;8&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="25px" bgcolor="#F5F5F5"&gt;Threat Hunting users seats&lt;/TD&gt;
&lt;TD width="107.25px" height="25px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="25px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="108.016px" height="25px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.297px" height="25px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="25px" bgcolor="#F5F5F5"&gt;Tenants&lt;/TD&gt;
&lt;TD width="107.25px" height="25px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;TD width="107.891px" height="25px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;TD width="108.016px" height="25px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;TD width="107.297px" height="25px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="25px" bgcolor="#F5F5F5"&gt;Out-of-the-box integrations&lt;/TD&gt;
&lt;TD width="107.25px" height="25px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;TD width="107.891px" height="25px" class="lia-align-center"&gt;2&lt;/TD&gt;
&lt;TD width="108.016px" height="25px" class="lia-align-center"&gt;3&lt;/TD&gt;
&lt;TD width="107.297px" height="25px" class="lia-align-center"&gt;4&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="25px" bgcolor="#F5F5F5"&gt;Customer Success Manager cadence&lt;/TD&gt;
&lt;TD width="107.25px" height="25px" class="lia-align-center"&gt;Yearly&lt;/TD&gt;
&lt;TD width="107.891px" height="25px" class="lia-align-center"&gt;Quarterly&lt;/TD&gt;
&lt;TD width="108.016px" height="25px" class="lia-align-center"&gt;Quarterly&lt;/TD&gt;
&lt;TD width="107.297px" height="25px" class="lia-align-center"&gt;Monthly&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="47px" bgcolor="#F5F5F5"&gt;Support SLA&lt;/TD&gt;
&lt;TD width="107.25px" height="47px" class="lia-align-center"&gt;Direct Premium&lt;/TD&gt;
&lt;TD width="107.891px" height="47px" class="lia-align-center"&gt;Direct Premium&lt;/TD&gt;
&lt;TD width="108.016px" height="47px" class="lia-align-center"&gt;Direct Premium&lt;/TD&gt;
&lt;TD width="107.297px" height="47px" class="lia-align-center"&gt;Direct Premium&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD rowspan="4" width="121.844px" height="155px"&gt;&lt;SPAN&gt;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-External-Attack-Surface-Management-Datasheet/m-p/236235#M5" target="_self"&gt;Attack Surface Management Module&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="365.672px" height="39px" bgcolor="#F5F5F5"&gt;Vulnerabilities and exposure detection&lt;/TD&gt;
&lt;TD width="107.25px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="38px" bgcolor="#F5F5F5"&gt;Exposure items scan frequency&lt;/TD&gt;
&lt;TD width="107.25px" height="38px" class="lia-align-center"&gt;Weekly&lt;/TD&gt;
&lt;TD width="107.891px" height="38px" class="lia-align-center"&gt;Daily&lt;/TD&gt;
&lt;TD width="108.016px" height="38px" class="lia-align-center"&gt;Daily&lt;/TD&gt;
&lt;TD width="107.297px" height="38px" class="lia-align-center"&gt;Daily&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="39px" bgcolor="#F5F5F5"&gt;Technologies detection &amp;amp; watchlist&lt;/TD&gt;
&lt;TD width="107.25px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="39px" bgcolor="#F5F5F5"&gt;Risk Posture Monitoring&lt;/TD&gt;
&lt;TD width="107.25px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD rowspan="3" width="121.844px" height="91px"&gt;&lt;SPAN&gt;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-Brand-Protection-Datasheet/m-p/236237#M6" target="_self"&gt;Brand Protection Module&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="365.672px" height="10px" bgcolor="#F5F5F5"&gt;Typosquatting &amp;amp; phishing &amp;amp; brand abuse sites detection&lt;/TD&gt;
&lt;TD width="107.25px" height="10px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="10px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="10px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="10px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="53px" bgcolor="#F5F5F5"&gt;Social Media and mobile app impersonation for brand and VIPs&lt;/TD&gt;
&lt;TD width="107.25px" height="53px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="53px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="53px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="53px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="28px" bgcolor="#F5F5F5"&gt;Phishing beacons instances (# of subdomains)&lt;/TD&gt;
&lt;TD width="107.25px" height="28px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="28px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;TD width="108.016px" height="28px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;TD width="107.297px" height="28px" class="lia-align-center"&gt;3&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD rowspan="4" width="121.844px" height="188px"&gt;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-Deep-amp-Dark-Web-Monitoring-Datasheet/m-p/236227#M2" target="_self"&gt;Deep &amp;amp; Dark Web Monitoring Module&lt;/A&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="365.672px" height="47px" bgcolor="#F5F5F5"&gt;Credentials &amp;amp; Account Takeover monitoring &amp;amp; alerting&lt;/TD&gt;
&lt;TD width="107.25px" height="47px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="47px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="47px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="47px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="47px" bgcolor="#F5F5F5"&gt;Open, deep and dark web sources collection &amp;amp; search engine&lt;/TD&gt;
&lt;TD width="107.25px" height="47px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="47px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="47px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="47px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="69px" bgcolor="#F5F5F5"&gt;Data leakage &amp;amp; fraud detection using pre-supported use cases (credit cards, emails, source code and more)&lt;/TD&gt;
&lt;TD width="107.25px" height="69px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="69px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="69px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="69px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="25px" bgcolor="#F5F5F5"&gt;Custom Threat Hunting rules&lt;/TD&gt;
&lt;TD width="107.25px" height="25px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="25px" class="lia-align-center"&gt;3&lt;/TD&gt;
&lt;TD width="108.016px" height="25px" class="lia-align-center"&gt;5&lt;/TD&gt;
&lt;TD width="107.297px" height="25px" class="lia-align-center"&gt;10&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD rowspan="4" width="121.844px" height="103px"&gt;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-Supply-Chain-Intelligence-Datasheet/m-p/236232#M4" target="_self"&gt; Supply Chain Intelligence Module&lt;/A&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="365.672px" height="26px" bgcolor="#F5F5F5"&gt;Automatic detection of used vendors&lt;/TD&gt;
&lt;TD width="107.25px" height="26px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="26px" bgcolor="#F5F5F5"&gt;Vendor risk monitoring&lt;/TD&gt;
&lt;TD width="107.25px" height="26px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="26px" bgcolor="#F5F5F5"&gt;Proactive alerts on high identified risks&lt;/TD&gt;
&lt;TD width="107.25px" height="26px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="25px" bgcolor="#F5F5F5"&gt;Monitored vendors \ technologies&lt;/TD&gt;
&lt;TD width="107.25px" height="25px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="25px" class="lia-align-center"&gt;3&lt;/TD&gt;
&lt;TD width="108.016px" height="25px" class="lia-align-center"&gt;5&lt;/TD&gt;
&lt;TD width="107.297px" height="25px" class="lia-align-center"&gt;10&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD rowspan="4" width="121.844px" height="385px"&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-Cyber-Threat-Intelligence-Datasheet/m-p/236230#M3" target="_self"&gt;&lt;SPAN&gt;Threat Intelligence&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="365.672px" height="80px" bgcolor="#F5F5F5"&gt;Global cyber news and ransomware watch&lt;/TD&gt;
&lt;TD width="107.25px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="80px" bgcolor="#F5F5F5"&gt;ERM Research Threat intelligence reports&lt;/TD&gt;
&lt;TD width="107.25px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="145px" bgcolor="#F5F5F5"&gt;Global Intelligence Knowledgebase (Threat Actors, Malware, CVE)&lt;/TD&gt;
&lt;TD width="107.25px" height="145px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="145px" class="lia-align-center"&gt;Preview&lt;/TD&gt;
&lt;TD width="108.016px" height="145px" class="lia-align-center"&gt;Preview&lt;/TD&gt;
&lt;TD width="107.297px" height="145px" class="lia-align-center"&gt;Preview&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="80px" bgcolor="#F5F5F5"&gt;IoC searches and browser extension&lt;/TD&gt;
&lt;TD width="107.25px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="121.844px" height="47px"&gt;Remediation &amp;amp; Investigations&lt;/TD&gt;
&lt;TD width="365.672px" height="47px" bgcolor="#F5F5F5"&gt;Remediation Credit Points ("Coins") for takedowns and investigations&lt;/TD&gt;
&lt;TD width="107.25px" height="47px" class="lia-align-center"&gt;20&lt;/TD&gt;
&lt;TD width="107.891px" height="47px" class="lia-align-center"&gt;100&lt;/TD&gt;
&lt;TD width="108.016px" height="47px" class="lia-align-center"&gt;250&lt;/TD&gt;
&lt;TD width="107.297px" height="47px" class="lia-align-center"&gt;400&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;Q:&lt;/STRONG&gt;&amp;nbsp;Can I use IGS credits to purchase Infinity ERM packages ?&lt;BR /&gt;A: Yes. Overview:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;Essentials&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;Advanced&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;Complete&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;Elite&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;IGS&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;A href="https://igs.checkpoint.com/services/64" target="_self"&gt;486&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;A href="https://igs.checkpoint.com/services/65" target="_self"&gt;666&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;A href="https://igs.checkpoint.com/services/66" target="_self"&gt;1026&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;A href="https://igs.checkpoint.com/services/67" target="_self"&gt;1386&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt;&amp;nbsp;What is Active Exposure Validation (AEV) ?&lt;BR /&gt;A: &lt;A href="https://cyberint.com/platform/active-exposure-validation/" target="_self"&gt;See here.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt;&amp;nbsp;What are the latest threat landscape reports ?&lt;BR /&gt;A: &lt;A href="https://e.cyberint.com/hubfs/Europe%20Threat%20Landscape.pdf" target="_self"&gt;Europe Threat Landscape 2024-25&lt;/A&gt; |&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt;&amp;nbsp;What are the latest ransomeware reports ?&lt;BR /&gt;A: &lt;A href="https://cyberint.com/blog/research/ransomware-annual-report-2024/" target="_self"&gt;Q4 2024&lt;/A&gt; |&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/Ransomware%20Q3%202024.pdf" target="_self"&gt;Q3 2024&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Ransomware%20q2%20ebook.pdf" target="_self"&gt;Q2 2024&lt;/A&gt; |&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/RANSOMWARE_Q1_2024_Cyberint_Report.pdf" target="_self"&gt;Q1 2024&lt;/A&gt; |&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt;&amp;nbsp;Additional documentation ?&lt;BR /&gt;A: &lt;A href="https://blog.checkpoint.com/research/5-key-cyber-security-trends-for-2025" target="_self"&gt;5 Key Cyber Security Trend for 2025&lt;/A&gt; | &lt;A href="https://www.linkedin.com/pulse/cyberint-2024-news-cyberint-pd3gf/" target="_self"&gt;2024 Achievements&lt;/A&gt; |&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/Ebooks/IAB%20Report%20(3)%20(1).pdf" target="_self"&gt;Initital Access Brokers&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Cyberint%20-%20The%20big%20book%20of%20deep%20and%20dark%20web.pdf" target="_self"&gt;Deep &amp;amp; Dark Web&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Research%20Reports/2023%20Q2/Cyberint%20-%20Exposed%20Customer%20Credentials.pdf" target="_self"&gt;Exposed Customers Credentials&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Retail_Threat_Landscape_Report_Q4_2024.pdf" target="_self"&gt;Retail Threat Landscape&lt;/A&gt; | &lt;A href="https://cyberint.com/blog/thought-leadership/insider-threat-landscape/" target="_self"&gt;Insider Threat Landscape&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/The%20phishing%20protection%20handbook%20eBook.pdf" target="_self"&gt;Phishing &amp;amp; Impersonation Handbook&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/4_Key_Considerations_Before_Renewing_Your_EASM_Solution%20_March_2023.pdf" target="_self"&gt;EASM Key Considerations&lt;/A&gt; |&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt;&amp;nbsp;Which partner resources are available ?&lt;BR /&gt;A: &lt;A href="https://e.cyberint.com/hubfs/Check%20Point%20MSSP%20Datasheet.pdf" target="_self"&gt;MSSP Program&lt;/A&gt; | &lt;A href="https://cyberint.com/wp-content/uploads/2024/08/Cyberint_Battlecards_For_Partners_H2_2024-1.pdf" target="_self"&gt;Battlecards&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Impactful_Intelligence_Offering_for_Mssps.pdf" target="_self"&gt;Impactful Intelligence Offering for MSSP's&lt;/A&gt; |&lt;/P&gt;</description>
    <pubDate>Thu, 23 Jan 2025 09:07:59 GMT</pubDate>
    <dc:creator>Danny</dc:creator>
    <dc:date>2025-01-23T09:07:59Z</dc:date>
    <item>
      <title>Infinity External Risk Management (ERM) FAQ</title>
      <link>https://community.checkpoint.com/t5/External-Risk-Management/Infinity-External-Risk-Management-ERM-FAQ/m-p/235971#M7</link>
      <description>&lt;DIV style="text-align: center;"&gt;&lt;IMG src="https://dannyjung.de/Infinity_ERM.png" border="0" alt="" width="170" height="144" /&gt;&lt;BR /&gt;&lt;STRONG&gt;FAQ&lt;/STRONG&gt; Author: &lt;A href="http://linkedin.com/in/danjun" target="_blank" rel="noopener"&gt;Danny Jung&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/DIV&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;What's the official product site ?&lt;/SPAN&gt;&lt;BR /&gt;A: &lt;A href="https://checkpoint.com/infinity/soc/external-risk-management/" target="_self"&gt;Infinity ERM&lt;/A&gt;&amp;nbsp;| &lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-External-Risk-Management-Solution-Brief/m-p/236225#M1" target="_self"&gt;Solution Brief&lt;/A&gt;&amp;nbsp;|&amp;nbsp;&lt;A href="https://www.youtube.com/watch?v=MEMXu3ZBsQc" target="_self"&gt;Video&lt;/A&gt;&amp;nbsp;| &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Managing_Cyber_Risk_Exposure.pdf" target="_self"&gt;Managing Cyber Risk Exposure&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; Who developed the solution ?&lt;BR /&gt;A: The original solution was developed by &lt;A href="https://www.checkpoint.com/press-releases/check-point-software-completes-cyberint-acquisition/" target="_self"&gt;Cyberint&lt;/A&gt;.&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;Where can I find Cyberint datasheets ?&lt;/SPAN&gt;&lt;BR /&gt;A: &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Argos_Platform_Datasheet.pdf" target="_self"&gt;Argos Platform Datasheet&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Attack_Surface_Management_Datasheet_June_2024.pdf" target="_self"&gt;External Attack Surface Management EASM&lt;/A&gt;&amp;nbsp;(&lt;A href="https://e.cyberint.com/hubfs/Raising%20The%20Stakes%20For%20Attack%20Surface%20Management.pdf" target="_self"&gt;+&lt;/A&gt;, &lt;A href="https://cyberint.com/blog/other/attack-surface-management-from-passive-scanning-to-active-security-testing/" target="_self"&gt;++&lt;/A&gt;,&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/Cyberint%20-%20Attack%20Surface%20Monitoring.pdf" target="_self"&gt;Monitoring&lt;/A&gt;) | &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Brand_Protection_Datasheet_Mar_24.pdf" target="_self"&gt;Brand Protection&lt;/A&gt;&amp;nbsp;|&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/Cyberint_Dark_Web_Monitoring_Datasheet_Mar_24.pdf" target="_self"&gt;Deep &amp;amp; Dark Web Monitoring&lt;/A&gt; |&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/Cyberint_Supply_Chain_Intelligence_Datasheet_Mar_24.pdf" target="_self"&gt;Supply Chain Intelligence&lt;/A&gt; |&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/Cyberint_Threat_Intel_Data_Lake_Datasheet_June_2024.pdf" target="_self"&gt;Threat Intel Data Lake&lt;/A&gt; |&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/Cyberint_Threat_Hunting_License_Datasheet.pdf" target="_self"&gt;Threat Hunting&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Phishing_Beacon_Datasheet_June_2024.pdf" target="_self"&gt;Phishing Beacon&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Phishing_Protection_Datasheet_Mar_24.pdf" target="_self"&gt;Phishing Protection&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Active_Vulnerability_Scanning_Datasheet_Oct_2024.pdf" target="_self"&gt;Active Exposure Validation&lt;/A&gt;&amp;nbsp;(&lt;A href="https://cyberint.com/blog/techtalks/the-roi-of-active-exposure-validation/" target="_self"&gt;ROI&lt;/A&gt;) | &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Risk_Intelligence_Feed_Datasheet_June_2024.pdf" target="_self"&gt;Risk Intel Feed&lt;/A&gt;&amp;nbsp;| &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Vulnerability_Intelligence_Datasheet_Mar_24.pdf" target="_self"&gt;Vulnerability Intelligence&lt;/A&gt; |&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/Cyberint_Fraud_Prevention_Datasheet_Mar_24.pdf" target="_self"&gt;Fraud Prevention&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Cyberint_Forensic_Canvas_Module_Datasheet_Mar_24.pdf" target="_self"&gt;Forensic Canvas Module&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; Where can I find Check Point datasheets ?&lt;BR /&gt;A:&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-External-Attack-Surface-Management-Datasheet/m-p/236235#M5" target="_self"&gt;Attack Surface Management&lt;/A&gt;&lt;/SPAN&gt; |&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-Brand-Protection-Datasheet/m-p/236237#M6" target="_self"&gt;Brand Protection&lt;/A&gt; |&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-Deep-amp-Dark-Web-Monitoring-Datasheet/m-p/236227#M2" target="_self"&gt;Deep &amp;amp; Dark Web Monitoring&lt;/A&gt;&amp;nbsp;|&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-Supply-Chain-Intelligence-Datasheet/m-p/236232#M4" target="_self"&gt;Supply Chain Intelligence&lt;/A&gt;&amp;nbsp;|&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-Cyber-Threat-Intelligence-Datasheet/m-p/236230#M3" target="_self"&gt;&lt;SPAN&gt;Threat Intelligence&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; Which features have been added or improved recently ?&lt;BR /&gt;A: &lt;A href="https://cyberint.com/blog/thought-leadership/the-5-biggest-feature-additions-to-cyberint-in-2024/" target="_self"&gt;2024 Feature Additions&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;What does my CISO need to know ?&lt;/SPAN&gt;&lt;BR /&gt;A: &lt;A href="https://e.cyberint.com/hubfs/Ebooks/Cybersecurity%20Debt.pdf" target="_self"&gt;Your Cybersecurity Debt &amp;amp; The Cost of Doing Nothing&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;Where can I find trainings or webinars ?&lt;/SPAN&gt;&lt;BR /&gt;A: &lt;A href="https://community.checkpoint.com/t5/General-Topics/Infinity-External-Risk-Management-Americas-December-2024-Video/td-p/234833" target="_self"&gt;Americas Dec. 2024&lt;/A&gt; | &lt;A href="https://community.checkpoint.com/t5/General-Topics/Introducing-Check-Point-Infinity-External-Risk-Management-EMEA/td-p/234724" target="_self"&gt;EMEA Dec. 2024&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; How is Infinity ERM (Cyberint) recognized by the industry ?&lt;BR /&gt;A: &lt;A href="https://cyberint.com/blog/research/cyberint-mentioned-in-three-2022-gartner-reports/" target="_self"&gt;Gartner&lt;/A&gt; | &lt;A href="https://www.g2.com/products/argos-threat-intelligence-platform/reviews" target="_self"&gt;G2&lt;/A&gt; | &lt;A href="https://l.cyberint.com/frost-and-sullivan-company-year-2023" target="_self"&gt;Frost &amp;amp; Sullivan&lt;/A&gt; | IDC&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt;&amp;nbsp;Where can I find a success story ?&lt;BR /&gt;A: &lt;A href="https://e.cyberint.com/hubfs/Cyberint_%D0%A1ase_Study_Str%C3%B6er_Feb_2024.pdf" target="_self"&gt;Ströer&lt;/A&gt;&amp;nbsp;(&lt;A href="https://e.cyberint.com/hubfs/Str%C3%B6er%20uncovers%20the%20most%20relevant%20external%20risk%20exposures%20-%20at%20scale_DE.pdf" target="_self"&gt;German version&lt;/A&gt;)&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;How do I access the operational dashboard ?&lt;/SPAN&gt;&lt;BR /&gt;A: Currently via &lt;A href="https://www.cyberint.io/argos/operational-dashboard" target="_self"&gt;Cyberint's Argos™ Intelligence Platform&lt;/A&gt;, soon to be available within Check Point's &lt;A href="https://www.checkpoint.com/infinity/portal/" target="_self"&gt;Infinity Portal&lt;/A&gt;.&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;Where can I find more information about the&amp;nbsp;Argos™ platform&amp;nbsp; ?&lt;/SPAN&gt;&lt;BR /&gt;A: &lt;A href="https://cyberint.com/platform/" target="_self"&gt;cyberint.com/platform/&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;How do I get support ?&lt;/SPAN&gt;&lt;BR /&gt;A: &lt;A href="https://cyberint.com/customer-support/" target="_self"&gt;Customer Support&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;What are Take Downs ?&lt;/SPAN&gt;&lt;BR /&gt;A: &lt;A href="https://www.checkpoint.com/resources/items/data-sheet-infinity-external-risk-management-services-data-sheet-takedowns" target="_self"&gt;Service Description&lt;/A&gt; | &lt;A href="https://www.checkpoint.com/services/infinity-global/external-risk-management-services/takedowns-remediation/" target="_self"&gt;Service Offering&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;Where does Check Point add ERM to its security portfolio ?&lt;/SPAN&gt;&lt;BR /&gt;A: &lt;A href="https://www.checkpoint.com/infinity/soc/external-risk-management" target="_self"&gt;ERM&lt;/A&gt; completes Check Point's &lt;A href="https://www.checkpoint.com/infinity/soc/" target="_self"&gt;Infinity SOC&lt;/A&gt; offering besides &lt;A href="https://www.checkpoint.com/infinity/xdr-xpr/" target="_self"&gt;XDR/XPR&lt;/A&gt;, &lt;A href="https://www.checkpoint.com/infinity/playblocks/" target="_self"&gt;Playblocks&lt;/A&gt;, &lt;A href="https://www.checkpoint.com/infinity/events/" target="_self"&gt;Events&lt;/A&gt; and &lt;A href="https://www.checkpoint.com/infinity/mdr-mpr/" target="_self"&gt;MDR/MPR&lt;/A&gt;.&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR bgcolor="#F5F5F5"&gt;
&lt;TD width="20%"&gt;&lt;STRONG&gt;&lt;A href="https://www.checkpoint.com/infinity/soc/external-risk-management" target="_self"&gt;ERM&lt;/A&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="20%"&gt;&lt;A href="https://www.checkpoint.com/infinity/xdr-xpr/" target="_self"&gt;XDR / XPR&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="20%"&gt;&lt;A href="https://www.checkpoint.com/infinity/playblocks/" target="_self"&gt;Playblocks&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="20%"&gt;&lt;A href="https://www.checkpoint.com/infinity/events/" target="_self"&gt;Events&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="20%"&gt;&lt;A href="https://www.checkpoint.com/infinity/mdr-mpr/" target="_self"&gt;MDR / MPR&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%" style="vertical-align: top;"&gt;External Risk Management (ERM) including cyber threat intelligence, deep and dark web monitoring, external attack surface management, and digital risk protection.&lt;/TD&gt;
&lt;TD width="20%" style="vertical-align: top;"&gt;Quickly uncover and prevent cyber attacks by correlating events across your entire security estate.&lt;/TD&gt;
&lt;TD width="20%" style="vertical-align: top;"&gt;Extend the reach of siloed security solutions to stop attacks across your enterprise, with automation and collaboration.&lt;/TD&gt;
&lt;TD width="20%" style="vertical-align: top;"&gt;Complete event unification and visibility across all Check Point products for efficient monitoring, search and threat hunting.&lt;/TD&gt;
&lt;TD width="20%" style="vertical-align: top;"&gt;&lt;SPAN&gt;Prevention-first managed detection and response (MDR) offering complete, powerful SOC operations as a service.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt;&amp;nbsp;What's included in the Infinity ERM packages ?&lt;BR /&gt;A: &lt;A href="https://cyberint.com/pricing/" target="_self"&gt;See Pricing&lt;/A&gt;.&lt;/P&gt;
&lt;TABLE border="1"&gt;
&lt;TBODY&gt;
&lt;TR bgcolor="#F5F5F5"&gt;
&lt;TD width="121.844px" height="25px"&gt;&lt;STRONG&gt;Modules&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="365.672px" height="25px"&gt;&lt;STRONG&gt;Protections&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="107.25px" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;&lt;A href="https://sc1.checkpoint.com/uc/igs/datasheets/Infinity_External_Risk_Management_Essential_Package.pdf" target="_self"&gt;Essential&lt;/A&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;&lt;A href="https://sc1.checkpoint.com/uc/igs/datasheets/Infinity_External_Risk_Management_Advanced_Package.pdf" target="_self"&gt;Advanced&lt;/A&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;&lt;A href="https://sc1.checkpoint.com/uc/igs/datasheets/Infinity_External_Risk_Management_Complete_Package.pdf" target="_self"&gt;Complete&lt;/A&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;&lt;A href="https://sc1.checkpoint.com/uc/igs/datasheets/Infinity_External_Risk_Management_Elite_Package.pdf" target="_self"&gt;Elite&lt;/A&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD rowspan="8" width="121.844px" height="224px"&gt;&lt;SPAN&gt;Application&lt;BR /&gt;Fundamentals&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="365.672px" height="26px" bgcolor="#F5F5F5"&gt;Asset Discovery Engine&lt;/TD&gt;
&lt;TD width="107.25px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="26px" bgcolor="#F5F5F5"&gt;Alerts Center&lt;/TD&gt;
&lt;TD width="107.25px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="25px" bgcolor="#F5F5F5"&gt;Regular users&lt;/TD&gt;
&lt;TD width="107.25px" height="25px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;TD width="107.891px" height="25px" class="lia-align-center"&gt;3&lt;/TD&gt;
&lt;TD width="108.016px" height="25px" class="lia-align-center"&gt;5&lt;/TD&gt;
&lt;TD width="107.297px" height="25px" class="lia-align-center"&gt;8&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="25px" bgcolor="#F5F5F5"&gt;Threat Hunting users seats&lt;/TD&gt;
&lt;TD width="107.25px" height="25px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="25px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="108.016px" height="25px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.297px" height="25px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="25px" bgcolor="#F5F5F5"&gt;Tenants&lt;/TD&gt;
&lt;TD width="107.25px" height="25px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;TD width="107.891px" height="25px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;TD width="108.016px" height="25px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;TD width="107.297px" height="25px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="25px" bgcolor="#F5F5F5"&gt;Out-of-the-box integrations&lt;/TD&gt;
&lt;TD width="107.25px" height="25px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;TD width="107.891px" height="25px" class="lia-align-center"&gt;2&lt;/TD&gt;
&lt;TD width="108.016px" height="25px" class="lia-align-center"&gt;3&lt;/TD&gt;
&lt;TD width="107.297px" height="25px" class="lia-align-center"&gt;4&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="25px" bgcolor="#F5F5F5"&gt;Customer Success Manager cadence&lt;/TD&gt;
&lt;TD width="107.25px" height="25px" class="lia-align-center"&gt;Yearly&lt;/TD&gt;
&lt;TD width="107.891px" height="25px" class="lia-align-center"&gt;Quarterly&lt;/TD&gt;
&lt;TD width="108.016px" height="25px" class="lia-align-center"&gt;Quarterly&lt;/TD&gt;
&lt;TD width="107.297px" height="25px" class="lia-align-center"&gt;Monthly&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="47px" bgcolor="#F5F5F5"&gt;Support SLA&lt;/TD&gt;
&lt;TD width="107.25px" height="47px" class="lia-align-center"&gt;Direct Premium&lt;/TD&gt;
&lt;TD width="107.891px" height="47px" class="lia-align-center"&gt;Direct Premium&lt;/TD&gt;
&lt;TD width="108.016px" height="47px" class="lia-align-center"&gt;Direct Premium&lt;/TD&gt;
&lt;TD width="107.297px" height="47px" class="lia-align-center"&gt;Direct Premium&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD rowspan="4" width="121.844px" height="155px"&gt;&lt;SPAN&gt;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-External-Attack-Surface-Management-Datasheet/m-p/236235#M5" target="_self"&gt;Attack Surface Management Module&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="365.672px" height="39px" bgcolor="#F5F5F5"&gt;Vulnerabilities and exposure detection&lt;/TD&gt;
&lt;TD width="107.25px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="38px" bgcolor="#F5F5F5"&gt;Exposure items scan frequency&lt;/TD&gt;
&lt;TD width="107.25px" height="38px" class="lia-align-center"&gt;Weekly&lt;/TD&gt;
&lt;TD width="107.891px" height="38px" class="lia-align-center"&gt;Daily&lt;/TD&gt;
&lt;TD width="108.016px" height="38px" class="lia-align-center"&gt;Daily&lt;/TD&gt;
&lt;TD width="107.297px" height="38px" class="lia-align-center"&gt;Daily&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="39px" bgcolor="#F5F5F5"&gt;Technologies detection &amp;amp; watchlist&lt;/TD&gt;
&lt;TD width="107.25px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="39px" bgcolor="#F5F5F5"&gt;Risk Posture Monitoring&lt;/TD&gt;
&lt;TD width="107.25px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="39px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD rowspan="3" width="121.844px" height="91px"&gt;&lt;SPAN&gt;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-Brand-Protection-Datasheet/m-p/236237#M6" target="_self"&gt;Brand Protection Module&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="365.672px" height="10px" bgcolor="#F5F5F5"&gt;Typosquatting &amp;amp; phishing &amp;amp; brand abuse sites detection&lt;/TD&gt;
&lt;TD width="107.25px" height="10px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="10px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="10px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="10px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="53px" bgcolor="#F5F5F5"&gt;Social Media and mobile app impersonation for brand and VIPs&lt;/TD&gt;
&lt;TD width="107.25px" height="53px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="53px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="53px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="53px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="28px" bgcolor="#F5F5F5"&gt;Phishing beacons instances (# of subdomains)&lt;/TD&gt;
&lt;TD width="107.25px" height="28px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="28px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;TD width="108.016px" height="28px" class="lia-align-center"&gt;1&lt;/TD&gt;
&lt;TD width="107.297px" height="28px" class="lia-align-center"&gt;3&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD rowspan="4" width="121.844px" height="188px"&gt;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-Deep-amp-Dark-Web-Monitoring-Datasheet/m-p/236227#M2" target="_self"&gt;Deep &amp;amp; Dark Web Monitoring Module&lt;/A&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="365.672px" height="47px" bgcolor="#F5F5F5"&gt;Credentials &amp;amp; Account Takeover monitoring &amp;amp; alerting&lt;/TD&gt;
&lt;TD width="107.25px" height="47px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="47px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="47px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="47px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="47px" bgcolor="#F5F5F5"&gt;Open, deep and dark web sources collection &amp;amp; search engine&lt;/TD&gt;
&lt;TD width="107.25px" height="47px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="47px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="47px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="47px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="69px" bgcolor="#F5F5F5"&gt;Data leakage &amp;amp; fraud detection using pre-supported use cases (credit cards, emails, source code and more)&lt;/TD&gt;
&lt;TD width="107.25px" height="69px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="69px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="69px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="69px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="25px" bgcolor="#F5F5F5"&gt;Custom Threat Hunting rules&lt;/TD&gt;
&lt;TD width="107.25px" height="25px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="25px" class="lia-align-center"&gt;3&lt;/TD&gt;
&lt;TD width="108.016px" height="25px" class="lia-align-center"&gt;5&lt;/TD&gt;
&lt;TD width="107.297px" height="25px" class="lia-align-center"&gt;10&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD rowspan="4" width="121.844px" height="103px"&gt;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-Supply-Chain-Intelligence-Datasheet/m-p/236232#M4" target="_self"&gt; Supply Chain Intelligence Module&lt;/A&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="365.672px" height="26px" bgcolor="#F5F5F5"&gt;Automatic detection of used vendors&lt;/TD&gt;
&lt;TD width="107.25px" height="26px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="26px" bgcolor="#F5F5F5"&gt;Vendor risk monitoring&lt;/TD&gt;
&lt;TD width="107.25px" height="26px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="26px" bgcolor="#F5F5F5"&gt;Proactive alerts on high identified risks&lt;/TD&gt;
&lt;TD width="107.25px" height="26px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="26px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="25px" bgcolor="#F5F5F5"&gt;Monitored vendors \ technologies&lt;/TD&gt;
&lt;TD width="107.25px" height="25px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="25px" class="lia-align-center"&gt;3&lt;/TD&gt;
&lt;TD width="108.016px" height="25px" class="lia-align-center"&gt;5&lt;/TD&gt;
&lt;TD width="107.297px" height="25px" class="lia-align-center"&gt;10&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD rowspan="4" width="121.844px" height="385px"&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;A href="https://community.checkpoint.com/t5/External-Risk-Management/Infinity-ERM-Cyber-Threat-Intelligence-Datasheet/m-p/236230#M3" target="_self"&gt;&lt;SPAN&gt;Threat Intelligence&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="365.672px" height="80px" bgcolor="#F5F5F5"&gt;Global cyber news and ransomware watch&lt;/TD&gt;
&lt;TD width="107.25px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="80px" bgcolor="#F5F5F5"&gt;ERM Research Threat intelligence reports&lt;/TD&gt;
&lt;TD width="107.25px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="145px" bgcolor="#F5F5F5"&gt;Global Intelligence Knowledgebase (Threat Actors, Malware, CVE)&lt;/TD&gt;
&lt;TD width="107.25px" height="145px" class="lia-align-center"&gt;-&lt;/TD&gt;
&lt;TD width="107.891px" height="145px" class="lia-align-center"&gt;Preview&lt;/TD&gt;
&lt;TD width="108.016px" height="145px" class="lia-align-center"&gt;Preview&lt;/TD&gt;
&lt;TD width="107.297px" height="145px" class="lia-align-center"&gt;Preview&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="365.672px" height="80px" bgcolor="#F5F5F5"&gt;IoC searches and browser extension&lt;/TD&gt;
&lt;TD width="107.25px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.891px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="108.016px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="107.297px" height="80px" class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 16px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23791i9D791182117C95DC/image-dimensions/16x16?v=v2" width="16" height="16" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="121.844px" height="47px"&gt;Remediation &amp;amp; Investigations&lt;/TD&gt;
&lt;TD width="365.672px" height="47px" bgcolor="#F5F5F5"&gt;Remediation Credit Points ("Coins") for takedowns and investigations&lt;/TD&gt;
&lt;TD width="107.25px" height="47px" class="lia-align-center"&gt;20&lt;/TD&gt;
&lt;TD width="107.891px" height="47px" class="lia-align-center"&gt;100&lt;/TD&gt;
&lt;TD width="108.016px" height="47px" class="lia-align-center"&gt;250&lt;/TD&gt;
&lt;TD width="107.297px" height="47px" class="lia-align-center"&gt;400&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;Q:&lt;/STRONG&gt;&amp;nbsp;Can I use IGS credits to purchase Infinity ERM packages ?&lt;BR /&gt;A: Yes. Overview:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;Essentials&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;Advanced&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;Complete&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;Elite&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;STRONG&gt;IGS&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;A href="https://igs.checkpoint.com/services/64" target="_self"&gt;486&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;A href="https://igs.checkpoint.com/services/65" target="_self"&gt;666&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;A href="https://igs.checkpoint.com/services/66" target="_self"&gt;1026&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="20%" height="25px" class="lia-align-center"&gt;&lt;A href="https://igs.checkpoint.com/services/67" target="_self"&gt;1386&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt;&amp;nbsp;What is Active Exposure Validation (AEV) ?&lt;BR /&gt;A: &lt;A href="https://cyberint.com/platform/active-exposure-validation/" target="_self"&gt;See here.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt;&amp;nbsp;What are the latest threat landscape reports ?&lt;BR /&gt;A: &lt;A href="https://e.cyberint.com/hubfs/Europe%20Threat%20Landscape.pdf" target="_self"&gt;Europe Threat Landscape 2024-25&lt;/A&gt; |&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt;&amp;nbsp;What are the latest ransomeware reports ?&lt;BR /&gt;A: &lt;A href="https://cyberint.com/blog/research/ransomware-annual-report-2024/" target="_self"&gt;Q4 2024&lt;/A&gt; |&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/Ransomware%20Q3%202024.pdf" target="_self"&gt;Q3 2024&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Ransomware%20q2%20ebook.pdf" target="_self"&gt;Q2 2024&lt;/A&gt; |&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/RANSOMWARE_Q1_2024_Cyberint_Report.pdf" target="_self"&gt;Q1 2024&lt;/A&gt; |&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt;&amp;nbsp;Additional documentation ?&lt;BR /&gt;A: &lt;A href="https://blog.checkpoint.com/research/5-key-cyber-security-trends-for-2025" target="_self"&gt;5 Key Cyber Security Trend for 2025&lt;/A&gt; | &lt;A href="https://www.linkedin.com/pulse/cyberint-2024-news-cyberint-pd3gf/" target="_self"&gt;2024 Achievements&lt;/A&gt; |&amp;nbsp;&lt;A href="https://e.cyberint.com/hubfs/Ebooks/IAB%20Report%20(3)%20(1).pdf" target="_self"&gt;Initital Access Brokers&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Cyberint%20-%20The%20big%20book%20of%20deep%20and%20dark%20web.pdf" target="_self"&gt;Deep &amp;amp; Dark Web&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Research%20Reports/2023%20Q2/Cyberint%20-%20Exposed%20Customer%20Credentials.pdf" target="_self"&gt;Exposed Customers Credentials&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Retail_Threat_Landscape_Report_Q4_2024.pdf" target="_self"&gt;Retail Threat Landscape&lt;/A&gt; | &lt;A href="https://cyberint.com/blog/thought-leadership/insider-threat-landscape/" target="_self"&gt;Insider Threat Landscape&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/The%20phishing%20protection%20handbook%20eBook.pdf" target="_self"&gt;Phishing &amp;amp; Impersonation Handbook&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/4_Key_Considerations_Before_Renewing_Your_EASM_Solution%20_March_2023.pdf" target="_self"&gt;EASM Key Considerations&lt;/A&gt; |&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt;&amp;nbsp;Which partner resources are available ?&lt;BR /&gt;A: &lt;A href="https://e.cyberint.com/hubfs/Check%20Point%20MSSP%20Datasheet.pdf" target="_self"&gt;MSSP Program&lt;/A&gt; | &lt;A href="https://cyberint.com/wp-content/uploads/2024/08/Cyberint_Battlecards_For_Partners_H2_2024-1.pdf" target="_self"&gt;Battlecards&lt;/A&gt; | &lt;A href="https://e.cyberint.com/hubfs/Impactful_Intelligence_Offering_for_Mssps.pdf" target="_self"&gt;Impactful Intelligence Offering for MSSP's&lt;/A&gt; |&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 09:07:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/External-Risk-Management/Infinity-External-Risk-Management-ERM-FAQ/m-p/235971#M7</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2025-01-23T09:07:59Z</dc:date>
    </item>
  </channel>
</rss>

