Q: What's the official product site ?
A: Infinity ERM | Solution Brief | Video | Managing Cyber Risk Exposure
Q: Who developed the solution ?
A: The original solution was developed by Cyberint.
Q: Where can I find Cyberint datasheets ?
A: Argos Platform Datasheet | External Attack Surface Management EASM (+, ++, Monitoring) | Brand Protection | Deep & Dark Web Monitoring | Supply Chain Intelligence | Threat Intel Data Lake | Threat Hunting | Phishing Beacon | Phishing Protection | Active Exposure Validation (ROI) | Risk Intel Feed | Vulnerability Intelligence | Fraud Prevention | Forensic Canvas Module
Q: Where can I find Check Point datasheets ?
A: Attack Surface Management | Brand Protection | Deep & Dark Web Monitoring | Supply Chain Intelligence | Threat Intelligence
Q: Which features have been added or improved recently ?
A: 2024 Feature Additions
Q: What does my CISO need to know ?
A: Your Cybersecurity Debt & The Cost of Doing Nothing
Q: Where can I find trainings or webinars ?
A: Americas Dec. 2024 | EMEA Dec. 2024
Q: How is Infinity ERM (Cyberint) recognized by the industry ?
A: Gartner | G2 | Frost & Sullivan | IDC
Q: Where can I find a success story ?
A: Ströer (German version)
Q: How do I access the operational dashboard ?
A: Currently via Cyberint's Argos™ Intelligence Platform, soon to be available within Check Point's Infinity Portal.
Q: Where can I find more information about the Argos™ platform ?
A: cyberint.com/platform/
Q: How do I get support ?
A: Customer Support
Q: What are Take Downs ?
A: Service Description | Service Offering
Q: Where does Check Point add ERM to its security portfolio ?
A: ERM completes Check Point's Infinity SOC offering besides XDR/XPR, Playblocks, Events and MDR/MPR.
ERM |
XDR / XPR |
Playblocks |
Events |
MDR / MPR |
External Risk Management (ERM) including cyber threat intelligence, deep and dark web monitoring, external attack surface management, and digital risk protection. |
Quickly uncover and prevent cyber attacks by correlating events across your entire security estate. |
Extend the reach of siloed security solutions to stop attacks across your enterprise, with automation and collaboration. |
Complete event unification and visibility across all Check Point products for efficient monitoring, search and threat hunting. |
Prevention-first managed detection and response (MDR) offering complete, powerful SOC operations as a service.
|
Q: What's included in the Infinity ERM packages ?
A: See Pricing.
Modules |
Protections |
Essential |
Advanced |
Complete |
Elite |
Application Fundamentals
|
Asset Discovery Engine |
|
|
|
|
Alerts Center |
|
|
|
|
Regular users |
1 |
3 |
5 |
8 |
Threat Hunting users seats |
- |
- |
- |
1 |
Tenants |
1 |
1 |
1 |
1 |
Out-of-the-box integrations |
1 |
2 |
3 |
4 |
Customer Success Manager cadence |
Yearly |
Quarterly |
Quarterly |
Monthly |
Support SLA |
Direct Premium |
Direct Premium |
Direct Premium |
Direct Premium |
Attack Surface Management Module
|
Vulnerabilities and exposure detection |
|
|
|
|
Exposure items scan frequency |
Weekly |
Daily |
Daily |
Daily |
Technologies detection & watchlist |
|
|
|
|
Risk Posture Monitoring |
|
|
|
|
Brand Protection Module
|
Typosquatting & phishing & brand abuse sites detection |
|
|
|
|
Social Media and mobile app impersonation for brand and VIPs |
- |
|
|
|
Phishing beacons instances (# of subdomains) |
- |
1 |
1 |
3 |
Deep & Dark Web Monitoring Module
|
Credentials & Account Takeover monitoring & alerting |
|
|
|
|
Open, deep and dark web sources collection & search engine |
- |
|
|
|
Data leakage & fraud detection using pre-supported use cases (credit cards, emails, source code and more) |
- |
|
|
|
Custom Threat Hunting rules |
- |
3 |
5 |
10 |
Supply Chain Intelligence Module
|
Automatic detection of used vendors |
|
|
|
|
Vendor risk monitoring |
|
|
|
|
Proactive alerts on high identified risks |
|
|
|
|
Monitored vendors \ technologies |
- |
3 |
5 |
10 |
Threat Intelligence
|
Global cyber news and ransomware watch |
|
|
|
|
ERM Research Threat intelligence reports |
|
|
|
|
Global Intelligence Knowledgebase (Threat Actors, Malware, CVE) |
- |
Preview |
Preview |
Preview |
IoC searches and browser extension |
|
|
|
|
Remediation & Investigations |
Remediation Credit Points ("Coins") for takedowns and investigations |
20 |
100 |
250 |
400 |
Q: Can I use IGS credits to purchase Infinity ERM packages ?
A: Yes. Overview:
Q: What is Active Exposure Validation (AEV) ?
A: See here.
Q: What are the latest threat landscape reports ?
A: Europe Threat Landscape 2024-25 |
Q: What are the latest ransomeware reports ?
A: Q4 2024 | Q3 2024 | Q2 2024 | Q1 2024 |
Q: Additional documentation ?
A: 5 Key Cyber Security Trend for 2025 | 2024 Achievements | Initital Access Brokers | Deep & Dark Web | Exposed Customers Credentials | Retail Threat Landscape | Insider Threat Landscape | Phishing & Impersonation Handbook | EASM Key Considerations |
Q: Which partner resources are available ?
A: MSSP Program | Battlecards | Impactful Intelligence Offering for MSSP's |