Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Danny
Champion Champion
Champion

Infinity External Risk Management (ERM) FAQ


FAQ Author: Danny Jung

Q: What's the official product site ?
A: Infinity ERM | Solution Brief | Video | Managing Cyber Risk Exposure

Q: Who developed the solution ?
A: The original solution was developed by Cyberint.

Q: Where can I find Cyberint datasheets ?
A: Argos Platform Datasheet | External Attack Surface Management EASM (+, ++Monitoring) | Brand Protection | Deep & Dark Web MonitoringSupply Chain IntelligenceThreat Intel Data LakeThreat Hunting | Phishing Beacon | Phishing Protection | Active Exposure Validation (ROI) | Risk Intel Feed | Vulnerability IntelligenceFraud Prevention | Forensic Canvas Module

Q: Where can I find Check Point datasheets ?
A: Attack Surface ManagementBrand ProtectionDeep & Dark Web Monitoring | Supply Chain Intelligence | Threat Intelligence

Q: Which features have been added or improved recently ?
A: 2024 Feature Additions

Q: What does my CISO need to know ?
A: Your Cybersecurity Debt & The Cost of Doing Nothing

Q: Where can I find trainings or webinars ?
A: Americas Dec. 2024 | EMEA Dec. 2024

Q: How is Infinity ERM (Cyberint) recognized by the industry ?
A: Gartner | G2 | Frost & Sullivan | IDC

Q: Where can I find a success story ?
A: Ströer (German version)

Q: How do I access the operational dashboard ?
A: Currently via Cyberint's Argos™ Intelligence Platform, soon to be available within Check Point's Infinity Portal.

Q: Where can I find more information about the Argos™ platform  ?
A: cyberint.com/platform/

Q: How do I get support ?
A: Customer Support

Q: What are Take Downs ?
A: Service Description | Service Offering

Q: Where does Check Point add ERM to its security portfolio ?
A: ERM completes Check Point's Infinity SOC offering besides XDR/XPR, Playblocks, Events and MDR/MPR.

ERM XDR / XPR Playblocks Events MDR / MPR
External Risk Management (ERM) including cyber threat intelligence, deep and dark web monitoring, external attack surface management, and digital risk protection. Quickly uncover and prevent cyber attacks by correlating events across your entire security estate. Extend the reach of siloed security solutions to stop attacks across your enterprise, with automation and collaboration. Complete event unification and visibility across all Check Point products for efficient monitoring, search and threat hunting. Prevention-first managed detection and response (MDR) offering complete, powerful SOC operations as a service.

 

Q: What's included in the Infinity ERM packages ?
A: See Pricing.

Modules Protections Essential Advanced Complete Elite
Application
Fundamentals








Asset Discovery Engine image.png image.png image.png image.png
Alerts Center image.png image.png image.png image.png
Regular users 1 3 5 8
Threat Hunting users seats - - - 1
Tenants 1 1 1 1
Out-of-the-box integrations 1 2 3 4
Customer Success Manager cadence Yearly Quarterly Quarterly Monthly
Support SLA Direct Premium Direct Premium Direct Premium Direct Premium
Attack Surface Management Module




Vulnerabilities and exposure detection image.png image.png image.png image.png
Exposure items scan frequency Weekly Daily Daily Daily
Technologies detection & watchlist image.png image.png image.png image.png
Risk Posture Monitoring image.png image.png image.png image.png
Brand Protection Module



Typosquatting & phishing & brand abuse sites detection image.png image.png image.png image.png
Social Media and mobile app impersonation for brand and VIPs - image.png image.png image.png
Phishing beacons instances (# of subdomains) - 1 1 3
Deep & Dark Web Monitoring Module




Credentials & Account Takeover monitoring & alerting image.png image.png image.png image.png
Open, deep and dark web sources collection & search engine - image.png image.png image.png
Data leakage & fraud detection using pre-supported use cases (credit cards, emails, source code and more) - image.png image.png image.png
Custom Threat Hunting rules - 3 5 10
Supply Chain Intelligence Module
Automatic detection of used vendors     image.png image.png
Vendor risk monitoring     image.png image.png
Proactive alerts on high identified risks     image.png image.png
Monitored vendors \ technologies - 3 5 10

Threat Intelligence

Global cyber news and ransomware watch image.png image.png image.png image.png
ERM Research Threat intelligence reports image.png image.png image.png image.png
Global Intelligence Knowledgebase (Threat Actors, Malware, CVE) - Preview Preview Preview
IoC searches and browser extension image.png image.png image.png image.png
Remediation & Investigations Remediation Credit Points ("Coins") for takedowns and investigations 20 100 250 400


Q:
 Can I use IGS credits to purchase Infinity ERM packages ?
A: Yes. Overview:

  Essentials Advanced Complete Elite
IGS 486 666 1026 1386

 

Q: What is Active Exposure Validation (AEV) ?
A: See here.

Q: What are the latest threat landscape reports ?
A: Europe Threat Landscape 2024-25 |

Q: What are the latest ransomeware reports ?
A: Q4 2024Q3 2024 | Q2 2024Q1 2024 |

Q: Additional documentation ?
A: 5 Key Cyber Security Trend for 2025 | 2024 AchievementsInitital Access Brokers | Deep & Dark Web | Exposed Customers Credentials | Retail Threat Landscape | Insider Threat Landscape | Phishing & Impersonation Handbook | EASM Key Considerations |

Q: Which partner resources are available ?
A: MSSP Program | Battlecards | Impactful Intelligence Offering for MSSP's |

0 Replies

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events