- CheckMates
- :
- Products
- :
- Infinity Global Services
- :
- External Risk Management
- :
- Infinity External Risk Management (ERM) FAQ
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Infinity External Risk Management (ERM) FAQ
Q: What's the official product site ?
A: Infinity ERM | Solution Brief | Video | Managing Cyber Risk Exposure
Q: Who developed the solution ?
A: The original solution was developed by Cyberint.
Q: Where can I find Cyberint datasheets ?
A: Argos Platform Datasheet | External Attack Surface Management EASM (+, ++, Monitoring) | Brand Protection | Deep & Dark Web Monitoring | Supply Chain Intelligence | Threat Intel Data Lake | Threat Hunting | Phishing Beacon | Phishing Protection | Active Exposure Validation (ROI) | Risk Intel Feed | Vulnerability Intelligence | Fraud Prevention | Forensic Canvas Module
Q: Where can I find Check Point datasheets ?
A: Attack Surface Management | Brand Protection | Deep & Dark Web Monitoring | Supply Chain Intelligence | Threat Intelligence
Q: Which features have been added or improved recently ?
A: 2024 Feature Additions
Q: What does my CISO need to know ?
A: Your Cybersecurity Debt & The Cost of Doing Nothing
Q: Where can I find trainings or webinars ?
A: Americas Dec. 2024 | EMEA Dec. 2024
Q: How is Infinity ERM (Cyberint) recognized by the industry ?
A: Gartner | G2 | Frost & Sullivan | IDC
Q: Where can I find a success story ?
A: Ströer (German version)
Q: How do I access the operational dashboard ?
A: Currently via Cyberint's Argos™ Intelligence Platform, soon to be available within Check Point's Infinity Portal.
Q: Where can I find more information about the Argos™ platform ?
A: cyberint.com/platform/
Q: How do I get support ?
A: Customer Support
Q: What are Take Downs ?
A: Service Description | Service Offering
Q: Where does Check Point add ERM to its security portfolio ?
A: ERM completes Check Point's Infinity SOC offering besides XDR/XPR, Playblocks, Events and MDR/MPR.
ERM | XDR / XPR | Playblocks | Events | MDR / MPR |
External Risk Management (ERM) including cyber threat intelligence, deep and dark web monitoring, external attack surface management, and digital risk protection. | Quickly uncover and prevent cyber attacks by correlating events across your entire security estate. | Extend the reach of siloed security solutions to stop attacks across your enterprise, with automation and collaboration. | Complete event unification and visibility across all Check Point products for efficient monitoring, search and threat hunting. | Prevention-first managed detection and response (MDR) offering complete, powerful SOC operations as a service. |
Q: What's included in the Infinity ERM packages ?
A: See Pricing.
Modules | Protections | Essential | Advanced | Complete | Elite |
Application Fundamentals |
Asset Discovery Engine | ||||
Alerts Center | |||||
Regular users | 1 | 3 | 5 | 8 | |
Threat Hunting users seats | - | - | - | 1 | |
Tenants | 1 | 1 | 1 | 1 | |
Out-of-the-box integrations | 1 | 2 | 3 | 4 | |
Customer Success Manager cadence | Yearly | Quarterly | Quarterly | Monthly | |
Support SLA | Direct Premium | Direct Premium | Direct Premium | Direct Premium | |
Attack Surface Management Module |
Vulnerabilities and exposure detection | ||||
Exposure items scan frequency | Weekly | Daily | Daily | Daily | |
Technologies detection & watchlist | |||||
Risk Posture Monitoring | |||||
Brand Protection Module |
Typosquatting & phishing & brand abuse sites detection | ||||
Social Media and mobile app impersonation for brand and VIPs | - | ||||
Phishing beacons instances (# of subdomains) | - | 1 | 1 | 3 | |
Deep & Dark Web Monitoring Module |
Credentials & Account Takeover monitoring & alerting | ||||
Open, deep and dark web sources collection & search engine | - | ||||
Data leakage & fraud detection using pre-supported use cases (credit cards, emails, source code and more) | - | ||||
Custom Threat Hunting rules | - | 3 | 5 | 10 | |
Supply Chain Intelligence Module |
Automatic detection of used vendors | - | |||
Vendor risk monitoring | - | ||||
Proactive alerts on high identified risks | - | ||||
Monitored vendors \ technologies | - | 3 | 5 | 10 | |
Threat Intelligence |
Global cyber news and ransomware watch | ||||
ERM Research Threat intelligence reports | |||||
Global Intelligence Knowledgebase (Threat Actors, Malware, CVE) | - | Preview | Preview | Preview | |
IoC searches and browser extension | |||||
Remediation & Investigations | Remediation Credit Points ("Coins") for takedowns and investigations | 20 | 100 | 250 | 400 |
Q: Can I use IGS credits to purchase Infinity ERM packages ?
A: Yes. Overview:
Essentials | Advanced | Complete | Elite | |
IGS | 486 | 666 | 1026 | 1386 |
Q: What is Active Exposure Validation (AEV) ?
A: See here.
Q: What are the latest threat landscape reports ?
A: Europe Threat Landscape 2024-25 |
Q: What are the latest ransomeware reports ?
A: Q4 2024 | Q3 2024 | Q2 2024 | Q1 2024 |
Q: Additional documentation ?
A: 5 Key Cyber Security Trend for 2025 | 2024 Achievements | Initital Access Brokers | Deep & Dark Web | Exposed Customers Credentials | Retail Threat Landscape | Insider Threat Landscape | Phishing & Impersonation Handbook | EASM Key Considerations |
Q: Which partner resources are available ?
A: MSSP Program | Battlecards | Impactful Intelligence Offering for MSSP's |
