- Table of contents
Cyberint’s Integration with Check Point: Challenges and Endless Possibilities
What’s Changed with the Check Point Acquisition
As a Group Leader in the R&D team at Cyberint before the acquisition, we worked tirelessly to push the boundaries. Whether it was outpacing the competition with cutting-edge technology, delivering exceptional UI/UX, or ensuring our customers were satisfied with the precision and impact of our findings, we did it with a team that was small but mighty. We always said, “The skies are not the limit; we can go beyond.” And we lived by that motto, staying at the forefront of innovation with advanced automation and top-tier findings.
Then came the acquisition by Check Point—and wow, how do I put this? The “skies are not the limit” concept has shifted entirely. It feels like the possibilities have expanded infinitely. We now have the opportunity to combine Cyberint’s groundbreaking technology with Check Point’s robust suite of security products, forming an iron fist against cyber criminals. Together, we’ll make it incredibly difficult for anyone to breach our customers’ systems or cause harm.
Every time I sit at my desk and reflect on what’s next, I’m overwhelmed by the endless options. Should we integrate with Playblocks? Quantum Security Gateway? Harmony Endpoint? Perhaps enrich our IOC feeds so customers gain deeper insights into threats? It’s like being a kid in a candy store, with so many amazing opportunities ahead.
So, where did we start? Well, why limit ourselves to one thing? We’re tackling four integrations in parallel! After just one month as part of Check Point, we’ve nearly completed the integration into the Infinity Portal and are diving deep into other innovative connections.
And for those who worry that we’ll lose focus on improving ERM, don’t fret. If you know Cyberint’s R&D, you know we excel at handling multiple priorities while maintaining exceptional quality. Rest assured, the impactful alerting and insights you’ve come to expect from us are not only here to stay but will soon be better than ever.
Use Cases for Integration
1. Automating Employee Credential Resets
Playblocks, powered by Cyberint’s ERM, can automatically reset exposed employee credentials after ERM identifies a breach notification. This removes manual intervention, speeds up response times, and reduces potential damage.
2. Virtual Patching and Enhancing IPS Through Quantum Security Gateway
When Cyberint’s ERM detects exploitable vulnerabilities or uncovers breach techniques, integration with Check Point’s Quantum Security Gateway offers a powerful mechanism to respond through virtual patching.
Virtual patching provides a way to protect against vulnerabilities without requiring immediate software updates. Instead of taking drastic actions like closing a port, which may not be feasible if a mission-critical service relies on it, Quantum can apply tailored signatures or rules to block malicious activity targeting the vulnerability.
For example, if ERM simulates an attack and successfully breaches an asset using a new method, these findings can be directly fed into Quantum’s IPS (Intrusion Prevention System). The IPS can then create and deploy enhanced rules to address the specific vulnerability, ensuring real-time protection without disrupting operations.
This approach ensures:
- Rapid Protection: Customers can defend their systems against zero-day exploits or newly disclosed CVEs without waiting for a patch to be developed or deployed.
- Operational Continuity: By applying signatures instead of closing ports, critical services can continue to function while still being protected.
- Evolving Defenses: ERM’s breach simulations provide valuable insights to continuously update and improve IPS signatures, ensuring they remain effective against the latest attack techniques.
This integration not only reinforces the immediate security posture but also helps evolve Check Point’s threat prevention systems, creating a more adaptive and intelligent defense ecosystem.
3. Malware Intelligence for Harmony Endpoint
Cyberint can feed its advanced malware intelligence into Harmony Endpoint Researchers, enabling the creation of new malware signatures to proactively defend endpoints from evolving threats. This not only improves endpoint security but also helps build a more adaptive and resilient ecosystem.
4. Traffic-Based Insights and CVE Enrichment
Through integration with Check Point’s Quantum Security Gateway, we can derive critical insights from blocked traffic due to exploit attempts:
- IOC Enrichment: Beyond identifying a source as malicious, we gain insights into the specific types of exploits originating from that source. This enriches the IOC data, providing a deeper layer of intelligence about the threats.
- CVE Scoring and Recommendations: By correlating attempted exploits with CVEs, we can refine CVE scoring and deliver actionable recommendations to customers. This isn’t just theoretical knowledge about CVEs being discussed on the dark web; we have concrete, real-world evidence of these CVEs being actively exploited across the globe. This allows customers to prioritize critical patches and mitigate risks more effectively.
Technological Challenges in Integration: Building a Scalable, Efficient, and Innovative Ecosystem
While the integration between Cyberint and Check Point brings infinite possibilities, it also presents unique challenges—technological, operational, and strategic. These challenges aren’t obstacles but rather opportunities to refine and innovate as we build a seamless security ecosystem for our customers.
1. Scale: Managing the Deluge of Data
Integrating Cyberint’s ERM with Check Point products involves handling vast amounts of IOCs (Indicators of Compromise) and threat intelligence. Scaling our systems to manage this massive influx of data efficiently is no small feat. Ensuring the pipelines remain robust while providing real-time updates to customers is critical.
2. Performance: Real-Time Responses
Performance is paramount. For example, when ERM identifies exposed credentials and triggers Playblocks automation to reset those credentials, the process must be near-instantaneous to minimize the potential for exploitation. Similarly, automated actions, such as closing ports in Quantum Security Gateway, demand low-latency responses to be effective. The challenge lies in maintaining this speed while ensuring accuracy and avoiding false positives.
3. Timelines: Prioritizing ROI
In a world of infinite possibilities, deciding where to start is a challenge in itself. Should we focus on automating employee credential resets first? Or prioritize enriching IOC feeds? What provides the greatest ROI for both our customers and our development efforts? Balancing immediate needs with long-term goals requires meticulous planning and cross-team collaboration.
4. Knowledge: Learning the Ecosystem
In theory, integration sounds simple, connect Product A with Product B, and you’re done. But in practice, it’s far more nuanced.
- Deep Product Understanding: To integrate effectively, we must dive deep into the capabilities of Check Point products like Quantum, Harmony Endpoint, and Playblocks. This knowledge doesn’t just ensure seamless integration but sparks innovative ideas for new use cases.
- Technological Possibilities: Understanding how data flows between systems, whether it’s pull-based, push-based, or requires a central threat intelligence lake, is critical. Does a data lake already exist that we can leverage? If so, how do we align our data pipelines with it?
- Building the Future Together: Some answers are already clear, but as we continue to learn and explore, we’ll uncover new pathways for innovation. The faster we build this understanding, the faster our customers who use both ERM and Check Point products can experience truly meaningful and impactful external risk management.
5. Collaboration and Adaptation
Each challenge forces us to collaborate closely with Check Point teams, learn from their deep expertise, and adapt our approaches accordingly. By doing so, we not only enhance the integration process but also discover untapped opportunities for synergy.
About Cyberint, a Check Point Company
Cyberint, now a Check Point company, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The Check Point External Risk Management solution provides superior visibility through continuous discovery of the evolving attack surface, combined with the automated collection and analysis of vast quantities of intelligence from across the open, deep and dark web.
A team of global military-grade cybersecurity experts work alongside customers to rapidly detect, investigate, and disrupt relevant threats – before they have the chance to develop into major incidents. Global customers, including Fortune 500 leaders across all major market verticals, rely on Check Point External Risk Management to protect themselves from an array of external risks, including vulnerabilities,
misconfigurations, phishing, impersonation attacks, malware infections, exposed credentials, data leaks, fraud, and 3rd party risks.