Get a Demo

Pricing

Infinity ERM Packages Overview

Check Point’s Infinity External Risk Management (ERM) solution focuses on your organization’s digital estate – domains, IP addresses, websites, applications, social media channels, digital supply chain, and digital use of trademarks such as brand names and logos. Infinity ERM goes far beyond the networks’ perimeters to identify threats and mitigate them before they materialize. We leverage the most advanced technology to identify threats across the web and offer our experts’ help to remove those threats. 

The Infinity ERM solution is effective because it fuses threat intelligence with brand protection and external attack surface management, alongside expert analysts who utilize powerful intelligence capabilities and forensic tools to fully investigate and respond to sophisticated attacks before they can have an adverse impact on your organization. 

Speak to Sales Get a Quote
Modules
Infinity ERM Application 
Fundamentals
Asset Discovery Engine icon
Alerts Center icon
Regular users 1
Threat Hunting users seats
Tenants 1
Out-of-the-box integrations 1
Customer Success Manager cadence Yearly
Support SLA Direct Premium
Attack Surface Management Module
Vulnerabilities and exposure detection icon
Exposure items scan frequency Weekly
Technologies detection & watchlist icon
Risk Posture Monitoring icon
Brand Protection Module
Typosquatting & phishing & brand abuse sites detection icon
Social Media and mobile app impersonation for brand and VIPs
Phishing beacons instances (# of subdomains)
Deep & Dark Web
Monitoring Module
Credentials & Account Takeover monitoring & alerting icon
Open, deep and dark web sources collection & search engine
Data leakage & fraud detection using pre-supported use cases (forcredit cards, emails, source code and more)
Custom Threat Hunting rules
Supply Chain
Intelligence Module
Automatic detection of used vendors
Vendor risk monitoring
Proactive alerts on high identified risks
Monitored vendors \ technologies
Global Threat Intelligence
Global cyber news and ransomware watch icon
ERM Research Threat intelligence reports icon
Global Intelligence Knowledgebase (Threat Actors, Malware, CVE)
IoC searches and browser extension icon
Remediation & Investigations
Remediation Credit Points ("Coins") for takedowns and investigations 20
Protections
Infinity ERM Application 
Fundamentals
Asset Discovery Engine icon
Alerts Center icon
Regular users 1
Threat Hunting users seats
Tenants 1
Out-of-the-box integrations 1
Customer Success Manager cadence Yearly
Support SLA Direct Premium
Attack Surface Management Module
Vulnerabilities and exposure detection icon
Exposure items scan frequency Weekly
Technologies detection & watchlist icon
Risk Posture Monitoring icon
Brand Protection Module
Typosquatting & phishing & brand abuse sites detection icon
Social Media and mobile app impersonation for brand and VIPs
Phishing beacons instances (# of subdomains)
Deep & Dark Web
Monitoring Module
Credentials & Account Takeover monitoring & alerting icon
Open, deep and dark web sources collection & search engine
Data leakage & fraud detection using pre-supported use cases (forcredit cards, emails, source code and more)
Custom Threat Hunting rules
Supply Chain
Intelligence Module
Automatic detection of used vendors
Vendor risk monitoring
Proactive alerts on high identified risks
Monitored vendors \ technologies
Global Threat Intelligence
Global cyber news and ransomware watch icon
ERM Research Threat intelligence reports icon
Global Intelligence Knowledgebase (Threat Actors, Malware, CVE)
IoC searches and browser extension icon
Remediation & Investigations
Remediation Credit Points ("Coins") for takedowns and investigations 20
Essential
Infinity ERM Application 
Fundamentals
Asset Discovery Engine icon
Alerts Center icon
Regular users 1
Threat Hunting users seats
Tenants 1
Out-of-the-box integrations 1
Customer Success Manager cadence Yearly
Support SLA Direct Premium
Attack Surface Management Module
Vulnerabilities and exposure detection icon
Exposure items scan frequency Weekly
Technologies detection & watchlist icon
Risk Posture Monitoring icon
Brand Protection Module
Typosquatting & phishing & brand abuse sites detection icon
Social Media and mobile app impersonation for brand and VIPs
Phishing beacons instances (# of subdomains)
Deep & Dark Web
Monitoring Module
Credentials & Account Takeover monitoring & alerting icon
Open, deep and dark web sources collection & search engine
Data leakage & fraud detection using pre-supported use cases (forcredit cards, emails, source code and more)
Custom Threat Hunting rules
Supply Chain
Intelligence Module
Automatic detection of used vendors
Vendor risk monitoring
Proactive alerts on high identified risks
Monitored vendors \ technologies
Global Threat Intelligence
Global cyber news and ransomware watch icon
ERM Research Threat intelligence reports icon
Global Intelligence Knowledgebase (Threat Actors, Malware, CVE)
IoC searches and browser extension icon
Remediation & Investigations
Remediation Credit Points ("Coins") for takedowns and investigations 20
Advanced
Infinity ERM Application 
Fundamentals
Asset Discovery Engine icon
Alerts Center icon
Regular users 3
Threat Hunting users seats
Tenants 1
Out-of-the-box integrations 2
Customer Success Manager cadence Quarterly
Support SLA Direct Premium
Attack Surface Management Module
Vulnerabilities and exposure detection icon
Exposure items scan frequency Daily
Technologies detection & watchlist icon
Risk Posture Monitoring icon
Brand Protection Module
Typosquatting & phishing & brand abuse sites detection icon
Social Media and mobile app impersonation for brand and VIPs icon
Phishing beacons instances (# of subdomains) 1
Deep & Dark Web
Monitoring Module
Credentials & Account Takeover monitoring & alerting icon
Open, deep and dark web sources collection & search engine icon
Data leakage & fraud detection using pre-supported use cases (forcredit cards, emails, source code and more) icon
Custom Threat Hunting rules 3
Supply Chain
Intelligence Module
Automatic detection of used vendors
Vendor risk monitoring
Proactive alerts on high identified risks
Monitored vendors \ technologies 3
Global Threat Intelligence
Global cyber news and ransomware watch icon
ERM Research Threat intelligence reports icon
Global Intelligence Knowledgebase (Threat Actors, Malware, CVE) Preview
IoC searches and browser extension icon
Remediation & Investigations
Remediation Credit Points ("Coins") for takedowns and investigations 100
Complete
Infinity ERM Application 
Fundamentals
Asset Discovery Engine icon
Alerts Center icon
Regular users 8
Threat Hunting users seats
Tenants 1
Out-of-the-box integrations 3
Customer Success Manager cadence Quarterly
Support SLA Direct Premium
Attack Surface Management Module
Vulnerabilities and exposure detection icon
Exposure items scan frequency Daily
Technologies detection & watchlist icon
Risk Posture Monitoring icon
Brand Protection Module
Typosquatting & phishing & brand abuse sites detection icon
Social Media and mobile app impersonation for brand and VIPs icon
Phishing beacons instances (# of subdomains) 1
Deep & Dark Web
Monitoring Module
Credentials & Account Takeover monitoring & alerting icon
Open, deep and dark web sources collection & search engine icon
Data leakage & fraud detection using pre-supported use cases (forcredit cards, emails, source code and more) icon
Custom Threat Hunting rules 5
Supply Chain
Intelligence Module
Automatic detection of used vendors icon
Vendor risk monitoring icon
Proactive alerts on high identified risks icon
Monitored vendors \ technologies 5
Global Threat Intelligence
Global cyber news and ransomware watch icon
ERM Research Threat intelligence reports icon
Global Intelligence Knowledgebase (Threat Actors, Malware, CVE) Preview
IoC searches and browser extension icon
Remediation & Investigations
Remediation Credit Points ("Coins") for takedowns and investigations 250
Elite
Infinity ERM Application 
Fundamentals
Asset Discovery Engine icon
Alerts Center icon
Regular users 5
Threat Hunting users seats 1
Tenants 1
Out-of-the-box integrations 4
Customer Success Manager cadence Monthly
Support SLA Direct Premium
Attack Surface Management Module
Vulnerabilities and exposure detection icon
Exposure items scan frequency Daily
Technologies detection & watchlist icon
Risk Posture Monitoring icon
Brand Protection Module
Typosquatting & phishing & brand abuse sites detection icon
Social Media and mobile app impersonation for brand and VIPs icon
Phishing beacons instances (# of subdomains) 3
Deep & Dark Web
Monitoring Module
Credentials & Account Takeover monitoring & alerting icon
Open, deep and dark web sources collection & search engine icon
Data leakage & fraud detection using pre-supported use cases (forcredit cards, emails, source code and more) icon
Custom Threat Hunting rules 10
Supply Chain
Intelligence Module
Automatic detection of used vendors icon
Vendor risk monitoring icon
Proactive alerts on high identified risks icon
Monitored vendors \ technologies 10
Global Threat Intelligence
Global cyber news and ransomware watch icon
ERM Research Threat intelligence reports icon
Global Intelligence Knowledgebase (Threat Actors, Malware, CVE) Preview
IoC searches and browser extension icon
Remediation & Investigations
Remediation Credit Points ("Coins") for takedowns and investigations 400
Infinity ERM Application 
Fundamentals
Asset Discovery Engine
icon
icon
icon
icon
Alerts Center
icon
icon
icon
icon
Regular users
1
3
8
5
Threat Hunting users seats
1
Tenants
1
1
1
1
Out-of-the-box integrations
1
2
3
4
Customer Success Manager cadence
Yearly
Quarterly
Quarterly
Monthly
Support SLA
Direct Premium
Direct Premium
Direct Premium
Direct Premium
Attack Surface Management Module
Vulnerabilities and exposure detection
icon
icon
icon
icon
Exposure items scan frequency
Weekly
Daily
Daily
Daily
Technologies detection & watchlist
icon
icon
icon
icon
Risk Posture Monitoring
icon
icon
icon
icon
Brand Protection Module
Typosquatting & phishing & brand abuse sites detection
icon
icon
icon
icon
Social Media and mobile app impersonation for brand and VIPs
icon
icon
icon
Phishing beacons instances (# of subdomains)
1
1
3
Deep & Dark Web
Monitoring Module
Credentials & Account Takeover monitoring & alerting
icon
icon
icon
icon
Open, deep and dark web sources collection & search engine
icon
icon
icon
Data leakage & fraud detection using pre-supported use cases (forcredit cards, emails, source code and more)
icon
icon
icon
Custom Threat Hunting rules
3
5
10
Supply Chain
Intelligence Module
Automatic detection of used vendors
icon
icon
Vendor risk monitoring
icon
icon
Proactive alerts on high identified risks
icon
icon
Monitored vendors \ technologies
3
5
10
Global Threat Intelligence
Global cyber news and ransomware watch
icon
icon
icon
icon
ERM Research Threat intelligence reports
icon
icon
icon
icon
Global Intelligence Knowledgebase (Threat Actors, Malware, CVE)
Preview
Preview
Preview
IoC searches and browser extension
icon
icon
icon
icon
Remediation & Investigations
Remediation Credit Points ("Coins") for takedowns and investigations
20
100
250
400
Speak to Sales Get a Quote

Why work with Infinity ERM

Scalable, Multi-tenant Architecture
Create and manage as many tenants as you need from a single instance. Gain a comprehensive overview of all your accounts from one tenant to streamline workflows and save time.
Independent Tenant & Asset Management
Generate new tenants for customized demos and POCs autonomously, without the need for a lengthy approval process. Create and manage new assets for any client and adjust monitoring statuses as needed.
Market-Leading Technology To Fuel Growth
Protect your clients and grow your business with the recognized leader in External Risk Management. Receive significant discounts that continue to increase as you close more deals and grow with Cyberint.

Talk to an Expert

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start