Pricing

Infinity ERM Packages Overview

Check Point’s Infinity External Risk Management (Cyberint) solution fuses threat intelligence with brand protection and external attack surface management, alongside expert analysts who utilize powerful intelligence capabilities and forensic tools to fully investigate and respond to sophisticated attacks before they can have an adverse impact on your organization.

Speak to Sales Get a Quote
Essential
External Attack Surface Management
The Infinity ERM Attack Surface Management Module continuously discovers your organization’s digital footprint, creating a complete asset inventory and providing visibility on your Internet-facing digital assets.

The ASM module then identifies security vulnerabilities and exposures, assesses the risk of each one, and assigns risk scores to simplify prioritization and accelerate remediation.
icon
Domain & Phishing Protection
Infinity ERM provides comprehensive and proactive protection from phishing attacks. From lookalike domain monitoring to the detection of websites that illegally use trademarked brand names and logos, Infinity ERM mitigates phishing risks from end to end.

Upon detection by Infinity ERM, customers can quickly request a takedown of malicious content, such as phishing and brand abuse sites, from within the product.
icon
Leaked Credentials Detection & Account Takeover Monitoring
Infinity ERM collects tens of millions of exposed credentials each month from across the open, deep and dark web.

This includes credentials harvested by InfoStealers and sent back to C2 servers in malware logs, credentials put up for sale on illegal marketplaces, credentials dumped on data leak sites or cybercrime forums, and more.

Prevent account takeovers of both employees and customers with Infinity ERM.
icon
Cybersecurity News Feed & Ransomware Watch
Infinity ERM provides a series of features to help your team keep pace with the breakneck speed of the InfoSec world.

This includes an aggregated news feed with the latest articles from top cybersecurity publications; a news bulletin that provides quick summaries of breaking news items in just 2 to 3 sentences; and proprietary threat intelligence reports published by the Infinity ERM research team.
icon
Number of Users
All Infinity ERM products and packages come with a number of user seats by default, with one or more users in every environment having elevated administrative privileges.

Infinity ERM supports Single Sign On (SSO) with Okta, Google Workspace, Azure AD & OneLogin to allow secure log-in without the need for username and password input from the end-user.
1
Cyberint Coins for Takedowns & Investigations
Check Point Coins can be used to initiate takedowns of illegal content, dark web investigations, custom threat reports, and more.

Takedowns can be completed for malicious use of trademarked brand names and logos, fraudulent social media profiles, publication of proprietary data, and more. Investigations can be conducted on specific threat actors or groups, malware families, attack campaigns, and other relevant risks.
20
Advanced
External Attack Surface Management
The Infinity ERM Attack Surface Management Module continuously discovers your organization’s digital footprint, creating a complete asset inventory and providing visibility on your Internet-facing digital assets.

The ASM module then identifies security vulnerabilities and exposures, assesses the risk of each one, and assigns risk scores to simplify prioritization and accelerate remediation.
icon
Domain & Phishing Protection
Infinity ERM provides comprehensive and proactive protection from phishing attacks. From lookalike domain monitoring to the detection of websites that illegally use trademarked brand names and logos, Infinity ERM mitigates phishing risks from end to end.

Upon detection by Infinity ERM, customers can quickly request a takedown of malicious content, such as phishing and brand abuse sites, from within the product.
icon
Leaked Credentials Detection & Account Takeover Monitoring
Infinity ERM collects tens of millions of exposed credentials each month from across the open, deep and dark web.

This includes credentials harvested by InfoStealers and sent back to C2 servers in malware logs, credentials put up for sale on illegal marketplaces, credentials dumped on data leak sites or cybercrime forums, and more.

Prevent account takeovers of both employees and customers with Infinity ERM.
icon
Cybersecurity News Feed & Ransomware Watch
Infinity ERM provides a series of features to help your team keep pace with the breakneck speed of the InfoSec world.

This includes an aggregated news feed with the latest articles from top cybersecurity publications; a news bulletin that provides quick summaries of breaking news items in just 2 to 3 sentences; and proprietary threat intelligence reports published by the Infinity ERM research team.
icon
Social Media Monitoring for Brand & VIP Impersonation Detection
Infinity ERM continuously monitors social media channels and both official and unofficial mobile app stores to detect impersonation of your brands and executives.

Customers can predetermine which brand names, product names, applications, and personnel they would like to protect. Infinity ERM then monitors for impersonation of those priority assets and generates an alert in real-time if a threat is detected.
icon
Phishing Beacon
The Infinity ERM Phishing Beacon is an obfuscated script that you embed in your organization’s web properties. If bad actors create a clone of one of your pages, the Phishing Beacon sends a signal back to the Infinity ERM solution the moment the malicious replica is published online.

This enables you to proactively takedown the threat before the attack develops and causes damage.
1
Threat Intel Data Lake: A Deep and Dark Web Search Engine
The Cyberint Argos platform continuously collects mass quantities of data from the open, deep and dark web. All intelligence items collected are aggregated into a data lake, which can be filtered and queried by source, threat category, risk level, language, date, and more.

Complex queries can be saved to trigger automatic alerts, acting as an early warning system and helping you to get ahead of evolving threats.
icon
Data Leak & Fraud Detection
Infinity ERM continuously collects intelligence from thousands of sources across the deep and dark web. By automating the process of gaining access to closed threat actors chat groups and forums, Infinity ERM gives customers extensive real-time visibility on relevant threats hiding in the darkest corners of the web. This results in automatic detection of fraudulent activity and data leaks across the web.
icon
Global Threat Intelligence Knowledgebase
The Infinity ERM Threat Intelligence Knowledgebase provides a library of data on threat groups, malware, and documented CVEs.

Customers can filter their threat landscape by industry and region, drill down on the attacks they are most likely to face, and access relevant data—such as common tactics, techniques, and procedures (TTPs) and indicators of compromise (IoCs)—enabling more proactive cyber defenses.
icon
Supply Chain Intelligence Module (number of monitored vendors)
The Infinity External Risk Management solution’s Supply Chain Intelligence Module continuously discovers your vendors and technologies, monitors and evaluates their exposures, and issues alerts on major risks and breaches.

Stay secure with targeted alerts that notify you when a trusted third-party organization falls victim to an attack.
3
Number of Users
All Infinity ERM products and packages come with a number of user seats by default, with one or more users in every environment having elevated administrative privileges.

Infinity ERM supports Single Sign On (SSO) with Okta, Google Workspace, Azure AD & OneLogin to allow secure log-in without the need for username and password input from the end-user.
3
Cyberint Coins for Takedowns & Investigations
Check Point Coins can be used to initiate takedowns of illegal content, dark web investigations, custom threat reports, and more.

Takedowns can be completed for malicious use of trademarked brand names and logos, fraudulent social media profiles, publication of proprietary data, and more. Investigations can be conducted on specific threat actors or groups, malware families, attack campaigns, and other relevant risks.
100
Complete
External Attack Surface Management
The Infinity ERM Attack Surface Management Module continuously discovers your organization’s digital footprint, creating a complete asset inventory and providing visibility on your Internet-facing digital assets.

The ASM module then identifies security vulnerabilities and exposures, assesses the risk of each one, and assigns risk scores to simplify prioritization and accelerate remediation.
icon
Domain & Phishing Protection
Infinity ERM provides comprehensive and proactive protection from phishing attacks. From lookalike domain monitoring to the detection of websites that illegally use trademarked brand names and logos, Infinity ERM mitigates phishing risks from end to end.

Upon detection by Infinity ERM, customers can quickly request a takedown of malicious content, such as phishing and brand abuse sites, from within the product.
icon
Leaked Credentials Detection & Account Takeover Monitoring
Infinity ERM collects tens of millions of exposed credentials each month from across the open, deep and dark web.

This includes credentials harvested by InfoStealers and sent back to C2 servers in malware logs, credentials put up for sale on illegal marketplaces, credentials dumped on data leak sites or cybercrime forums, and more.

Prevent account takeovers of both employees and customers with Infinity ERM.
icon
Cybersecurity News Feed & Ransomware Watch
Infinity ERM provides a series of features to help your team keep pace with the breakneck speed of the InfoSec world.

This includes an aggregated news feed with the latest articles from top cybersecurity publications; a news bulletin that provides quick summaries of breaking news items in just 2 to 3 sentences; and proprietary threat intelligence reports published by the Infinity ERM research team.
icon
Social Media Monitoring for Brand & VIP Impersonation Detection
Infinity ERM continuously monitors social media channels and both official and unofficial mobile app stores to detect impersonation of your brands and executives.

Customers can predetermine which brand names, product names, applications, and personnel they would like to protect. Infinity ERM then monitors for impersonation of those priority assets and generates an alert in real-time if a threat is detected.
icon
Phishing Beacon
The Infinity ERM Phishing Beacon is an obfuscated script that you embed in your organization’s web properties. If bad actors create a clone of one of your pages, the Phishing Beacon sends a signal back to the Infinity ERM solution the moment the malicious replica is published online.

This enables you to proactively takedown the threat before the attack develops and causes damage.
1
Threat Intel Data Lake: A Deep and Dark Web Search Engine
The Cyberint Argos platform continuously collects mass quantities of data from the open, deep and dark web. All intelligence items collected are aggregated into a data lake, which can be filtered and queried by source, threat category, risk level, language, date, and more.

Complex queries can be saved to trigger automatic alerts, acting as an early warning system and helping you to get ahead of evolving threats.
icon
Data Leak & Fraud Detection
Infinity ERM continuously collects intelligence from thousands of sources across the deep and dark web. By automating the process of gaining access to closed threat actors chat groups and forums, Infinity ERM gives customers extensive real-time visibility on relevant threats hiding in the darkest corners of the web. This results in automatic detection of fraudulent activity and data leaks across the web.
icon
Global Threat Intelligence Knowledgebase
The Infinity ERM Threat Intelligence Knowledgebase provides a library of data on threat groups, malware, and documented CVEs.

Customers can filter their threat landscape by industry and region, drill down on the attacks they are most likely to face, and access relevant data—such as common tactics, techniques, and procedures (TTPs) and indicators of compromise (IoCs)—enabling more proactive cyber defenses.
icon
Supply Chain Intelligence Module (number of monitored vendors)
The Infinity External Risk Management solution’s Supply Chain Intelligence Module continuously discovers your vendors and technologies, monitors and evaluates their exposures, and issues alerts on major risks and breaches.

Stay secure with targeted alerts that notify you when a trusted third-party organization falls victim to an attack.
5
Managed Service – Dedicated CTI Expert for Alert Triage & Enrichment
Infinity ERM managed services help your team save time and reduce cyber risk, maximizing the value of your ERM deployment. An assigned analyst triages and enriches alerts, provides expert insights and recommendations, and directly supports your team.

This reduces your team’s workload, accelerating response and remediation activities while freeing up time to focus on other priority projects.
icon
Managed Service – Guaranteed SLA For Cyber Incidents
The Infinity ERM global support team provides 24×7 support while cyber experts conduct investigations, produce custom reports, and takedown malicious content.

Infinity ERM Complete Package customers are guaranteed a response to a request for assistance within 24 hours, while Infinity ERM Elite customers are guaranteed a reply within 4 hours.
24 hours
Number of Users
All Infinity ERM products and packages come with a number of user seats by default, with one or more users in every environment having elevated administrative privileges.

Infinity ERM supports Single Sign On (SSO) with Okta, Google Workspace, Azure AD & OneLogin to allow secure log-in without the need for username and password input from the end-user.
5
Cyberint Coins for Takedowns & Investigations
Check Point Coins can be used to initiate takedowns of illegal content, dark web investigations, custom threat reports, and more.

Takedowns can be completed for malicious use of trademarked brand names and logos, fraudulent social media profiles, publication of proprietary data, and more. Investigations can be conducted on specific threat actors or groups, malware families, attack campaigns, and other relevant risks.
250
Elite
External Attack Surface Management
The Infinity ERM Attack Surface Management Module continuously discovers your organization’s digital footprint, creating a complete asset inventory and providing visibility on your Internet-facing digital assets.

The ASM module then identifies security vulnerabilities and exposures, assesses the risk of each one, and assigns risk scores to simplify prioritization and accelerate remediation.
icon
Domain & Phishing Protection
Infinity ERM provides comprehensive and proactive protection from phishing attacks. From lookalike domain monitoring to the detection of websites that illegally use trademarked brand names and logos, Infinity ERM mitigates phishing risks from end to end.

Upon detection by Infinity ERM, customers can quickly request a takedown of malicious content, such as phishing and brand abuse sites, from within the product.
icon
Leaked Credentials Detection & Account Takeover Monitoring
Infinity ERM collects tens of millions of exposed credentials each month from across the open, deep and dark web.

This includes credentials harvested by InfoStealers and sent back to C2 servers in malware logs, credentials put up for sale on illegal marketplaces, credentials dumped on data leak sites or cybercrime forums, and more.

Prevent account takeovers of both employees and customers with Infinity ERM.
icon
Cybersecurity News Feed & Ransomware Watch
Infinity ERM provides a series of features to help your team keep pace with the breakneck speed of the InfoSec world.

This includes an aggregated news feed with the latest articles from top cybersecurity publications; a news bulletin that provides quick summaries of breaking news items in just 2 to 3 sentences; and proprietary threat intelligence reports published by the Infinity ERM research team.
icon
Social Media Monitoring for Brand & VIP Impersonation Detection
Infinity ERM continuously monitors social media channels and both official and unofficial mobile app stores to detect impersonation of your brands and executives.

Customers can predetermine which brand names, product names, applications, and personnel they would like to protect. Infinity ERM then monitors for impersonation of those priority assets and generates an alert in real-time if a threat is detected.
icon
Phishing Beacon
The Infinity ERM Phishing Beacon is an obfuscated script that you embed in your organization’s web properties. If bad actors create a clone of one of your pages, the Phishing Beacon sends a signal back to the Infinity ERM solution the moment the malicious replica is published online.

This enables you to proactively takedown the threat before the attack develops and causes damage.
3
Threat Intel Data Lake: A Deep and Dark Web Search Engine
The Cyberint Argos platform continuously collects mass quantities of data from the open, deep and dark web. All intelligence items collected are aggregated into a data lake, which can be filtered and queried by source, threat category, risk level, language, date, and more.

Complex queries can be saved to trigger automatic alerts, acting as an early warning system and helping you to get ahead of evolving threats.
icon
Data Leak & Fraud Detection
Infinity ERM continuously collects intelligence from thousands of sources across the deep and dark web. By automating the process of gaining access to closed threat actors chat groups and forums, Infinity ERM gives customers extensive real-time visibility on relevant threats hiding in the darkest corners of the web. This results in automatic detection of fraudulent activity and data leaks across the web.
icon
Global Threat Intelligence Knowledgebase
The Infinity ERM Threat Intelligence Knowledgebase provides a library of data on threat groups, malware, and documented CVEs.

Customers can filter their threat landscape by industry and region, drill down on the attacks they are most likely to face, and access relevant data—such as common tactics, techniques, and procedures (TTPs) and indicators of compromise (IoCs)—enabling more proactive cyber defenses.
icon
Supply Chain Intelligence Module (number of monitored vendors)
The Infinity External Risk Management solution’s Supply Chain Intelligence Module continuously discovers your vendors and technologies, monitors and evaluates their exposures, and issues alerts on major risks and breaches.

Stay secure with targeted alerts that notify you when a trusted third-party organization falls victim to an attack.
10
Managed Service – Dedicated CTI Expert for Alert Triage & Enrichment
Infinity ERM managed services help your team save time and reduce cyber risk, maximizing the value of your ERM deployment. An assigned analyst triages and enriches alerts, provides expert insights and recommendations, and directly supports your team.

This reduces your team’s workload, accelerating response and remediation activities while freeing up time to focus on other priority projects.
icon
Managed Service – Proactive Threat Hunting by CTI Expert
yber threat intelligence analyst with regional experience and knowledge to act as an extension of your team.

The analyst will proactively hunt for relevant threats and potential risks, including major attack campaigns that have affected organizations similar to yours, recent breaches in your region or sector, and evolving TTPs to be aware of.
icon
Managed Service – Guaranteed SLA For Cyber Incidents
The Infinity ERM global support team provides 24×7 support while cyber experts conduct investigations, produce custom reports, and takedown malicious content.

Infinity ERM Complete Package customers are guaranteed a response to a request for assistance within 24 hours, while Infinity ERM Elite customers are guaranteed a reply within 4 hours.
4 hours
Number of Users
All Infinity ERM products and packages come with a number of user seats by default, with one or more users in every environment having elevated administrative privileges.

Infinity ERM supports Single Sign On (SSO) with Okta, Google Workspace, Azure AD & OneLogin to allow secure log-in without the need for username and password input from the end-user.
8
Number of Threat Hunting Users
Infinity ERM Threat Hunting users gain access to a suite of modules to support the research, investigation, and hunting of cyber threats.

These capabilities help you understand your threat landscape and the specific risks you face, enabling you to proactively defend against probable threats, investigate incidents after an attack has been detected, and uncover hidden threats that bypassed existing security controls.
1
Cyberint Coins for Takedowns & Investigations
Check Point Coins can be used to initiate takedowns of illegal content, dark web investigations, custom threat reports, and more.

Takedowns can be completed for malicious use of trademarked brand names and logos, fraudulent social media profiles, publication of proprietary data, and more. Investigations can be conducted on specific threat actors or groups, malware families, attack campaigns, and other relevant risks.
400
External Attack Surface Management
The Infinity ERM Attack Surface Management Module continuously discovers your organization’s digital footprint, creating a complete asset inventory and providing visibility on your Internet-facing digital assets.

The ASM module then identifies security vulnerabilities and exposures, assesses the risk of each one, and assigns risk scores to simplify prioritization and accelerate remediation.
icon
icon
icon
icon
Domain & Phishing Protection
Infinity ERM provides comprehensive and proactive protection from phishing attacks. From lookalike domain monitoring to the detection of websites that illegally use trademarked brand names and logos, Infinity ERM mitigates phishing risks from end to end.

Upon detection by Infinity ERM, customers can quickly request a takedown of malicious content, such as phishing and brand abuse sites, from within the product.
icon
icon
icon
icon
Leaked Credentials Detection & Account Takeover Monitoring
Infinity ERM collects tens of millions of exposed credentials each month from across the open, deep and dark web.

This includes credentials harvested by InfoStealers and sent back to C2 servers in malware logs, credentials put up for sale on illegal marketplaces, credentials dumped on data leak sites or cybercrime forums, and more.

Prevent account takeovers of both employees and customers with Infinity ERM.
icon
icon
icon
icon
Cybersecurity News Feed & Ransomware Watch
Infinity ERM provides a series of features to help your team keep pace with the breakneck speed of the InfoSec world.

This includes an aggregated news feed with the latest articles from top cybersecurity publications; a news bulletin that provides quick summaries of breaking news items in just 2 to 3 sentences; and proprietary threat intelligence reports published by the Infinity ERM research team.
icon
icon
icon
icon
Social Media Monitoring for Brand & VIP Impersonation Detection
Infinity ERM continuously monitors social media channels and both official and unofficial mobile app stores to detect impersonation of your brands and executives.

Customers can predetermine which brand names, product names, applications, and personnel they would like to protect. Infinity ERM then monitors for impersonation of those priority assets and generates an alert in real-time if a threat is detected.
icon
icon
icon
icon
Phishing Beacon
The Infinity ERM Phishing Beacon is an obfuscated script that you embed in your organization’s web properties. If bad actors create a clone of one of your pages, the Phishing Beacon sends a signal back to the Infinity ERM solution the moment the malicious replica is published online.

This enables you to proactively takedown the threat before the attack develops and causes damage.
icon
1
1
3
Threat Intel Data Lake: A Deep and Dark Web Search Engine
The Cyberint Argos platform continuously collects mass quantities of data from the open, deep and dark web. All intelligence items collected are aggregated into a data lake, which can be filtered and queried by source, threat category, risk level, language, date, and more.

Complex queries can be saved to trigger automatic alerts, acting as an early warning system and helping you to get ahead of evolving threats.
icon
icon
icon
icon
Data Leak & Fraud Detection
Infinity ERM continuously collects intelligence from thousands of sources across the deep and dark web. By automating the process of gaining access to closed threat actors chat groups and forums, Infinity ERM gives customers extensive real-time visibility on relevant threats hiding in the darkest corners of the web. This results in automatic detection of fraudulent activity and data leaks across the web.
icon
icon
icon
icon
Global Threat Intelligence Knowledgebase
The Infinity ERM Threat Intelligence Knowledgebase provides a library of data on threat groups, malware, and documented CVEs.

Customers can filter their threat landscape by industry and region, drill down on the attacks they are most likely to face, and access relevant data—such as common tactics, techniques, and procedures (TTPs) and indicators of compromise (IoCs)—enabling more proactive cyber defenses.
icon
icon
icon
icon
Supply Chain Intelligence Module (number of monitored vendors)
The Infinity External Risk Management solution’s Supply Chain Intelligence Module continuously discovers your vendors and technologies, monitors and evaluates their exposures, and issues alerts on major risks and breaches.

Stay secure with targeted alerts that notify you when a trusted third-party organization falls victim to an attack.
icon
3
5
10
Managed Service – Dedicated CTI Expert for Alert Triage & Enrichment
Infinity ERM managed services help your team save time and reduce cyber risk, maximizing the value of your ERM deployment. An assigned analyst triages and enriches alerts, provides expert insights and recommendations, and directly supports your team.

This reduces your team’s workload, accelerating response and remediation activities while freeing up time to focus on other priority projects.
icon
icon
icon
icon
Managed Service – Proactive Threat Hunting by CTI Expert
yber threat intelligence analyst with regional experience and knowledge to act as an extension of your team.

The analyst will proactively hunt for relevant threats and potential risks, including major attack campaigns that have affected organizations similar to yours, recent breaches in your region or sector, and evolving TTPs to be aware of.
icon
icon
icon
icon
Managed Service – Guaranteed SLA For Cyber Incidents
The Infinity ERM global support team provides 24×7 support while cyber experts conduct investigations, produce custom reports, and takedown malicious content.

Infinity ERM Complete Package customers are guaranteed a response to a request for assistance within 24 hours, while Infinity ERM Elite customers are guaranteed a reply within 4 hours.
icon
icon
24 hours
4 hours
Number of Users
All Infinity ERM products and packages come with a number of user seats by default, with one or more users in every environment having elevated administrative privileges.

Infinity ERM supports Single Sign On (SSO) with Okta, Google Workspace, Azure AD & OneLogin to allow secure log-in without the need for username and password input from the end-user.
1
3
5
8
Number of Threat Hunting Users
Infinity ERM Threat Hunting users gain access to a suite of modules to support the research, investigation, and hunting of cyber threats.

These capabilities help you understand your threat landscape and the specific risks you face, enabling you to proactively defend against probable threats, investigate incidents after an attack has been detected, and uncover hidden threats that bypassed existing security controls.
icon
icon
icon
1
Cyberint Coins for Takedowns & Investigations
Check Point Coins can be used to initiate takedowns of illegal content, dark web investigations, custom threat reports, and more.

Takedowns can be completed for malicious use of trademarked brand names and logos, fraudulent social media profiles, publication of proprietary data, and more. Investigations can be conducted on specific threat actors or groups, malware families, attack campaigns, and other relevant risks.
20
100
250
400
Speak to Sales Get a Quote

Why work with Infinity ERM

Scalable, Multi-tenant Architecture
Create and manage as many tenants as you need from a single instance. Gain a comprehensive overview of all your accounts from one tenant to streamline workflows and save time.
Independent Tenant & Asset Management
Generate new tenants for customized demos and POCs autonomously, without the need for a lengthy approval process. Create and manage new assets for any client and adjust monitoring statuses as needed.
Market-Leading Technology To Fuel Growth
Protect your clients and grow your business with the recognized leader in External Risk Management. Receive significant discounts that continue to increase as you close more deals and grow with Cyberint.

Talk to an Expert

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start