Pricing
Infinity ERM Packages Overview
Check Point’s Infinity External Risk Management (Cyberint) solution fuses threat intelligence with brand protection and external attack surface management, alongside expert analysts who utilize powerful intelligence capabilities and forensic tools to fully investigate and respond to sophisticated attacks before they can have an adverse impact on your organization.
Speak to Sales Get a Quote
Essential
External Attack Surface Management
The Infinity ERM Attack Surface Management Module continuously discovers your organization’s digital footprint, creating a complete asset inventory and providing visibility on your Internet-facing digital assets.
The ASM module then identifies security vulnerabilities and exposures, assesses the risk of each one, and assigns risk scores to simplify prioritization and accelerate remediation.
The ASM module then identifies security vulnerabilities and exposures, assesses the risk of each one, and assigns risk scores to simplify prioritization and accelerate remediation.
Domain & Phishing Protection
Infinity ERM provides comprehensive and proactive protection from phishing attacks. From lookalike domain monitoring to the detection of websites that illegally use trademarked brand names and logos, Infinity ERM mitigates phishing risks from end to end.
Upon detection by Infinity ERM, customers can quickly request a takedown of malicious content, such as phishing and brand abuse sites, from within the product.
Upon detection by Infinity ERM, customers can quickly request a takedown of malicious content, such as phishing and brand abuse sites, from within the product.
Leaked Credentials Detection & Account Takeover Monitoring
Infinity ERM collects tens of millions of exposed credentials each month from across the open, deep and dark web.
This includes credentials harvested by InfoStealers and sent back to C2 servers in malware logs, credentials put up for sale on illegal marketplaces, credentials dumped on data leak sites or cybercrime forums, and more.
Prevent account takeovers of both employees and customers with Infinity ERM.
This includes credentials harvested by InfoStealers and sent back to C2 servers in malware logs, credentials put up for sale on illegal marketplaces, credentials dumped on data leak sites or cybercrime forums, and more.
Prevent account takeovers of both employees and customers with Infinity ERM.
Cybersecurity News Feed & Ransomware Watch
Infinity ERM provides a series of features to help your team keep pace with the breakneck speed of the InfoSec world.
This includes an aggregated news feed with the latest articles from top cybersecurity publications; a news bulletin that provides quick summaries of breaking news items in just 2 to 3 sentences; and proprietary threat intelligence reports published by the Infinity ERM research team.
This includes an aggregated news feed with the latest articles from top cybersecurity publications; a news bulletin that provides quick summaries of breaking news items in just 2 to 3 sentences; and proprietary threat intelligence reports published by the Infinity ERM research team.
Number of Users
All Infinity ERM products and packages come with a number of user seats by default, with one or more users in every environment having elevated administrative privileges.
Infinity ERM supports Single Sign On (SSO) with Okta, Google Workspace, Azure AD & OneLogin to allow secure log-in without the need for username and password input from the end-user.
Infinity ERM supports Single Sign On (SSO) with Okta, Google Workspace, Azure AD & OneLogin to allow secure log-in without the need for username and password input from the end-user.
1
Cyberint Coins for Takedowns & Investigations
Check Point Coins can be used to initiate takedowns of illegal content, dark web investigations, custom threat reports, and more.
Takedowns can be completed for malicious use of trademarked brand names and logos, fraudulent social media profiles, publication of proprietary data, and more. Investigations can be conducted on specific threat actors or groups, malware families, attack campaigns, and other relevant risks.
Takedowns can be completed for malicious use of trademarked brand names and logos, fraudulent social media profiles, publication of proprietary data, and more. Investigations can be conducted on specific threat actors or groups, malware families, attack campaigns, and other relevant risks.
20
Advanced
External Attack Surface Management
The Infinity ERM Attack Surface Management Module continuously discovers your organization’s digital footprint, creating a complete asset inventory and providing visibility on your Internet-facing digital assets.
The ASM module then identifies security vulnerabilities and exposures, assesses the risk of each one, and assigns risk scores to simplify prioritization and accelerate remediation.
The ASM module then identifies security vulnerabilities and exposures, assesses the risk of each one, and assigns risk scores to simplify prioritization and accelerate remediation.
Domain & Phishing Protection
Infinity ERM provides comprehensive and proactive protection from phishing attacks. From lookalike domain monitoring to the detection of websites that illegally use trademarked brand names and logos, Infinity ERM mitigates phishing risks from end to end.
Upon detection by Infinity ERM, customers can quickly request a takedown of malicious content, such as phishing and brand abuse sites, from within the product.
Upon detection by Infinity ERM, customers can quickly request a takedown of malicious content, such as phishing and brand abuse sites, from within the product.
Leaked Credentials Detection & Account Takeover Monitoring
Infinity ERM collects tens of millions of exposed credentials each month from across the open, deep and dark web.
This includes credentials harvested by InfoStealers and sent back to C2 servers in malware logs, credentials put up for sale on illegal marketplaces, credentials dumped on data leak sites or cybercrime forums, and more.
Prevent account takeovers of both employees and customers with Infinity ERM.
This includes credentials harvested by InfoStealers and sent back to C2 servers in malware logs, credentials put up for sale on illegal marketplaces, credentials dumped on data leak sites or cybercrime forums, and more.
Prevent account takeovers of both employees and customers with Infinity ERM.
Cybersecurity News Feed & Ransomware Watch
Infinity ERM provides a series of features to help your team keep pace with the breakneck speed of the InfoSec world.
This includes an aggregated news feed with the latest articles from top cybersecurity publications; a news bulletin that provides quick summaries of breaking news items in just 2 to 3 sentences; and proprietary threat intelligence reports published by the Infinity ERM research team.
This includes an aggregated news feed with the latest articles from top cybersecurity publications; a news bulletin that provides quick summaries of breaking news items in just 2 to 3 sentences; and proprietary threat intelligence reports published by the Infinity ERM research team.
Social Media Monitoring for Brand & VIP Impersonation Detection
Infinity ERM continuously monitors social media channels and both official and unofficial mobile app stores to detect impersonation of your brands and executives.
Customers can predetermine which brand names, product names, applications, and personnel they would like to protect. Infinity ERM then monitors for impersonation of those priority assets and generates an alert in real-time if a threat is detected.
Customers can predetermine which brand names, product names, applications, and personnel they would like to protect. Infinity ERM then monitors for impersonation of those priority assets and generates an alert in real-time if a threat is detected.
Phishing Beacon
The Infinity ERM Phishing Beacon is an obfuscated script that you embed in your organization’s web properties. If bad actors create a clone of one of your pages, the Phishing Beacon sends a signal back to the Infinity ERM solution the moment the malicious replica is published online.
This enables you to proactively takedown the threat before the attack develops and causes damage.
This enables you to proactively takedown the threat before the attack develops and causes damage.
1
Threat Intel Data Lake: A Deep and Dark Web Search Engine
The Cyberint Argos platform continuously collects mass quantities of data from the open, deep and dark web. All intelligence items collected are aggregated into a data lake, which can be filtered and queried by source, threat category, risk level, language, date, and more.
Complex queries can be saved to trigger automatic alerts, acting as an early warning system and helping you to get ahead of evolving threats.
Complex queries can be saved to trigger automatic alerts, acting as an early warning system and helping you to get ahead of evolving threats.
Data Leak & Fraud Detection
Infinity ERM continuously collects intelligence from thousands of sources across the deep and dark web. By automating the process of gaining access to closed threat actors chat groups and forums, Infinity ERM gives customers extensive real-time visibility on relevant threats hiding in the darkest corners of the web. This results in automatic detection of fraudulent activity and data leaks across the web.
Global Threat Intelligence Knowledgebase
The Infinity ERM Threat Intelligence Knowledgebase provides a library of data on threat groups, malware, and documented CVEs.
Customers can filter their threat landscape by industry and region, drill down on the attacks they are most likely to face, and access relevant data—such as common tactics, techniques, and procedures (TTPs) and indicators of compromise (IoCs)—enabling more proactive cyber defenses.
Customers can filter their threat landscape by industry and region, drill down on the attacks they are most likely to face, and access relevant data—such as common tactics, techniques, and procedures (TTPs) and indicators of compromise (IoCs)—enabling more proactive cyber defenses.
Supply Chain Intelligence Module (number of monitored vendors)
The Infinity External Risk Management solution’s Supply Chain Intelligence Module continuously discovers your vendors and technologies, monitors and evaluates their exposures, and issues alerts on major risks and breaches.
Stay secure with targeted alerts that notify you when a trusted third-party organization falls victim to an attack.
Stay secure with targeted alerts that notify you when a trusted third-party organization falls victim to an attack.
3
Number of Users
All Infinity ERM products and packages come with a number of user seats by default, with one or more users in every environment having elevated administrative privileges.
Infinity ERM supports Single Sign On (SSO) with Okta, Google Workspace, Azure AD & OneLogin to allow secure log-in without the need for username and password input from the end-user.
Infinity ERM supports Single Sign On (SSO) with Okta, Google Workspace, Azure AD & OneLogin to allow secure log-in without the need for username and password input from the end-user.
3
Cyberint Coins for Takedowns & Investigations
Check Point Coins can be used to initiate takedowns of illegal content, dark web investigations, custom threat reports, and more.
Takedowns can be completed for malicious use of trademarked brand names and logos, fraudulent social media profiles, publication of proprietary data, and more. Investigations can be conducted on specific threat actors or groups, malware families, attack campaigns, and other relevant risks.
Takedowns can be completed for malicious use of trademarked brand names and logos, fraudulent social media profiles, publication of proprietary data, and more. Investigations can be conducted on specific threat actors or groups, malware families, attack campaigns, and other relevant risks.
100
Complete
External Attack Surface Management
The Infinity ERM Attack Surface Management Module continuously discovers your organization’s digital footprint, creating a complete asset inventory and providing visibility on your Internet-facing digital assets.
The ASM module then identifies security vulnerabilities and exposures, assesses the risk of each one, and assigns risk scores to simplify prioritization and accelerate remediation.
The ASM module then identifies security vulnerabilities and exposures, assesses the risk of each one, and assigns risk scores to simplify prioritization and accelerate remediation.
Domain & Phishing Protection
Infinity ERM provides comprehensive and proactive protection from phishing attacks. From lookalike domain monitoring to the detection of websites that illegally use trademarked brand names and logos, Infinity ERM mitigates phishing risks from end to end.
Upon detection by Infinity ERM, customers can quickly request a takedown of malicious content, such as phishing and brand abuse sites, from within the product.
Upon detection by Infinity ERM, customers can quickly request a takedown of malicious content, such as phishing and brand abuse sites, from within the product.
Leaked Credentials Detection & Account Takeover Monitoring
Infinity ERM collects tens of millions of exposed credentials each month from across the open, deep and dark web.
This includes credentials harvested by InfoStealers and sent back to C2 servers in malware logs, credentials put up for sale on illegal marketplaces, credentials dumped on data leak sites or cybercrime forums, and more.
Prevent account takeovers of both employees and customers with Infinity ERM.
This includes credentials harvested by InfoStealers and sent back to C2 servers in malware logs, credentials put up for sale on illegal marketplaces, credentials dumped on data leak sites or cybercrime forums, and more.
Prevent account takeovers of both employees and customers with Infinity ERM.
Cybersecurity News Feed & Ransomware Watch
Infinity ERM provides a series of features to help your team keep pace with the breakneck speed of the InfoSec world.
This includes an aggregated news feed with the latest articles from top cybersecurity publications; a news bulletin that provides quick summaries of breaking news items in just 2 to 3 sentences; and proprietary threat intelligence reports published by the Infinity ERM research team.
This includes an aggregated news feed with the latest articles from top cybersecurity publications; a news bulletin that provides quick summaries of breaking news items in just 2 to 3 sentences; and proprietary threat intelligence reports published by the Infinity ERM research team.
Social Media Monitoring for Brand & VIP Impersonation Detection
Infinity ERM continuously monitors social media channels and both official and unofficial mobile app stores to detect impersonation of your brands and executives.
Customers can predetermine which brand names, product names, applications, and personnel they would like to protect. Infinity ERM then monitors for impersonation of those priority assets and generates an alert in real-time if a threat is detected.
Customers can predetermine which brand names, product names, applications, and personnel they would like to protect. Infinity ERM then monitors for impersonation of those priority assets and generates an alert in real-time if a threat is detected.
Phishing Beacon
The Infinity ERM Phishing Beacon is an obfuscated script that you embed in your organization’s web properties. If bad actors create a clone of one of your pages, the Phishing Beacon sends a signal back to the Infinity ERM solution the moment the malicious replica is published online.
This enables you to proactively takedown the threat before the attack develops and causes damage.
This enables you to proactively takedown the threat before the attack develops and causes damage.
1
Threat Intel Data Lake: A Deep and Dark Web Search Engine
The Cyberint Argos platform continuously collects mass quantities of data from the open, deep and dark web. All intelligence items collected are aggregated into a data lake, which can be filtered and queried by source, threat category, risk level, language, date, and more.
Complex queries can be saved to trigger automatic alerts, acting as an early warning system and helping you to get ahead of evolving threats.
Complex queries can be saved to trigger automatic alerts, acting as an early warning system and helping you to get ahead of evolving threats.
Data Leak & Fraud Detection
Infinity ERM continuously collects intelligence from thousands of sources across the deep and dark web. By automating the process of gaining access to closed threat actors chat groups and forums, Infinity ERM gives customers extensive real-time visibility on relevant threats hiding in the darkest corners of the web. This results in automatic detection of fraudulent activity and data leaks across the web.
Global Threat Intelligence Knowledgebase
The Infinity ERM Threat Intelligence Knowledgebase provides a library of data on threat groups, malware, and documented CVEs.
Customers can filter their threat landscape by industry and region, drill down on the attacks they are most likely to face, and access relevant data—such as common tactics, techniques, and procedures (TTPs) and indicators of compromise (IoCs)—enabling more proactive cyber defenses.
Customers can filter their threat landscape by industry and region, drill down on the attacks they are most likely to face, and access relevant data—such as common tactics, techniques, and procedures (TTPs) and indicators of compromise (IoCs)—enabling more proactive cyber defenses.
Supply Chain Intelligence Module (number of monitored vendors)
The Infinity External Risk Management solution’s Supply Chain Intelligence Module continuously discovers your vendors and technologies, monitors and evaluates their exposures, and issues alerts on major risks and breaches.
Stay secure with targeted alerts that notify you when a trusted third-party organization falls victim to an attack.
Stay secure with targeted alerts that notify you when a trusted third-party organization falls victim to an attack.
5
Managed Service – Dedicated CTI Expert for Alert Triage & Enrichment
Infinity ERM managed services help your team save time and reduce cyber risk, maximizing the value of your ERM deployment. An assigned analyst triages and enriches alerts, provides expert insights and recommendations, and directly supports your team.
This reduces your team’s workload, accelerating response and remediation activities while freeing up time to focus on other priority projects.
This reduces your team’s workload, accelerating response and remediation activities while freeing up time to focus on other priority projects.
Managed Service – Guaranteed SLA For Cyber Incidents
The Infinity ERM global support team provides 24×7 support while cyber experts conduct investigations, produce custom reports, and takedown malicious content.
Infinity ERM Complete Package customers are guaranteed a response to a request for assistance within 24 hours, while Infinity ERM Elite customers are guaranteed a reply within 4 hours.
Infinity ERM Complete Package customers are guaranteed a response to a request for assistance within 24 hours, while Infinity ERM Elite customers are guaranteed a reply within 4 hours.
24 hours
Number of Users
All Infinity ERM products and packages come with a number of user seats by default, with one or more users in every environment having elevated administrative privileges.
Infinity ERM supports Single Sign On (SSO) with Okta, Google Workspace, Azure AD & OneLogin to allow secure log-in without the need for username and password input from the end-user.
Infinity ERM supports Single Sign On (SSO) with Okta, Google Workspace, Azure AD & OneLogin to allow secure log-in without the need for username and password input from the end-user.
5
Cyberint Coins for Takedowns & Investigations
Check Point Coins can be used to initiate takedowns of illegal content, dark web investigations, custom threat reports, and more.
Takedowns can be completed for malicious use of trademarked brand names and logos, fraudulent social media profiles, publication of proprietary data, and more. Investigations can be conducted on specific threat actors or groups, malware families, attack campaigns, and other relevant risks.
Takedowns can be completed for malicious use of trademarked brand names and logos, fraudulent social media profiles, publication of proprietary data, and more. Investigations can be conducted on specific threat actors or groups, malware families, attack campaigns, and other relevant risks.
250
Elite
External Attack Surface Management
The Infinity ERM Attack Surface Management Module continuously discovers your organization’s digital footprint, creating a complete asset inventory and providing visibility on your Internet-facing digital assets.
The ASM module then identifies security vulnerabilities and exposures, assesses the risk of each one, and assigns risk scores to simplify prioritization and accelerate remediation.
The ASM module then identifies security vulnerabilities and exposures, assesses the risk of each one, and assigns risk scores to simplify prioritization and accelerate remediation.
Domain & Phishing Protection
Infinity ERM provides comprehensive and proactive protection from phishing attacks. From lookalike domain monitoring to the detection of websites that illegally use trademarked brand names and logos, Infinity ERM mitigates phishing risks from end to end.
Upon detection by Infinity ERM, customers can quickly request a takedown of malicious content, such as phishing and brand abuse sites, from within the product.
Upon detection by Infinity ERM, customers can quickly request a takedown of malicious content, such as phishing and brand abuse sites, from within the product.
Leaked Credentials Detection & Account Takeover Monitoring
Infinity ERM collects tens of millions of exposed credentials each month from across the open, deep and dark web.
This includes credentials harvested by InfoStealers and sent back to C2 servers in malware logs, credentials put up for sale on illegal marketplaces, credentials dumped on data leak sites or cybercrime forums, and more.
Prevent account takeovers of both employees and customers with Infinity ERM.
This includes credentials harvested by InfoStealers and sent back to C2 servers in malware logs, credentials put up for sale on illegal marketplaces, credentials dumped on data leak sites or cybercrime forums, and more.
Prevent account takeovers of both employees and customers with Infinity ERM.
Cybersecurity News Feed & Ransomware Watch
Infinity ERM provides a series of features to help your team keep pace with the breakneck speed of the InfoSec world.
This includes an aggregated news feed with the latest articles from top cybersecurity publications; a news bulletin that provides quick summaries of breaking news items in just 2 to 3 sentences; and proprietary threat intelligence reports published by the Infinity ERM research team.
This includes an aggregated news feed with the latest articles from top cybersecurity publications; a news bulletin that provides quick summaries of breaking news items in just 2 to 3 sentences; and proprietary threat intelligence reports published by the Infinity ERM research team.
Social Media Monitoring for Brand & VIP Impersonation Detection
Infinity ERM continuously monitors social media channels and both official and unofficial mobile app stores to detect impersonation of your brands and executives.
Customers can predetermine which brand names, product names, applications, and personnel they would like to protect. Infinity ERM then monitors for impersonation of those priority assets and generates an alert in real-time if a threat is detected.
Customers can predetermine which brand names, product names, applications, and personnel they would like to protect. Infinity ERM then monitors for impersonation of those priority assets and generates an alert in real-time if a threat is detected.
Phishing Beacon
The Infinity ERM Phishing Beacon is an obfuscated script that you embed in your organization’s web properties. If bad actors create a clone of one of your pages, the Phishing Beacon sends a signal back to the Infinity ERM solution the moment the malicious replica is published online.
This enables you to proactively takedown the threat before the attack develops and causes damage.
This enables you to proactively takedown the threat before the attack develops and causes damage.
3
Threat Intel Data Lake: A Deep and Dark Web Search Engine
The Cyberint Argos platform continuously collects mass quantities of data from the open, deep and dark web. All intelligence items collected are aggregated into a data lake, which can be filtered and queried by source, threat category, risk level, language, date, and more.
Complex queries can be saved to trigger automatic alerts, acting as an early warning system and helping you to get ahead of evolving threats.
Complex queries can be saved to trigger automatic alerts, acting as an early warning system and helping you to get ahead of evolving threats.
Data Leak & Fraud Detection
Infinity ERM continuously collects intelligence from thousands of sources across the deep and dark web. By automating the process of gaining access to closed threat actors chat groups and forums, Infinity ERM gives customers extensive real-time visibility on relevant threats hiding in the darkest corners of the web. This results in automatic detection of fraudulent activity and data leaks across the web.
Global Threat Intelligence Knowledgebase
The Infinity ERM Threat Intelligence Knowledgebase provides a library of data on threat groups, malware, and documented CVEs.
Customers can filter their threat landscape by industry and region, drill down on the attacks they are most likely to face, and access relevant data—such as common tactics, techniques, and procedures (TTPs) and indicators of compromise (IoCs)—enabling more proactive cyber defenses.
Customers can filter their threat landscape by industry and region, drill down on the attacks they are most likely to face, and access relevant data—such as common tactics, techniques, and procedures (TTPs) and indicators of compromise (IoCs)—enabling more proactive cyber defenses.
Supply Chain Intelligence Module (number of monitored vendors)
The Infinity External Risk Management solution’s Supply Chain Intelligence Module continuously discovers your vendors and technologies, monitors and evaluates their exposures, and issues alerts on major risks and breaches.
Stay secure with targeted alerts that notify you when a trusted third-party organization falls victim to an attack.
Stay secure with targeted alerts that notify you when a trusted third-party organization falls victim to an attack.
10
Managed Service – Dedicated CTI Expert for Alert Triage & Enrichment
Infinity ERM managed services help your team save time and reduce cyber risk, maximizing the value of your ERM deployment. An assigned analyst triages and enriches alerts, provides expert insights and recommendations, and directly supports your team.
This reduces your team’s workload, accelerating response and remediation activities while freeing up time to focus on other priority projects.
This reduces your team’s workload, accelerating response and remediation activities while freeing up time to focus on other priority projects.
Managed Service – Proactive Threat Hunting by CTI Expert
yber threat intelligence analyst with regional experience and knowledge to act as an extension of your team.
The analyst will proactively hunt for relevant threats and potential risks, including major attack campaigns that have affected organizations similar to yours, recent breaches in your region or sector, and evolving TTPs to be aware of.
The analyst will proactively hunt for relevant threats and potential risks, including major attack campaigns that have affected organizations similar to yours, recent breaches in your region or sector, and evolving TTPs to be aware of.
Managed Service – Guaranteed SLA For Cyber Incidents
The Infinity ERM global support team provides 24×7 support while cyber experts conduct investigations, produce custom reports, and takedown malicious content.
Infinity ERM Complete Package customers are guaranteed a response to a request for assistance within 24 hours, while Infinity ERM Elite customers are guaranteed a reply within 4 hours.
Infinity ERM Complete Package customers are guaranteed a response to a request for assistance within 24 hours, while Infinity ERM Elite customers are guaranteed a reply within 4 hours.
4 hours
Number of Users
All Infinity ERM products and packages come with a number of user seats by default, with one or more users in every environment having elevated administrative privileges.
Infinity ERM supports Single Sign On (SSO) with Okta, Google Workspace, Azure AD & OneLogin to allow secure log-in without the need for username and password input from the end-user.
Infinity ERM supports Single Sign On (SSO) with Okta, Google Workspace, Azure AD & OneLogin to allow secure log-in without the need for username and password input from the end-user.
8
Number of Threat Hunting Users
Infinity ERM Threat Hunting users gain access to a suite of modules to support the research, investigation, and hunting of cyber threats.
These capabilities help you understand your threat landscape and the specific risks you face, enabling you to proactively defend against probable threats, investigate incidents after an attack has been detected, and uncover hidden threats that bypassed existing security controls.
These capabilities help you understand your threat landscape and the specific risks you face, enabling you to proactively defend against probable threats, investigate incidents after an attack has been detected, and uncover hidden threats that bypassed existing security controls.
1
Cyberint Coins for Takedowns & Investigations
Check Point Coins can be used to initiate takedowns of illegal content, dark web investigations, custom threat reports, and more.
Takedowns can be completed for malicious use of trademarked brand names and logos, fraudulent social media profiles, publication of proprietary data, and more. Investigations can be conducted on specific threat actors or groups, malware families, attack campaigns, and other relevant risks.
Takedowns can be completed for malicious use of trademarked brand names and logos, fraudulent social media profiles, publication of proprietary data, and more. Investigations can be conducted on specific threat actors or groups, malware families, attack campaigns, and other relevant risks.
400
External Attack Surface Management
The Infinity ERM Attack Surface Management Module continuously discovers your organization’s digital footprint, creating a complete asset inventory and providing visibility on your Internet-facing digital assets.
The ASM module then identifies security vulnerabilities and exposures, assesses the risk of each one, and assigns risk scores to simplify prioritization and accelerate remediation.
The ASM module then identifies security vulnerabilities and exposures, assesses the risk of each one, and assigns risk scores to simplify prioritization and accelerate remediation.
Domain & Phishing Protection
Infinity ERM provides comprehensive and proactive protection from phishing attacks. From lookalike domain monitoring to the detection of websites that illegally use trademarked brand names and logos, Infinity ERM mitigates phishing risks from end to end.
Upon detection by Infinity ERM, customers can quickly request a takedown of malicious content, such as phishing and brand abuse sites, from within the product.
Upon detection by Infinity ERM, customers can quickly request a takedown of malicious content, such as phishing and brand abuse sites, from within the product.
Leaked Credentials Detection & Account Takeover Monitoring
Infinity ERM collects tens of millions of exposed credentials each month from across the open, deep and dark web.
This includes credentials harvested by InfoStealers and sent back to C2 servers in malware logs, credentials put up for sale on illegal marketplaces, credentials dumped on data leak sites or cybercrime forums, and more.
Prevent account takeovers of both employees and customers with Infinity ERM.
This includes credentials harvested by InfoStealers and sent back to C2 servers in malware logs, credentials put up for sale on illegal marketplaces, credentials dumped on data leak sites or cybercrime forums, and more.
Prevent account takeovers of both employees and customers with Infinity ERM.
Cybersecurity News Feed & Ransomware Watch
Infinity ERM provides a series of features to help your team keep pace with the breakneck speed of the InfoSec world.
This includes an aggregated news feed with the latest articles from top cybersecurity publications; a news bulletin that provides quick summaries of breaking news items in just 2 to 3 sentences; and proprietary threat intelligence reports published by the Infinity ERM research team.
This includes an aggregated news feed with the latest articles from top cybersecurity publications; a news bulletin that provides quick summaries of breaking news items in just 2 to 3 sentences; and proprietary threat intelligence reports published by the Infinity ERM research team.
Social Media Monitoring for Brand & VIP Impersonation Detection
Infinity ERM continuously monitors social media channels and both official and unofficial mobile app stores to detect impersonation of your brands and executives.
Customers can predetermine which brand names, product names, applications, and personnel they would like to protect. Infinity ERM then monitors for impersonation of those priority assets and generates an alert in real-time if a threat is detected.
Customers can predetermine which brand names, product names, applications, and personnel they would like to protect. Infinity ERM then monitors for impersonation of those priority assets and generates an alert in real-time if a threat is detected.
Phishing Beacon
The Infinity ERM Phishing Beacon is an obfuscated script that you embed in your organization’s web properties. If bad actors create a clone of one of your pages, the Phishing Beacon sends a signal back to the Infinity ERM solution the moment the malicious replica is published online.
This enables you to proactively takedown the threat before the attack develops and causes damage.
This enables you to proactively takedown the threat before the attack develops and causes damage.
1
1
3
Threat Intel Data Lake: A Deep and Dark Web Search Engine
The Cyberint Argos platform continuously collects mass quantities of data from the open, deep and dark web. All intelligence items collected are aggregated into a data lake, which can be filtered and queried by source, threat category, risk level, language, date, and more.
Complex queries can be saved to trigger automatic alerts, acting as an early warning system and helping you to get ahead of evolving threats.
Complex queries can be saved to trigger automatic alerts, acting as an early warning system and helping you to get ahead of evolving threats.
Data Leak & Fraud Detection
Infinity ERM continuously collects intelligence from thousands of sources across the deep and dark web. By automating the process of gaining access to closed threat actors chat groups and forums, Infinity ERM gives customers extensive real-time visibility on relevant threats hiding in the darkest corners of the web. This results in automatic detection of fraudulent activity and data leaks across the web.
Global Threat Intelligence Knowledgebase
The Infinity ERM Threat Intelligence Knowledgebase provides a library of data on threat groups, malware, and documented CVEs.
Customers can filter their threat landscape by industry and region, drill down on the attacks they are most likely to face, and access relevant data—such as common tactics, techniques, and procedures (TTPs) and indicators of compromise (IoCs)—enabling more proactive cyber defenses.
Customers can filter their threat landscape by industry and region, drill down on the attacks they are most likely to face, and access relevant data—such as common tactics, techniques, and procedures (TTPs) and indicators of compromise (IoCs)—enabling more proactive cyber defenses.
Supply Chain Intelligence Module (number of monitored vendors)
The Infinity External Risk Management solution’s Supply Chain Intelligence Module continuously discovers your vendors and technologies, monitors and evaluates their exposures, and issues alerts on major risks and breaches.
Stay secure with targeted alerts that notify you when a trusted third-party organization falls victim to an attack.
Stay secure with targeted alerts that notify you when a trusted third-party organization falls victim to an attack.
3
5
10
Managed Service – Dedicated CTI Expert for Alert Triage & Enrichment
Infinity ERM managed services help your team save time and reduce cyber risk, maximizing the value of your ERM deployment. An assigned analyst triages and enriches alerts, provides expert insights and recommendations, and directly supports your team.
This reduces your team’s workload, accelerating response and remediation activities while freeing up time to focus on other priority projects.
This reduces your team’s workload, accelerating response and remediation activities while freeing up time to focus on other priority projects.
Managed Service – Proactive Threat Hunting by CTI Expert
yber threat intelligence analyst with regional experience and knowledge to act as an extension of your team.
The analyst will proactively hunt for relevant threats and potential risks, including major attack campaigns that have affected organizations similar to yours, recent breaches in your region or sector, and evolving TTPs to be aware of.
The analyst will proactively hunt for relevant threats and potential risks, including major attack campaigns that have affected organizations similar to yours, recent breaches in your region or sector, and evolving TTPs to be aware of.
Managed Service – Guaranteed SLA For Cyber Incidents
The Infinity ERM global support team provides 24×7 support while cyber experts conduct investigations, produce custom reports, and takedown malicious content.
Infinity ERM Complete Package customers are guaranteed a response to a request for assistance within 24 hours, while Infinity ERM Elite customers are guaranteed a reply within 4 hours.
Infinity ERM Complete Package customers are guaranteed a response to a request for assistance within 24 hours, while Infinity ERM Elite customers are guaranteed a reply within 4 hours.
24 hours
4 hours
Number of Users
All Infinity ERM products and packages come with a number of user seats by default, with one or more users in every environment having elevated administrative privileges.
Infinity ERM supports Single Sign On (SSO) with Okta, Google Workspace, Azure AD & OneLogin to allow secure log-in without the need for username and password input from the end-user.
Infinity ERM supports Single Sign On (SSO) with Okta, Google Workspace, Azure AD & OneLogin to allow secure log-in without the need for username and password input from the end-user.
1
3
5
8
Number of Threat Hunting Users
Infinity ERM Threat Hunting users gain access to a suite of modules to support the research, investigation, and hunting of cyber threats.
These capabilities help you understand your threat landscape and the specific risks you face, enabling you to proactively defend against probable threats, investigate incidents after an attack has been detected, and uncover hidden threats that bypassed existing security controls.
These capabilities help you understand your threat landscape and the specific risks you face, enabling you to proactively defend against probable threats, investigate incidents after an attack has been detected, and uncover hidden threats that bypassed existing security controls.
1
Cyberint Coins for Takedowns & Investigations
Check Point Coins can be used to initiate takedowns of illegal content, dark web investigations, custom threat reports, and more.
Takedowns can be completed for malicious use of trademarked brand names and logos, fraudulent social media profiles, publication of proprietary data, and more. Investigations can be conducted on specific threat actors or groups, malware families, attack campaigns, and other relevant risks.
Takedowns can be completed for malicious use of trademarked brand names and logos, fraudulent social media profiles, publication of proprietary data, and more. Investigations can be conducted on specific threat actors or groups, malware families, attack campaigns, and other relevant risks.
20
100
250
400