Listing Thumbnail

    Check Point - External Risk Management (Cyberint)

     Info
    Deployed on AWS
    The Cyberint Argos platform is a unified external cyber risk management solution that continuously detects and mitigates a broad range of threats. With a focus on impactful intelligence and efficiency, Cyberint saves your team time and helps you mitigate external cyber risks before they develop into costly incidents.
    4.6

    Overview

    Play video

    Cyberint is a cloud-based SaaS solution that continuously and proactively reduces cyber risk. By combining threat intelligence, deep and dark web monitoring, external attack surface management, digital risk protection, and supply chain intelligence into a single holistic solution, the Argos platform provides protection against a broad scope of external cyber risks while maintaining a low total cost of ownership and ensuring substantial value.

    Key Benefits: Continuously monitor, detect, prioritize, and mitigate a wide array of external cyber risks. Gain visibility on exposures in your attack surface as well as relevant threats on the deep and dark web. Protect your organization, brands, domains, and executives against malicious impersonation attacks. Support your team with managed services from Cyberints nation-state level cybersecurity experts. Maximize security spend with a low-touch platform engineered for efficiency and simplicity of use. Consume alerts in the platform or within your existing security stack via integrations and REST APIs.

    Highlights

    • Cyberint Attack Surface Monitoring provides a real-time view of an organizations external digital footprint, detecting vulnerabilities and exposed assets across websites, networks, and cloud environments. It continuously identifies risky misconfigurations and unknown assets that could be exploited by attackers. With integrated threat intelligence and actionable insights, it empowers security teams to prioritize and remediate risks effectively, reducing overall exposure to cyber threats.
    • Cyberint Targeted Threat Intelligence delivers actionable insights focused on threats specific to an organizations industry, assets, and digital footprint. By monitoring surface, deep, and dark web sources, it identifies potential attacks, compromised data, and indicators of targeting by known threat actors. This intelligence enables organizations to stay ahead of emerging threats, prioritize responses, and better protect critical assets.
    • Cyberint Digital Risk Protection safeguards organizations by identifying and mitigating risks across their digital footprint, including social media, online marketplaces, and the dark web. It detects threats such as brand impersonation, data leakage, and fraudulent activities, enabling quick action to prevent reputational and financial harm.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Check Point - External Risk Management (Cyberint)

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    Complete_1K
    External Risk Management Complete package- A managed service package that include multiple modules: High cadence Attack Surface Discovery and Exposure scanning, Targeted & Global Threat Intelligence, Darkweb monitoring, Brand and Impersonation protection, Phishing detection with Takedown services as well as dedicated CTI Expert for on-going Intelligence triaging
    $136,320.00

    Vendor refund policy

    No Refunds.

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    With the Managed Service of Cyberint, you can expect: Monthly/quarterly meetings, ongoing support, and ad-hoc meetings as needed Threat Intelligence monitoring and reporting Assisted online assets discovery, and scanning for vulnerabilities Threat Intelligence Incident response SLA In case of a suspected cyber incident, a managed service customer can initiate an incident response activity utilizing the available coins. According to the acquired SLA (24 hours / 4 hours), upon the opening of an incident ticket, Cyberint will assign an experienced analyst(s) to support with relevant threat hunting activities concerning the incident. This can include: Providing content on the threat actor and main TTPs in previous attacks. Hunting for information which has being leaked following an incident and assessing the availability of the exposed information to other parties. Anonymized and covert interaction with the threat actor in order to collect additional information, asses the risk and the targeting level. Recommend actions required by the organization for optimal response.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    4.6
    151 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    48%
    46%
    5%
    1%
    0%
    0 AWS reviews
    |
    151 external reviews
    External reviews are from G2 .
    guy m.

    Amazing Support and User-Friendly System

    Reviewed on Dec 10, 2025
    Review provided by G2
    What do you like best about the product?
    The people are amazing - they respond quickly.
    The system is easy to use and very clear.
    The functionality is really good! Serves us well
    What do you dislike about the product?
    That sometimes there is FP even after the system says it is normal.
    But those will be our troubles
    What problems is the product solving and how is that benefiting you?
    To handle phishing scammers!
    Make takedown requests

    In addition - having passwords that are hacked for employees - is very important. Also for customers
    Pedro P.

    Exceptional Threat Intelligence and Brand Protection

    Reviewed on Dec 02, 2025
    Review provided by G2
    What do you like best about the product?
    I use Cyberint, a Check Point Company for external threat intelligence and digital risk monitoring, which has proven invaluable for early detection of phishing and other threats. The platform surfaces external threats that would otherwise go unnoticed, such as exposed credentials, brand misuse, dark-web chatter, and early phishing setups. This comprehensive coverage makes it particularly effective in tracking down vulnerable assets. I appreciate the platform's ability to deliver clear, actionable intelligence without excessive noise, which aids in rapid decision-making. The external threat monitoring is thorough, and I am impressed by the fast takedown support and alerts that include sufficient context for immediate action. The strong brand-protection monitoring is another standout feature, with dark web coverage that feels more extensive than other tools I have used. Additionally, the user-friendly portal is easy to navigate, which enhances the overall experience. Initial setup was straightforward, with clear onboarding steps, and most integrations functioned seamlessly without needing extensive tweaks. In using it alongside our other security tools, Cyberint enriches our alerts and helps flag early phishing, making it a critical component of our security infrastructure. I'm confident in recommending Cyberint, as reflected by my rating of 9 out of 10 because I love it.
    What do you dislike about the product?
    Some alerts from Cyberint, a Check Point Company can feel a bit repetitive, particularly for low-risk exposures. Additionally, the onboarding dashboards could be clearer, which would enhance the initial user experience. It would also be beneficial to have deeper automation for triage processes to help reduce the need for manual follow-up actions.
    What problems is the product solving and how is that benefiting you?
    I use Cyberint, a Check Point Company, for detecting external threats and vulnerabilities like exposed credentials and phishing. It gives actionable intelligence, strong brand protection, and dark web coverage, saving time from our previous fragmented setup.
    Telecommunications

    Comprehensive Asset Visibility for Organizations

    Reviewed on Nov 04, 2025
    Review provided by G2
    What do you like best about the product?
    Comprehensive visibility into an organization's external assets. Combines multiple functions like threat intelligence, attack surface management, dark web monitoring, brand protection, and supply chain risk into one platform.
    What do you dislike about the product?
    Services to take down fraudulent content on various online platforms, such as social media, app stores, and code repositories are slow may be due to uncooperative domain providers.
    What problems is the product solving and how is that benefiting you?
    Cyberint benefits ,brand protection, stronger fraud prevention, and more efficient security teams through a combination of automated insights and human expertise.
    Supreeth A.

    Reliable Threat Intelligence with Seamless Integration

    Reviewed on Nov 04, 2025
    Review provided by G2
    What do you like best about the product?
    I highly value Cyberint, a Check Point Company, for its ability to deliver timely and actionable threat intelligence that greatly contributes to our organization's security framework. The platform's intuitive interface and well-documented setup process ensure a smooth and efficient onboarding experience. One of its standout features is its capacity to provide real-time insights, such as alerts on exposed credentials, allowing us to act swiftly and mitigate potential risks. The speed at which Cyberint delivers critical threat data is impressive, helping us stay ahead of evolving threats like ransomware. The integration is seamless and enhances not only threat detection and response but also automation and overall visibility across our security stack. Cyberint's AI-driven threat intelligence, alongside quick alerting, seamless integration, and automation capabilities, significantly improve usability, efficiency, and threat response decision-making, establishing it as a strong cybersecurity solution. The responsive vendor support, characterized by quick assistance via conference calls and real-time guidance, further facilitates a smooth setup and integration, especially with Check Point tools. Cyberint's seamless integration with our existing SOAR platform enhances our incident response workflows, reduces manual effort, and improves the overall management of our cybersecurity processes.
    What do you dislike about the product?
    The response time of Cyberint could be shorter, as it would help improve efficiency in certain situations.
    What problems is the product solving and how is that benefiting you?
    I use Cyberint for timely and actionable threat intelligence, providing real-time insights like exposed credentials to mitigate risks quickly. Its seamless integration and automation enhance threat response and visibility, improving our security posture efficiently.
    Sachin A.

    Essential Threat Intelligence Tool with Timely Support

    Reviewed on Nov 04, 2025
    Review provided by G2
    What do you like best about the product?
    Cyberint has become a key part of our cyber threat intelligence and digital risk monitoring efforts. It fits in smoothly with our existing detection and monitoring tools, and has greatly improved our ability to spot, understand, and confirm potential threats early—which is crucial in today’s fast-moving threat landscape.
    Here are a few things I really like about it:

    User-Friendly Interface: The platform is clean and easy to navigate, making it simple to find what you need.
    Helpful Team: Their support team is always ready to help and explain things when needed.
    Always Improving: They keep updating their tools to deal with new types of cyber attacks.
    What do you dislike about the product?
    At times, supply chain alerts are received later than expected, occasionally after our SOC teams have already detected and responded to the issue independently.
    What problems is the product solving and how is that benefiting you?
    Cyberint has become a key part of our cyber threat intelligence and digital risk monitoring efforts. It fits in smoothly with our existing detection and monitoring tools, and has greatly improved our ability to spot, understand, and confirm potential threats early—which is crucial in today’s fast-moving threat landscape.
    View all reviews