Check Point - External Risk Management (Cyberint)
Check Point Software TechnologiesReviews from AWS customer
0 AWS reviews
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
148 reviews
from
External reviews are not included in the AWS star rating for the product.
Comprehensive Asset Visibility for Organizations
What do you like best about the product?
Comprehensive visibility into an organization's external assets. Combines multiple functions like threat intelligence, attack surface management, dark web monitoring, brand protection, and supply chain risk into one platform.
What do you dislike about the product?
Services to take down fraudulent content on various online platforms, such as social media, app stores, and code repositories are slow may be due to uncooperative domain providers.
What problems is the product solving and how is that benefiting you?
Cyberint benefits ,brand protection, stronger fraud prevention, and more efficient security teams through a combination of automated insights and human expertise.
Reliable Threat Intelligence with Seamless Integration
What do you like best about the product?
I highly value Cyberint, a Check Point Company, for its ability to deliver timely and actionable threat intelligence that greatly contributes to our organization's security framework. The platform's intuitive interface and well-documented setup process ensure a smooth and efficient onboarding experience. One of its standout features is its capacity to provide real-time insights, such as alerts on exposed credentials, allowing us to act swiftly and mitigate potential risks. The speed at which Cyberint delivers critical threat data is impressive, helping us stay ahead of evolving threats like ransomware. The integration is seamless and enhances not only threat detection and response but also automation and overall visibility across our security stack. Cyberint's AI-driven threat intelligence, alongside quick alerting, seamless integration, and automation capabilities, significantly improve usability, efficiency, and threat response decision-making, establishing it as a strong cybersecurity solution. The responsive vendor support, characterized by quick assistance via conference calls and real-time guidance, further facilitates a smooth setup and integration, especially with Check Point tools. Cyberint's seamless integration with our existing SOAR platform enhances our incident response workflows, reduces manual effort, and improves the overall management of our cybersecurity processes.
What do you dislike about the product?
The response time of Cyberint could be shorter, as it would help improve efficiency in certain situations.
What problems is the product solving and how is that benefiting you?
I use Cyberint for timely and actionable threat intelligence, providing real-time insights like exposed credentials to mitigate risks quickly. Its seamless integration and automation enhance threat response and visibility, improving our security posture efficiently.
Essential Threat Intelligence Tool with Timely Support
What do you like best about the product?
Cyberint has become a key part of our cyber threat intelligence and digital risk monitoring efforts. It fits in smoothly with our existing detection and monitoring tools, and has greatly improved our ability to spot, understand, and confirm potential threats early—which is crucial in today’s fast-moving threat landscape.
Here are a few things I really like about it:
User-Friendly Interface: The platform is clean and easy to navigate, making it simple to find what you need.
Helpful Team: Their support team is always ready to help and explain things when needed.
Always Improving: They keep updating their tools to deal with new types of cyber attacks.
Here are a few things I really like about it:
User-Friendly Interface: The platform is clean and easy to navigate, making it simple to find what you need.
Helpful Team: Their support team is always ready to help and explain things when needed.
Always Improving: They keep updating their tools to deal with new types of cyber attacks.
What do you dislike about the product?
At times, supply chain alerts are received later than expected, occasionally after our SOC teams have already detected and responded to the issue independently.
What problems is the product solving and how is that benefiting you?
Cyberint has become a key part of our cyber threat intelligence and digital risk monitoring efforts. It fits in smoothly with our existing detection and monitoring tools, and has greatly improved our ability to spot, understand, and confirm potential threats early—which is crucial in today’s fast-moving threat landscape.
Outstanding Threat Intelligence with Seamless Integration and Expert Support
What do you like best about the product?
What I value most about Cyberint is its capacity to provide real-time, actionable intelligence spanning the open, deep, and dark web. The platform delivers outstanding visibility into external threats like phishing, brand impersonation, credential leaks, and third-party risks, enabling us to proactively address potential incidents before they develop further.
The user-friendly interface, smooth integration with our current security stack, and the expertise of their skilled threat analysts truly set Cyberint apart. It has greatly improved our external risk management and has sped up our incident response processes.
The user-friendly interface, smooth integration with our current security stack, and the expertise of their skilled threat analysts truly set Cyberint apart. It has greatly improved our external risk management and has sped up our incident response processes.
What do you dislike about the product?
Cyberint is effective overall, though I find that the alert tuning options could offer greater flexibility. Additionally, the integrations with third-party tools could be more comprehensive.
What problems is the product solving and how is that benefiting you?
Cyberint enables us to proactively identify and address external cyber threats, including phishing, brand impersonation, credential leaks, and vulnerabilities in third parties. Through its ongoing monitoring of the open, deep, and dark web, we receive early alerts about potential risks before they become more serious. As a result, our incident response time has improved considerably, our exposure to digital threats has decreased, and our overall security posture has become stronger.
Real-Time Threat Intelligence and Automated Response at Its Best
What do you like best about the product?
Cyberint excels with its real-time threat intelligence feeds, sub-30-minute alerting via AI-driven reconnaissance, and automated playbook execution through Check Point Playblocks—enabling credential resets, IOC blocking, and seamless enrichment across Quantum and Harmony endpoints.
What do you dislike about the product?
Cyberint has room for improvement when it comes to third-party integrations, the usability of its dashboard, and the breadth of its real-time threat intelligence coverage. Enhancing these areas would help provide more comprehensive and accessible threat intelligence more quickly.
What problems is the product solving and how is that benefiting you?
Cyberint addresses gaps in external threat visibility by identifying phishing attempts, credential leaks, and brand impersonation as they happen. This has helped us respond to incidents more quickly, minimize our attack surface, and automate remediation throughout Check Point’s ecosystem.
Rapid Threat Detection and Seamless Integration
What do you like best about the product?
I find Cyberint, a Check Point Company, incredibly valuable due to its rapid and AI-driven threat intelligence, which delivers unmatched speed in threat detection and automation. The seamless integration with the Checkpoint ecosystem enhances my overall cybersecurity strategy, offering unified visibility and streamlined operations. Additionally, I appreciate its capability for quick alerting, which leverages its robust intel setup for swift incident response. The vendor support was also outstanding during the setup process, with their prompt response and availability through conference calls making the initial configuration a breeze. Cyberint's easy interface and detailed descriptions further simplify my workflow, enabling efficient use of its features. I particularly love the automation capabilities that excel in areas such as credential resets and Security Orchestration, Automation, and Response (SOAR), significantly improving operational efficiency. Integration was seamless with the Harmony Endpoint, which further automates my response mechanisms.
What do you dislike about the product?
I dislike that Cyberint, a Check Point Company, has limited multilingual threat intelligence coverage. This seemed to hinder its ability to detect live or recent intel effectively, which is crucial for our operations.
What problems is the product solving and how is that benefiting you?
I find Cyberint, a Check Point Company, provides rapid AI-driven threat intel, quick alerting, and automation, enhancing our security operations with seamless integration into the Check Point ecosystem.
Real-Time Intel Enhances Security Efforts
What do you like best about the product?
I really appreciate that Cyberint, a Check Point Company, delivers relevant threat intelligence, which has been extremely beneficial in ensuring our organization's safety by enabling us to contain all identified risks effectively. The clear documentation and intuitive interface of the Cyberint platform made the setup process straightforward and hassle-free for me. Furthermore, the ability to acquire timely intel, such as details on leaked credentials, allows us to take immediate remediation actions, which is invaluable for maintaining our security posture. The speed at which Cyberint provides critical threat intelligence also stands out to me, as it enables us to take precautionary steps against ongoing threats like ransomware attacks swiftly and efficiently.
What do you dislike about the product?
I dislike that the intel response time is currently one day. I would prefer it to be reduced to four hours.
What problems is the product solving and how is that benefiting you?
I use Cyberint, a Check Point Company, to receive relevant threat intelligence, helping us stay informed of recent attacks, ensure organizational safety, and take remediation actions swiftly, particularly against risks like leaked credentials and ransomware threats.
Exceptional Cybersecurity Tool with Superior Threat Detection
What do you like best about the product?
I truly appreciate Cyberint, a Check Point Company for its outstanding features and capabilities which have significantly benefited my operations. The platform is excellent for cyber risk management with its exceptional visibility and coverage, which is crucial for early threat detection. I find its user-friendly interface incredibly easy to navigate, offering multiple useful functions that simplify the setup process. Cyberint excels in data breach detection over both the open internet and the dark web. Its threat intelligence, attack surface monitoring, and phishing detection are standout features, especially useful during critical periods like the Israel-Palestine cyber conflict. I am impressed by its advanced threat detection capabilities, along with the management and customer support offered by Cyberint, which ensures smooth operation and reliable assistance whenever needed.
What do you dislike about the product?
All good
What problems is the product solving and how is that benefiting you?
I find Cyberint provides excellent visibility and coverage, helping us detect threats early and manage cyber risks effectively, including data breaches from the open internet and dark web.
Transparent and Flexible Threat Intelligence
What do you like best about the product?
What I value most about Cyberint is the exceptional transparency they offer to customers. The platform provides an abundance of raw signals and in-depth information, enabling us to carry out our own investigations and threat hunting whenever we have the opportunity. Simultaneously, the managed service guarantees that experts are always monitoring these signals and supporting us as needed. I also appreciate the flexibility of the tokens, which are not restricted to a fixed catalogue. This adaptability makes Cyberint a reliable partner, offering guidance across a broad spectrum of topics where we might otherwise be uncertain about the best course of action. Also it is fairly simple to use and also to implement
What do you dislike about the product?
At times, the abundance of details, information, and signals can be overwhelming and make it difficult to navigate.
What problems is the product solving and how is that benefiting you?
By managing our external assets, we are able to enhance both our security and reputation, which helps us proactively safeguard our environment. Additionally, with features like dark web monitoring, threat intelligence, brand abuse detection, and social media impersonation tracking, we can easily identify threats that have already occurred. This allows us to acknowledge these incidents and, in many cases, take steps to remediate them, providing ongoing protection.
Cyberint for SOC operations
What do you like best about the product?
Within our SOC operations, Cyberint has emerged as a critical asset for cyber threat intelligence and digital risk monitoring. By integrating smoothly into our established detection and monitoring processes, it has substantially improved our capability to anticipate, identify, and validate potential risks—an essential advantage in highly sensitive government and defense environments.
Highlighted benefits include:
* Extensive intelligence coverage: continuous access to a wide spectrum of OSINT, deep web, and dark web sources, providing prompt notifications of IOCs and evolving threat activity.
* Actionable intelligence insights: reports not only outline events, but also explain their underlying motives and techniques, supporting a more comprehensive understanding of the threat landscape.
* Analyst efficiency: correlation and data enrichment features minimize triage overhead, accelerate investigation, and help staff focus efforts where they matter most.
* Seamless ecosystem integration: compatibility with existing SIEMs and security platforms ensures that intelligence is immediately usable in operational workflows.
* Dedicated customer support: Cyberint’s team delivers quick, proactive assistance and custom briefings, supporting the resolution of complex or mission-critical scenarios.
In conclusion, Cyberint represents a robust solution for SOC environments operating under strict security requirements. It enhances visibility, reduces exposure to external risks, and strengthens the capacity to respond effectively and proactively to cyber threats.
Highlighted benefits include:
* Extensive intelligence coverage: continuous access to a wide spectrum of OSINT, deep web, and dark web sources, providing prompt notifications of IOCs and evolving threat activity.
* Actionable intelligence insights: reports not only outline events, but also explain their underlying motives and techniques, supporting a more comprehensive understanding of the threat landscape.
* Analyst efficiency: correlation and data enrichment features minimize triage overhead, accelerate investigation, and help staff focus efforts where they matter most.
* Seamless ecosystem integration: compatibility with existing SIEMs and security platforms ensures that intelligence is immediately usable in operational workflows.
* Dedicated customer support: Cyberint’s team delivers quick, proactive assistance and custom briefings, supporting the resolution of complex or mission-critical scenarios.
In conclusion, Cyberint represents a robust solution for SOC environments operating under strict security requirements. It enhances visibility, reduces exposure to external risks, and strengthens the capacity to respond effectively and proactively to cyber threats.
What do you dislike about the product?
Points to Improve
* Restricted user allocation: the system places limitations on how many user profiles can be provisioned, which can impact flexibility and growth in larger SOC environments.
* Alert accuracy: although the detection quality is high overall, some notifications turn out to be false positives, requiring analysts to dedicate extra effort to verification.
* Restricted user allocation: the system places limitations on how many user profiles can be provisioned, which can impact flexibility and growth in larger SOC environments.
* Alert accuracy: although the detection quality is high overall, some notifications turn out to be false positives, requiring analysts to dedicate extra effort to verification.
What problems is the product solving and how is that benefiting you?
* Extensive intelligence coverage: continuous access to a wide spectrum of OSINT, deep web, and dark web sources, providing prompt notifications of IOCs and evolving threat activity.
* Actionable intelligence insights: reports not only outline events, but also explain their underlying motives and techniques, supporting a more comprehensive understanding of the threat landscape.
* Analyst efficiency: correlation and data enrichment features minimize triage overhead, accelerate investigation, and help staff focus efforts where they matter most.
* Seamless ecosystem integration: compatibility with existing SIEMs and security platforms ensures that intelligence is immediately usable in operational workflows.
* Actionable intelligence insights: reports not only outline events, but also explain their underlying motives and techniques, supporting a more comprehensive understanding of the threat landscape.
* Analyst efficiency: correlation and data enrichment features minimize triage overhead, accelerate investigation, and help staff focus efforts where they matter most.
* Seamless ecosystem integration: compatibility with existing SIEMs and security platforms ensures that intelligence is immediately usable in operational workflows.
showing 1 - 10