Check Point - External Risk Management (Cyberint)
Check Point Software TechnologiesReviews from AWS customer
0 AWS reviews
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
168 reviews
from
External reviews are not included in the AWS star rating for the product.
Real-Time Threat Intelligence and Automated Response at Its Best
What do you like best about the product?
Cyberint excels with its real-time threat intelligence feeds, sub-30-minute alerting via AI-driven reconnaissance, and automated playbook execution through Check Point Playblocks—enabling credential resets, IOC blocking, and seamless enrichment across Quantum and Harmony endpoints.
What do you dislike about the product?
Cyberint has room for improvement when it comes to third-party integrations, the usability of its dashboard, and the breadth of its real-time threat intelligence coverage. Enhancing these areas would help provide more comprehensive and accessible threat intelligence more quickly.
What problems is the product solving and how is that benefiting you?
Cyberint addresses gaps in external threat visibility by identifying phishing attempts, credential leaks, and brand impersonation as they happen. This has helped us respond to incidents more quickly, minimize our attack surface, and automate remediation throughout Check Point’s ecosystem.
Rapid Threat Detection and Seamless Integration
What do you like best about the product?
I find Cyberint, a Check Point Company, incredibly valuable due to its rapid and AI-driven threat intelligence, which delivers unmatched speed in threat detection and automation. The seamless integration with the Checkpoint ecosystem enhances my overall cybersecurity strategy, offering unified visibility and streamlined operations. Additionally, I appreciate its capability for quick alerting, which leverages its robust intel setup for swift incident response. The vendor support was also outstanding during the setup process, with their prompt response and availability through conference calls making the initial configuration a breeze. Cyberint's easy interface and detailed descriptions further simplify my workflow, enabling efficient use of its features. I particularly love the automation capabilities that excel in areas such as credential resets and Security Orchestration, Automation, and Response (SOAR), significantly improving operational efficiency. Integration was seamless with the Harmony Endpoint, which further automates my response mechanisms.
What do you dislike about the product?
I dislike that Cyberint, a Check Point Company, has limited multilingual threat intelligence coverage. This seemed to hinder its ability to detect live or recent intel effectively, which is crucial for our operations.
What problems is the product solving and how is that benefiting you?
I find Cyberint, a Check Point Company, provides rapid AI-driven threat intel, quick alerting, and automation, enhancing our security operations with seamless integration into the Check Point ecosystem.
Real-Time Intel Enhances Security Efforts
What do you like best about the product?
I really appreciate that Cyberint, a Check Point Company, delivers relevant threat intelligence, which has been extremely beneficial in ensuring our organization's safety by enabling us to contain all identified risks effectively. The clear documentation and intuitive interface of the Cyberint platform made the setup process straightforward and hassle-free for me. Furthermore, the ability to acquire timely intel, such as details on leaked credentials, allows us to take immediate remediation actions, which is invaluable for maintaining our security posture. The speed at which Cyberint provides critical threat intelligence also stands out to me, as it enables us to take precautionary steps against ongoing threats like ransomware attacks swiftly and efficiently.
What do you dislike about the product?
I dislike that the intel response time is currently one day. I would prefer it to be reduced to four hours.
What problems is the product solving and how is that benefiting you?
I use Cyberint, a Check Point Company, to receive relevant threat intelligence, helping us stay informed of recent attacks, ensure organizational safety, and take remediation actions swiftly, particularly against risks like leaked credentials and ransomware threats.
Exceptional Cybersecurity Tool with Superior Threat Detection
What do you like best about the product?
I truly appreciate Cyberint, a Check Point Company for its outstanding features and capabilities which have significantly benefited my operations. The platform is excellent for cyber risk management with its exceptional visibility and coverage, which is crucial for early threat detection. I find its user-friendly interface incredibly easy to navigate, offering multiple useful functions that simplify the setup process. Cyberint excels in data breach detection over both the open internet and the dark web. Its threat intelligence, attack surface monitoring, and phishing detection are standout features, especially useful during critical periods like the Israel-Palestine cyber conflict. I am impressed by its advanced threat detection capabilities, along with the management and customer support offered by Cyberint, which ensures smooth operation and reliable assistance whenever needed.
What do you dislike about the product?
All good
What problems is the product solving and how is that benefiting you?
I find Cyberint provides excellent visibility and coverage, helping us detect threats early and manage cyber risks effectively, including data breaches from the open internet and dark web.
Transparent and Flexible Threat Intelligence
What do you like best about the product?
What I value most about Cyberint is the exceptional transparency they offer to customers. The platform provides an abundance of raw signals and in-depth information, enabling us to carry out our own investigations and threat hunting whenever we have the opportunity. Simultaneously, the managed service guarantees that experts are always monitoring these signals and supporting us as needed. I also appreciate the flexibility of the tokens, which are not restricted to a fixed catalogue. This adaptability makes Cyberint a reliable partner, offering guidance across a broad spectrum of topics where we might otherwise be uncertain about the best course of action. Also it is fairly simple to use and also to implement
What do you dislike about the product?
At times, the abundance of details, information, and signals can be overwhelming and make it difficult to navigate.
What problems is the product solving and how is that benefiting you?
By managing our external assets, we are able to enhance both our security and reputation, which helps us proactively safeguard our environment. Additionally, with features like dark web monitoring, threat intelligence, brand abuse detection, and social media impersonation tracking, we can easily identify threats that have already occurred. This allows us to acknowledge these incidents and, in many cases, take steps to remediate them, providing ongoing protection.
Cyberint for SOC operations
What do you like best about the product?
Within our SOC operations, Cyberint has emerged as a critical asset for cyber threat intelligence and digital risk monitoring. By integrating smoothly into our established detection and monitoring processes, it has substantially improved our capability to anticipate, identify, and validate potential risks—an essential advantage in highly sensitive government and defense environments.
Highlighted benefits include:
* Extensive intelligence coverage: continuous access to a wide spectrum of OSINT, deep web, and dark web sources, providing prompt notifications of IOCs and evolving threat activity.
* Actionable intelligence insights: reports not only outline events, but also explain their underlying motives and techniques, supporting a more comprehensive understanding of the threat landscape.
* Analyst efficiency: correlation and data enrichment features minimize triage overhead, accelerate investigation, and help staff focus efforts where they matter most.
* Seamless ecosystem integration: compatibility with existing SIEMs and security platforms ensures that intelligence is immediately usable in operational workflows.
* Dedicated customer support: Cyberint’s team delivers quick, proactive assistance and custom briefings, supporting the resolution of complex or mission-critical scenarios.
In conclusion, Cyberint represents a robust solution for SOC environments operating under strict security requirements. It enhances visibility, reduces exposure to external risks, and strengthens the capacity to respond effectively and proactively to cyber threats.
Highlighted benefits include:
* Extensive intelligence coverage: continuous access to a wide spectrum of OSINT, deep web, and dark web sources, providing prompt notifications of IOCs and evolving threat activity.
* Actionable intelligence insights: reports not only outline events, but also explain their underlying motives and techniques, supporting a more comprehensive understanding of the threat landscape.
* Analyst efficiency: correlation and data enrichment features minimize triage overhead, accelerate investigation, and help staff focus efforts where they matter most.
* Seamless ecosystem integration: compatibility with existing SIEMs and security platforms ensures that intelligence is immediately usable in operational workflows.
* Dedicated customer support: Cyberint’s team delivers quick, proactive assistance and custom briefings, supporting the resolution of complex or mission-critical scenarios.
In conclusion, Cyberint represents a robust solution for SOC environments operating under strict security requirements. It enhances visibility, reduces exposure to external risks, and strengthens the capacity to respond effectively and proactively to cyber threats.
What do you dislike about the product?
Points to Improve
* Restricted user allocation: the system places limitations on how many user profiles can be provisioned, which can impact flexibility and growth in larger SOC environments.
* Alert accuracy: although the detection quality is high overall, some notifications turn out to be false positives, requiring analysts to dedicate extra effort to verification.
* Restricted user allocation: the system places limitations on how many user profiles can be provisioned, which can impact flexibility and growth in larger SOC environments.
* Alert accuracy: although the detection quality is high overall, some notifications turn out to be false positives, requiring analysts to dedicate extra effort to verification.
What problems is the product solving and how is that benefiting you?
* Extensive intelligence coverage: continuous access to a wide spectrum of OSINT, deep web, and dark web sources, providing prompt notifications of IOCs and evolving threat activity.
* Actionable intelligence insights: reports not only outline events, but also explain their underlying motives and techniques, supporting a more comprehensive understanding of the threat landscape.
* Analyst efficiency: correlation and data enrichment features minimize triage overhead, accelerate investigation, and help staff focus efforts where they matter most.
* Seamless ecosystem integration: compatibility with existing SIEMs and security platforms ensures that intelligence is immediately usable in operational workflows.
* Actionable intelligence insights: reports not only outline events, but also explain their underlying motives and techniques, supporting a more comprehensive understanding of the threat landscape.
* Analyst efficiency: correlation and data enrichment features minimize triage overhead, accelerate investigation, and help staff focus efforts where they matter most.
* Seamless ecosystem integration: compatibility with existing SIEMs and security platforms ensures that intelligence is immediately usable in operational workflows.
A Crucial Tool for Proactive Digital Risk Management
What do you like best about the product?
The greatest value of Cyberint lies in its proactive intelligence that extends far beyond our corporate perimeter. It provides a vital "attacker's-eye view" of our organization, giving us early warnings on critical risks like credential leaks, emerging phishing campaigns, and unauthorized brand usage. This foresight allows us to be proactive rather than reactive. The managed takedown feature is another standout, efficiently handling the removal of malicious content and saving our team valuable time. The backing by Check Point also adds a layer of confidence in the product's future roadmap.
What do you dislike about the product?
To unlock the platform's full potential, new users should anticipate a significant learning period; its extensive capabilities are not immediately intuitive. During the initial phase, it's crucial to invest time in fine-tuning the alert rules to filter out noise, as the raw volume can be overwhelming at first. Furthermore, while the reporting is adequate for general use, I'd like to see more robust customization options to create bespoke reports for different audiences, from technical analysts to executive leadership.
What problems is the product solving and how is that benefiting you?
Cyberint fundamentally solves the problem of blind spots outside our network perimeter. It provides crucial visibility into the external threat landscape, allowing us to see our organization as an attacker would. This transforms our security posture from purely reactive to proactive. By receiving early warnings about risks like leaked credentials, potential phishing sites, and brand impersonation, we can neutralize threats before they impact our business. Furthermore, its managed takedown service directly addresses the resource-intensive problem of removing malicious content, saving our team a significant amount of time and effort to focus on other priorities.
Great results with high professional support!
What do you like best about the product?
That we get very soon the compromised accounts and the possibility to buy these accounts. Also the deleting of leaked documents is extremely useful.
What do you dislike about the product?
The looks-alike domains are partially fault positives, but the true positives are really useful
What problems is the product solving and how is that benefiting you?
When your company is expanding and is buying other companies, that you get a security overview before you sign a contract and to find all the existing internet domains. Highly efficient!
A Powerful Ally in Proactive Cyber Defense
What do you like best about the product?
What I like best about Cyberint is the depth and precision of its threat intelligence capabilities. The platform provides a clear and actionable view of emerging cyber risks, making it much easier to anticipate and mitigate potential attacks. Its integration with Check Point’s ecosystem ensures that intelligence is not only comprehensive but also seamlessly aligned with enterprise security operations. For someone working in IT, it is extremely valuable to have access to such a reliable source of contextualized intelligence that directly improves decision-making and response time.
What do you dislike about the product?
The most helpful aspect of Cyberint is its ability to transform complex cyber threat data into actionable insights. Instead of overwhelming analysts with raw information, the platform presents prioritized, relevant findings that can be quickly understood and acted upon. This greatly reduces the time spent on manual investigation and increases efficiency across security operations. In addition, the dashboards and reporting tools are intuitive and customizable, which makes it easier to align threat intelligence with specific business needs. For IT professionals, this translates into better visibility, faster incident response, and more effective protection of critical assets.
What problems is the product solving and how is that benefiting you?
Cyberint is solving one of the most critical challenges in cybersecurity today: the ability to detect and understand external threats before they impact the organization. It continuously monitors the surface web, deep web, and dark web for potential risks, such as data leaks, phishing campaigns, brand impersonation, and targeted attacks. By providing timely alerts and actionable intelligence, Cyberint allows us to take proactive measures rather than reacting only after an incident occurs.
Enhancing SOC Capabilities with Cyberint
What do you like best about the product?
Cyberint has proven to be a highly valuable threat intelligence and digital risk protection platform within the operational framework of a SOC. Its integration with existing monitoring workflows has significantly enhanced our ability to detect and qualify potential threats in advance, which is particularly critical in public administration environments.
Key strengths identified include:
- Comprehensive intelligence feeds: broad and continuously updated coverage of OSINT, deep, and dark web sources, delivering timely alerts on indicators of compromise and emerging threats.
- Contextualized reporting: intelligence outputs provide not only “what” is happening, but also the “why” and “how” behind a potential attack, enabling deeper situational awareness.
- Operational support for analysts: correlation and enrichment features streamline the triage process, reducing response times and allowing analysts to focus on the most relevant events.
- Ease of integration: seamless compatibility with SIEMs and other platforms already in use, ensuring immediate operational value within daily workflows.
- Responsive and proactive support: Cyberint’s team offers fast assistance and tailored briefings, facilitating the handling of complex and sensitive cases.
Overall, Cyberint stands out as a highly effective tool for SOC operations in sensitive environments, providing enhanced situational awareness, reducing the exposed attack surface, and enabling a more efficient and proactive response to cyber threats.
Key strengths identified include:
- Comprehensive intelligence feeds: broad and continuously updated coverage of OSINT, deep, and dark web sources, delivering timely alerts on indicators of compromise and emerging threats.
- Contextualized reporting: intelligence outputs provide not only “what” is happening, but also the “why” and “how” behind a potential attack, enabling deeper situational awareness.
- Operational support for analysts: correlation and enrichment features streamline the triage process, reducing response times and allowing analysts to focus on the most relevant events.
- Ease of integration: seamless compatibility with SIEMs and other platforms already in use, ensuring immediate operational value within daily workflows.
- Responsive and proactive support: Cyberint’s team offers fast assistance and tailored briefings, facilitating the handling of complex and sensitive cases.
Overall, Cyberint stands out as a highly effective tool for SOC operations in sensitive environments, providing enhanced situational awareness, reducing the exposed attack surface, and enabling a more efficient and proactive response to cyber threats.
What do you dislike about the product?
Areas for Improvement
Limited number of user accounts: the platform currently imposes restrictions on the number of users that can be created, which may hinder scalability in larger SOC teams.
False positives: while generally accurate, alerts occasionally include false positives that require additional analyst time for validation.
Limited number of user accounts: the platform currently imposes restrictions on the number of users that can be created, which may hinder scalability in larger SOC teams.
False positives: while generally accurate, alerts occasionally include false positives that require additional analyst time for validation.
What problems is the product solving and how is that benefiting you?
Cyberint addresses the critical challenge of identifying, monitoring, and mitigating external cyber threats before they impact our infrastructure. By providing comprehensive threat intelligence feeds, dark web monitoring, and contextualized reporting, Cyberint enables our SOC to detect potential risks earlier and respond more effectively.
showing 21 - 30