Cyberint, a Check Point Company Features
Orchestration (4)
Asset Management
Lets users group and organize their endpoints to gather threat intelligence on specific technologies. This feature was mentioned in 79 Cyberint, a Check Point Company reviews.
Security Workflow Automation
Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information. 54 reviewers of Cyberint, a Check Point Company have provided feedback on this feature.
Deployment
Based on 35 Cyberint, a Check Point Company reviews. The process in which users integrate their existing security systems and endpoints to the threat intelligence platform.
Sandboxing
A feature that allows security testing and information gathering to occur in a secure, resource independent environment. This feature was mentioned in 34 Cyberint, a Check Point Company reviews.
Information (3)
Proactive Alerts
Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered. 98 reviewers of Cyberint, a Check Point Company have provided feedback on this feature.
Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences. 96 reviewers of Cyberint, a Check Point Company have provided feedback on this feature.
Intelligence Reports
As reported in 97 Cyberint, a Check Point Company reviews. The ability for users to produce reports outlining detailed and personalized threat information
Personalization (3)
Endpoint Intelligence
Based on 74 Cyberint, a Check Point Company reviews. Analysis for users to examine threat intelligence data specific to their endpoint devices.
Security Validation
As reported in 97 Cyberint, a Check Point Company reviews. The product has a recurring examination process to update your intelligence reports as new threats emerge.
Dynamic/Code Analysis
Based on 74 Cyberint, a Check Point Company reviews. The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities.
Detection (4)
Payment Verification
Requires verification of credit card, debit card, and money transfers prior to accepting payments
Bot Mitigation
Monitors for and rids systems of bots suspected of committing fraud.
Real-Time Monitoring
Constantly monitors system to detect anomalies in real time.
Alerts
Alerts administrators when fraud is suspected or transactions have been declined.
Analysis (3)
ID Analytics
Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Intelligence Reporting
Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.
Incident Reports
Produces reports detailing trends and vulnerabilities related to payments and fraud.
Administration (3)
Fraud Markers
Tags users suspected of committing fraud and identifies them upon return.
Transaction Scoring
Rates each transaction's risk based on specific factors and their benchmarked scores.
Blacklisting
Prevents previous committers of fraud from future transactions.
Identification (2)
Monitoring
Based on 74 Cyberint, a Check Point Company reviews. Monitor online product and pricing information
Violations
Identify pricing or brand policy violations 74 reviewers of Cyberint, a Check Point Company have provided feedback on this feature.
Enforcement (3)
Communication
Ability to warn resellers about violations This feature was mentioned in 75 Cyberint, a Check Point Company reviews.
Plans
Provide plans to enforce pricing and brand policies 71 reviewers of Cyberint, a Check Point Company have provided feedback on this feature.
Track
Track the effectiveness of enforcement activities 42 reviewers of Cyberint, a Check Point Company have provided feedback on this feature.
Risk Analysis (3)
Risk Scoring
As reported in 42 Cyberint, a Check Point Company reviews. Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches.
Reporting
As reported in 42 Cyberint, a Check Point Company reviews. Creates reports outlining log activity and relevant metrics.
Risk-Prioritization
Based on 42 Cyberint, a Check Point Company reviews. Allows for vulnerability ranking by customized risk and threat priorities.
Vulnerability Assesment (4)
Vulnerability Scanning
As reported in 50 Cyberint, a Check Point Company reviews. Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
Based on 42 Cyberint, a Check Point Company reviews. Stores information related to common vulnerabilities and how to resolve them once incidents occur.
Contextual Data
Based on 50 Cyberint, a Check Point Company reviews. Identify risk data attributes such as description, category, owner, or hierarchy.
Dashboards
As reported in 50 Cyberint, a Check Point Company reviews. Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data.
Automation (4)
Automated Remediation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly. 41 reviewers of Cyberint, a Check Point Company have provided feedback on this feature.
Workflow Automation
Based on 41 Cyberint, a Check Point Company reviews. Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Security Testing
As reported in 29 Cyberint, a Check Point Company reviews. Allows users to perfrom hands-on live simulations and penetration tests.
Test Automation
Based on 17 Cyberint, a Check Point Company reviews. Runs pre-scripted vulnerability scans and security tests without requiring manual work.
Functionality (8)
Monitoring - Deep Web
Monitors select keywords on the deep web, which are non-indexed parts of the internet not available on the surface web. This feature was mentioned in 87 Cyberint, a Check Point Company reviews.
Monitoring - Dark Web
As reported in 87 Cyberint, a Check Point Company reviews. Monitors select keywords on the dark areas of the web, which are only accessible via Tor and I2P, such as illicit marketplaces and dark forums.
Analysis
Provides context around identified information, including historical threat data, threat location data from geotags or inferred data, threat actors names, relationships, URLs, and other relevant information to conduct further investigations. This feature was mentioned in 86 Cyberint, a Check Point Company reviews.
Ticketing
Integrates into ticketing or CRM platforms via API integrations. This feature was mentioned in 85 Cyberint, a Check Point Company reviews.
Simple Search
Search through real-time and historical data without using technical query language. 84 reviewers of Cyberint, a Check Point Company have provided feedback on this feature.
Leak Source
As reported in 84 Cyberint, a Check Point Company reviews. Provides additional context and analysis to help identify the source of leaked information.
Centralized Dashboard
Offers a centralized dashboard to monitor, collect, process, alert, analyse and search through data flagged by the software. 86 reviewers of Cyberint, a Check Point Company have provided feedback on this feature.
Real-Time Alerts
As reported in 86 Cyberint, a Check Point Company reviews. Enables real-time alerts and reporting through push notifications in a mobile app, email, or sms alerts.
Monitoring (7)
Gap Analysis
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. 74 reviewers of Cyberint, a Check Point Company have provided feedback on this feature.
Vulnerability Intelligence
Stores information related to common vulnerabilities and how to resolve them once incidents occur. This feature was mentioned in 77 Cyberint, a Check Point Company reviews.
Compliance Monitoring
Based on 75 Cyberint, a Check Point Company reviews. Monitors data quality and sends alerts based on violations or misuse.
Continuous Monitoring
As reported in 77 Cyberint, a Check Point Company reviews. Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response.
Vendor Performance
Track vendor performance using supplier data such as a history of transactions and contracts.
Notifications
Send alerts and notifications when corrective actions are needed to address supplier risk.
Oversight
Perform ongoing due diligence activities to auto calculate overall risk for each vendor.
Asset Management (3)
Asset Discovery
Detects new assets as they enter cloud environments and networks to add to asset inventory. This feature was mentioned in 79 Cyberint, a Check Point Company reviews.
Shadow IT Detection
Identifies unsanctioned software. 76 reviewers of Cyberint, a Check Point Company have provided feedback on this feature.
Change Management
Based on 75 Cyberint, a Check Point Company reviews. Provides tools to track and implement required security policy changes.
Risk Management (4)
Risk-Prioritization
Based on 75 Cyberint, a Check Point Company reviews. Allows for vulnerability ranking by customized risk and threat priorities.
Reconnaissance
As reported in 76 Cyberint, a Check Point Company reviews. Gathers information about the system and potential exploits to be tested.
At-Risk Analysis
Uses machine learning to identify at-risk data. This feature was mentioned in 77 Cyberint, a Check Point Company reviews.
Threat Intelligence
As reported in 77 Cyberint, a Check Point Company reviews. Stores information related to common threats and how to resolve them once incidents occur.
Risk Assessment (2)
Scoring
Users can assign scores to suppliers based on the estimated risk of doing business with them.
AI
Utilize artificial intelligence to analyze third party risks.
Risk Control (3)
Reviews
Review vendor contracts and profiles to ensure compliance with regulation and internal policies.
Policies
Manage and enforce internal policies related to vendor risk management and controls.
Workflows
Provide workflows to mitigate risk and escalate issues proactively.
Reporting (3)
Templates
Include reporting templates for activities such as audits and vendor evaluation.
Centralized Data
Consolidate data from multiple systems that manage supplier information.
360 View
Provide a 360 view of suppliers which can be shared with internal or external users.
Generative AI (5)
AI Text Summarization
Based on 49 Cyberint, a Check Point Company reviews. Condenses long documents or text into a brief summary.
AI Text Summarization
As reported in 43 Cyberint, a Check Point Company reviews. Condenses long documents or text into a brief summary.
Generate Attack Scenarios
Use AI to propose possible threat actor tactics, techniques, and procedures against specific environments or assets.
Generate Threat Detection Rules
Use AI to automatically create detection rules based on observed patterns.
Generate Threat Summaries
Use AI to produce concise summaries of complex threat reports or alerts.
Vulnerability Management - Digital Risk Protection (DRP) Platforms (6)
Vulnerability Assessment
Incorporates real-time data from various sources to identify potential threats and vulnerabilities.
Digital Footprint Mapping
Creates a digital footprint of an organization's ecosystem to identify exposed digital assets.
Fraud Detection
Identifies and mitigates fraudulent websites, phishing attacks, and other social engineering attacks targeting employees and customers.
Data Leak Detection
Detects sensitive data published on the dark web and other paste sites.
Anti-Counterfeiting
Protects against illegal online sales and counterfeiting.
Brand Protection
Analyzes an organization’s online presence to identify instances of brand impersonation.
Incident Response Digital Risk Protection (DRP) Platforms (3)
Threat Remediation
Outlines clear takedown processes for threats.
Automated Reponses
Implements automated responses to certain types of incidents.
Incident Response Capabilities
Provides resources for a coordinated and efficient response to security incidents, facilitating investigation, containment, and recovery efforts.
Reporting and Analytics - Digital Risk Protection (DRP) Platforms (3)
Threat Trends Analysis
Offers analytics features to provide insights into digital risk trends and the effectiveness of mitigation strategies
Risk Assessment Reports
Generates reports that assess the overall digital risk posture of an organization. Reports may include an analysis of the identified threats and vulnerabilities.
Customizable Dashboards
Offers dashboards that can be customized based on the key performance indicators of an organization.
Agentic AI - Threat Intelligence (4)
Autonomous Task Execution
As reported in 14 Cyberint, a Check Point Company reviews. Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes This feature was mentioned in 14 Cyberint, a Check Point Company reviews.
Proactive Assistance
As reported in 14 Cyberint, a Check Point Company reviews. Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives 14 reviewers of Cyberint, a Check Point Company have provided feedback on this feature.
Agentic AI - Third Party & Supplier Risk Management (2)
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Fraud Detection (3)
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives



