Skip to main content

Check Point Infinity SOC Eliminates Alert Overload, Enabling Security Teams to Identify and Block Cyber-attacks with Unrivalled Speed and Accuracy

SAN CARLOS, Calif., July 07, 2020 (GLOBE NEWSWIRE) — Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally, has announced the launch of Infinity SOC, which unifies threat prevention, detection, investigation and remediation in a single platform to give unrivalled security and operational efficiency. Infinity SOC is used daily by the Check Point research cyber analysts, to expose and investigate the world’s most dangerous and sophisticated cyber-attacks. It uses AI-based incident analysis to filter millions of irrelevant logs and alerts, helping enterprise security teams to expose and shut down cyber-attacks with best-in-class speed and precision.  
Security Operations Centre (SOC) teams at a majority of organizations struggle to identify and mitigate malicious activity on their complex network estates, because they use multiple point products that generate millions of event logs and alerts daily. In a SOC survey*, 68% of respondents stated that up to half of the events they analyse are false positives. As a result, critical attacks are often undetected until it is too late. 98% of IT security professionals reported SOC-related challenges, with the leading operational challenges being the manual work involved in analyzing and remediating incidents (cited by 52%), accurately identifying the most critical events (52%), and an overload of logs and alerts (51%).  Check Point’s Infinity SOC solves these challenges and helps enterprises protect their networks by delivering:Unrivalled accuracy to quickly shut down real attacks: it automatically exposes even the stealthiest attacks from millions of daily logs and alerts with unrivalled accuracy, powered by industry-first AI incident analysis. Infinity SOC automatically triages alerts to enable quicker respond to the critical attacks and offers single click remediation with a lightweight client on the infected host. It also prevents hackers from launching phishing campaigns against users by taking down lookalike corporate web and email domains.Rapid incident investigations: Infinity SOC is powered by ThreatCloud, the world’s largest collaborative network to fight cybercrime, enabling teams to quickly search for in-depth live intelligence on any indicator of compromise, including global spread, attack timelines and patterns, malware DNA and more. This also includes deep-link searches on social media and OSINT to deepen investigations – unlike other solutions, which use offline threat databases. Suspicious files are quickly checked using SandBlast threat emulation, which has the industry’s best malware catch rate.Zero-friction deployment: Infinity SOC is a single, centrally managed cloud platform, improving teams’ operational efficiency and reducing TCO. It deploys in minutes, and avoids costly log storage and privacy concerns with unique cloud-based event analysis that does not export and store event logs.“It was critical for us to find a solution to help us cut through the daily deluge of alerts and events and find the handful of genuine, potentially damaging threats to our networks,” said Soren Kristensen, Security Engineer at Terma A/S. “Infinity SOC delivers exactly that, and more. It has enabled us to filter out all the irrelevant alerts and background noise so we can see the true state of security across our network, and to automate processes, which enables us to focus on the activities that really matter. It also gives us threat intelligence and hunting capabilities that we simply didn’t have previously.”“Infinity SOC enables security teams to cut through the daily overload of event alerts, and eliminates network blind spots to automatically pinpoint and block the most sophisticated attacks before they can cause damage,” said Itai Greenberg, VP of Product Management at Check Point. “Its advanced AI-based analytics, powered by the industry’s most advanced threat intelligence resource, filters millions of alerts into the handful of critical, genuine threats so that analysts can makes the fastest, most targeted responses possible to safeguard their organization. No other solution offers Infinity SOC’s combination of automated prevention, detection, investigation and remediation capabilities in a single platform.”Infinity SOC is available immediately. Full details are available from www.checkpoint.com/products/infinity-soc* Dimensional Research’s 2019 SOC Survey polled 301 qualified IT security professionals at organizations with 500+ employees across a range of industries internationallyFollow Check Point via:
Twitter: http://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: http://blog.checkpoint.com
YouTube: http://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers its multilevel security architecture, Infinity Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

Disclaimer & Cookie Notice

Welcome to GOLDEA services for Professionals

Before you continue, please confirm the following:

Professional advisers only

I am a professional adviser and would like to visit the GOLDEA CAPITAL for Professionals website.

Important Notice for Investors:

The services and products offered by Goldalea Capital Ltd. are intended exclusively for professional market participants as defined by applicable laws and regulations. This typically includes institutional investors, qualified investors, and high-net-worth individuals who have sufficient knowledge, experience, resources, and independence to assess the risks of trading on their own.

No Investment Advice:

The information, analyses, and market data provided are for general information purposes only and do not constitute individual investment advice. They should not be construed as a basis for investment decisions and do not take into account the specific investment objectives, financial situation, or individual needs of any recipient.

High Risks:

Trading in financial instruments is associated with significant risks and may result in the complete loss of the invested capital. Goldalea Capital Ltd. accepts no liability for losses incurred as a result of the use of the information provided or the execution of transactions.

Sole Responsibility:

The decision to invest or not to invest is solely the responsibility of the investor. Investors should obtain comprehensive information about the risks involved before making any investment decision and, if necessary, seek independent advice.

No Guarantees:

Goldalea Capital Ltd. makes no warranties or representations as to the accuracy, completeness, or timeliness of the information provided. Markets are subject to constant change, and past performance is not a reliable indicator of future results.

Regional Restrictions:

The services offered by Goldalea Capital Ltd. may not be available to all persons or in all countries. It is the responsibility of the investor to ensure that they are authorized to use the services offered.

Please note: This disclaimer is for general information purposes only and does not replace individual legal or tax advice.