News, Tech

Infinity SOC with AI-based incident analysis for fast identification and blocking of cyber-attacks

Quick Summary

  • Overwhelming logs and alerts were mentioned by 51% of IT security experts as a major problem, followed by the manual work needed in analyzing and remediating incidents (52%), and effectively identifying the most critical occurrences (52%).
  • “It was critical for us to find a solution to help us cut through the daily deluge of alerts and events and find the handful of genuine, potentially damaging threats to our networks,” said Soren Kristensen, Security Engineer at Terma A/S.
  • It has enabled us to filter out all the irrelevant alerts and background noise so we can see the true state of security across our network, and to automate processes, which enables us to focus on the activities that really matter.

Editor’s brief: In a world where cybercriminals seem to be a step ahead of the good folks, it is important to have the right tools with you. AI (artificial intelligence) is an excellent tool or platform to aid cybersecurity practitioners and CISOs on the frontline. Check Point Software’s Infinity SOC is one such AI-enabled tool to help security teams reduce alert overload, and to help identifying and blocking of cyber-attacks faster and more accurately with less false alarms. Read more below.

SINGAPORECheck Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally, has announced the launch of Infinity SOC, which unifies threat prevention, detection, investigation and remediation in a single platform to give unrivalled security and operational efficiency. Infinity SOC is used daily by the Check Point research cyber analysts, to expose and investigate the world’s most dangerous and sophisticated cyber-attacks. It uses AI-based incident analysis to filter millions of irrelevant logs and alerts, helping enterprise security teams to expose and shut down cyber-attacks with best-in-class speed and precision.

Most companies’ Security Operations Center (SOC) teams have a hard time spotting and stopping hostile behavior on their complex network estates because they rely on a wide variety of disparate products, each of which generates its own unique set of event logs and alarms. About two-thirds of respondents to a SOC survey* said that as many as half of the events they examine are false positives. It’s not uncommon for critical attacks to go unnoticed until it’s too late. Overwhelming logs and alerts were mentioned by 51% of IT security experts as a major problem, followed by the manual work needed in analyzing and remediating incidents (52%), and effectively identifying the most critical occurrences (52%).

Check Point’s Infinity SOC solves these challenges and helps enterprises protect their networks by delivering:

  • Unrivalled accuracy to quickly shut down real attacks: it automatically exposes even the stealthiest attacks from millions of daily logs and alerts with unrivalled accuracy, powered by industry-first AI incident analysis. Infinity SOC automatically triages alerts to enable quicker respond to the critical attacks and offers single click remediation with a lightweight client on the infected host. It also prevents hackers from launching phishing campaigns against users by taking down lookalike corporate web and email domains.
  • Rapid incident investigations: Infinity SOC is powered by ThreatCloud, the world’s largest collaborative network to fight cybercrime, enabling teams to quickly search for in-depth live intelligence on any indicator of compromise, including global spread, attack timelines and patterns, malware DNA and more. This also includes deep-link searches on social media and OSINT to deepen investigations – unlike other solutions, which use offline threat databases. Suspicious files are quickly checked using SandBlast threat emulation, which has the industry’s best malware catch rate.
  • Zero-friction deployment: Infinity SOC is a single, centrally managed cloud platform, improving teams’ operational efficiency and reducing TCO. It deploys in minutes, and avoids costly log storage and privacy concerns with unique cloud-based event analysis that does not export and store event logs.

“It was critical for us to find a solution to help us cut through the daily deluge of alerts and events and find the handful of genuine, potentially damaging threats to our networks,” said Soren Kristensen, Security Engineer at Terma A/S. “Infinity SOC delivers exactly that, and more. It has enabled us to filter out all the irrelevant alerts and background noise so we can see the true state of security across our network, and to automate processes, which enables us to focus on the activities that really matter. It also gives us threat intelligence and hunting capabilities that we simply didn’t have previously.”

“Infinity SOC enables security teams to cut through the daily overload of event alerts, and eliminates network blind spots to automatically pinpoint and block the most sophisticated attacks before they can cause damage,” said Itai Greenberg, VP of Product Management at Check Point.  “Its advanced AI-based analytics, powered by the industry’s most advanced threat intelligence resource, filters millions of alerts into the handful of critical, genuine threats so that analysts can makes the fastest, most targeted responses possible to safeguard their organisation. No other solution offers Infinity SOC’s combination of automated prevention, detection, investigation and remediation capabilities in a single platform.”

Infinity SOC is available immediately.  Full details are available from https://www.checkpoint.com/products/infinity-soc/

* Dimensional Research’s 2019 SOC Survey polled 301 qualified IT security professionals at organisations with 500+ employees across a range of industries internationally.

infinity-soc-real-attacks-laptop-image

###