Infinity SOC with AI-based incident analysis for fast identification and blocking of cyber-attacks

20160817_chkp_graphic

Editor’s brief: In a world where cybercriminals seem to be a step ahead of the good folks, it is important to have the right tools with you. AI (artificial intelligence) is an excellent tool or platform to aid cybersecurity practitioners and CISOs on the frontline. Check Point Software’s Infinity SOC is one such AI-enabled tool to help security teams reduce alert overload, and to help identifying and blocking of cyber-attacks faster and more accurately with less false alarms. The vendor’s news release is below.

Check Point Infinity SOC Eliminates Alert Overload, Enabling Security Teams to Identify and Block Cyber-attacks with Unrivalled Speed and Accuracy

Infinity SOC uses industry-first AI-based incident analysis powered by market-leading threat intelligence to cut through false positive alerts and automatically pinpoint critical incidents, with single-click remediation

SINGAPORE, @mcgallen #microwireinfo, July 8, 2020Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally, has announced the launch of Infinity SOC, which unifies threat prevention, detection, investigation and remediation in a single platform to give unrivalled security and operational efficiency. Infinity SOC is used daily by the Check Point research cyber analysts, to expose and investigate the world’s most dangerous and sophisticated cyber-attacks. It uses AI-based incident analysis to filter millions of irrelevant logs and alerts, helping enterprise security teams to expose and shut down cyber-attacks with best-in-class speed and precision.

Security Operations Centre (SOC) teams at a majority of organisations struggle to identify and mitigate malicious activity on their complex network estates, because they use multiple point products that generate millions of event logs and alerts daily. In a SOC survey*, 68% of respondents stated that up to half of the events they analyse are false positives. As a result, critical attacks are often undetected until it is too late. 98% of IT security professionals reported SOC-related challenges, with the leading operational challenges being the manual work involved in analysing and remediating incidents (cited by 52%), accurately identifying the most critical events (52%), and an overload of logs and alerts (51%).

Check Point’s Infinity SOC solves these challenges and helps enterprises protect their networks by delivering:

  • Unrivalled accuracy to quickly shut down real attacks: it automatically exposes even the stealthiest attacks from millions of daily logs and alerts with unrivalled accuracy, powered by industry-first AI incident analysis. Infinity SOC automatically triages alerts to enable quicker respond to the critical attacks and offers single click remediation with a lightweight client on the infected host. It also prevents hackers from launching phishing campaigns against users by taking down lookalike corporate web and email domains.
  • Rapid incident investigations: Infinity SOC is powered by ThreatCloud, the world’s largest collaborative network to fight cybercrime, enabling teams to quickly search for in-depth live intelligence on any indicator of compromise, including global spread, attack timelines and patterns, malware DNA and more. This also includes deep-link searches on social media and OSINT to deepen investigations – unlike other solutions, which use offline threat databases. Suspicious files are quickly checked using SandBlast threat emulation, which has the industry’s best malware catch rate.
  • Zero-friction deployment: Infinity SOC is a single, centrally managed cloud platform, improving teams’ operational efficiency and reducing TCO. It deploys in minutes, and avoids costly log storage and privacy concerns with unique cloud-based event analysis that does not export and store event logs.

“It was critical for us to find a solution to help us cut through the daily deluge of alerts and events and find the handful of genuine, potentially damaging threats to our networks,” said Soren Kristensen, Security Engineer at Terma A/S. “Infinity SOC delivers exactly that, and more. It has enabled us to filter out all the irrelevant alerts and background noise so we can see the true state of security across our network, and to automate processes, which enables us to focus on the activities that really matter. It also gives us threat intelligence and hunting capabilities that we simply didn’t have previously.”

“Infinity SOC enables security teams to cut through the daily overload of event alerts, and eliminates network blind spots to automatically pinpoint and block the most sophisticated attacks before they can cause damage,” said Itai Greenberg, VP of Product Management at Check Point.  “Its advanced AI-based analytics, powered by the industry’s most advanced threat intelligence resource, filters millions of alerts into the handful of critical, genuine threats so that analysts can makes the fastest, most targeted responses possible to safeguard their organisation. No other solution offers Infinity SOC’s combination of automated prevention, detection, investigation and remediation capabilities in a single platform.”

Infinity SOC is available immediately.  Full details are available from https://www.checkpoint.com/products/infinity-soc/

* Dimensional Research’s 2019 SOC Survey polled 301 qualified IT security professionals at organisations with 500+ employees across a range of industries internationally.

infinity-soc-real-attacks-laptop-image

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers its multilevel security architecture, Infinity Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organisations of all sizes.

Follow Check Point via:

###