[go: up one dir, main page]

Introducing G2.ai, the future of software buying.Try now

Cyberint, a Check Point Company Reviews & Product Details

Cyberint, a Check Point Company Product Details

Value at a Glance

Averages based on real user reviews.

Time to Implement

2 months

Return on Investment

6 months

Cyberint, a Check Point Company Integrations

(9)
Integration information sourced from real user reviews.

Cyberint, a Check Point Company Media

Cyberint, a Check Point Company Demo - Check Point External Risk Management
Check Point External Risk Management covers Attack surface management, threat intelligence, deep and dark web monitoring, supply chain intelligence and brand protection.
Cyberint, a Check Point Company Demo - Executive Dashboard
Get a view of your company’s security trends over time.
Cyberint, a Check Point Company Demo - Alert Center
Monitor all incoming alerts from brand protection to attack surface monitoring.
Cyberint, a Check Point Company Demo - Threat Landscape Module
Research threats specific to your geography or industry.
Cyberint, a Check Point Company Demo - Attack Surface Management Module
Continuous and Autonomous Discovery and Collection ​ ​Who are you? Who are your suppliers? Attackers? Vulnerabilities? Misconfiguration? Weakness? Triage?​
Cyberint, a Check Point Company Demo - Meet ThreatScope AI
A GenAI assistant designed to help you move faster and stay focused. ✅ Type queries in natural language to get help quickly ✅ Let ThreatScope AI highlight top tasks and summarize alerts ✅ Speed up small tasks so you can focus on bigger projects See how Cyberint, a Check Point company, i...
Product Avatar Image

Have you used Cyberint, a Check Point Company before?

Answer a few questions to help the Cyberint, a Check Point Company community

Cyberint, a Check Point Company Reviews (140)

Reviews

Cyberint, a Check Point Company Reviews (140)

4.6
140 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
View Filters
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Neeranjan M.
NM
Senior Engineer, Cyber Defence
Mid-Market (51-1000 emp.)
"Highly Effective Threat Intelligence Platform With Great Support"
What do you like best about Cyberint, a Check Point Company?

Cyberint has been extremely valuable for our company’s cyber threat intelligence needs. The platform provides clear, actionable insights that help us proactively defend against threats. The engineers and architects are outstanding. They are knowledgeable, responsive, and go above and beyond to address any concerns or requests. Their proactive approach in suggesting solutions and improvements is a huge plus. The ease of implementation and integration with our existing tools was straightforward, and the ongoing customer support is consistently reliable. Review collected by and hosted on G2.com.

What do you dislike about Cyberint, a Check Point Company?

While Cyberint is generally user-friendly, there is a learning curve for some of the more advanced features, and initial setup required some time investment from our team. Occasional minor bugs or delays in data refresh can occur, but the support team always responds quickly to resolve issues. Review collected by and hosted on G2.com.

Verified User in Military
UM
Enterprise (> 1000 emp.)
"Cyberint for SOC operations"
What do you like best about Cyberint, a Check Point Company?

Within our SOC operations, Cyberint has emerged as a critical asset for cyber threat intelligence and digital risk monitoring. By integrating smoothly into our established detection and monitoring processes, it has substantially improved our capability to anticipate, identify, and validate potential risks—an essential advantage in highly sensitive government and defense environments.

Highlighted benefits include:

* Extensive intelligence coverage: continuous access to a wide spectrum of OSINT, deep web, and dark web sources, providing prompt notifications of IOCs and evolving threat activity.

* Actionable intelligence insights: reports not only outline events, but also explain their underlying motives and techniques, supporting a more comprehensive understanding of the threat landscape.

* Analyst efficiency: correlation and data enrichment features minimize triage overhead, accelerate investigation, and help staff focus efforts where they matter most.

* Seamless ecosystem integration: compatibility with existing SIEMs and security platforms ensures that intelligence is immediately usable in operational workflows.

* Dedicated customer support: Cyberint’s team delivers quick, proactive assistance and custom briefings, supporting the resolution of complex or mission-critical scenarios.

In conclusion, Cyberint represents a robust solution for SOC environments operating under strict security requirements. It enhances visibility, reduces exposure to external risks, and strengthens the capacity to respond effectively and proactively to cyber threats. Review collected by and hosted on G2.com.

What do you dislike about Cyberint, a Check Point Company?

Points to Improve

* Restricted user allocation: the system places limitations on how many user profiles can be provisioned, which can impact flexibility and growth in larger SOC environments.

* Alert accuracy: although the detection quality is high overall, some notifications turn out to be false positives, requiring analysts to dedicate extra effort to verification. Review collected by and hosted on G2.com.

SC
Carabinieri
Enterprise (> 1000 emp.)
"A Crucial Tool for Proactive Digital Risk Management"
What do you like best about Cyberint, a Check Point Company?

The greatest value of Cyberint lies in its proactive intelligence that extends far beyond our corporate perimeter. It provides a vital "attacker's-eye view" of our organization, giving us early warnings on critical risks like credential leaks, emerging phishing campaigns, and unauthorized brand usage. This foresight allows us to be proactive rather than reactive. The managed takedown feature is another standout, efficiently handling the removal of malicious content and saving our team valuable time. The backing by Check Point also adds a layer of confidence in the product's future roadmap. Review collected by and hosted on G2.com.

What do you dislike about Cyberint, a Check Point Company?

To unlock the platform's full potential, new users should anticipate a significant learning period; its extensive capabilities are not immediately intuitive. During the initial phase, it's crucial to invest time in fine-tuning the alert rules to filter out noise, as the raw volume can be overwhelming at first. Furthermore, while the reporting is adequate for general use, I'd like to see more robust customization options to create bespoke reports for different audiences, from technical analysts to executive leadership. Review collected by and hosted on G2.com.

Verified User in Security and Investigations
US
Enterprise (> 1000 emp.)
"A Powerful Ally in Proactive Cyber Defense"
What do you like best about Cyberint, a Check Point Company?

What I like best about Cyberint is the depth and precision of its threat intelligence capabilities. The platform provides a clear and actionable view of emerging cyber risks, making it much easier to anticipate and mitigate potential attacks. Its integration with Check Point’s ecosystem ensures that intelligence is not only comprehensive but also seamlessly aligned with enterprise security operations. For someone working in IT, it is extremely valuable to have access to such a reliable source of contextualized intelligence that directly improves decision-making and response time. Review collected by and hosted on G2.com.

What do you dislike about Cyberint, a Check Point Company?

The most helpful aspect of Cyberint is its ability to transform complex cyber threat data into actionable insights. Instead of overwhelming analysts with raw information, the platform presents prioritized, relevant findings that can be quickly understood and acted upon. This greatly reduces the time spent on manual investigation and increases efficiency across security operations. In addition, the dashboards and reporting tools are intuitive and customizable, which makes it easier to align threat intelligence with specific business needs. For IT professionals, this translates into better visibility, faster incident response, and more effective protection of critical assets. Review collected by and hosted on G2.com.

Verified User in Military
UM
Small-Business (50 or fewer emp.)
"Enhancing SOC Capabilities with Cyberint"
What do you like best about Cyberint, a Check Point Company?

Cyberint has proven to be a highly valuable threat intelligence and digital risk protection platform within the operational framework of a SOC. Its integration with existing monitoring workflows has significantly enhanced our ability to detect and qualify potential threats in advance, which is particularly critical in public administration environments.

Key strengths identified include:

- Comprehensive intelligence feeds: broad and continuously updated coverage of OSINT, deep, and dark web sources, delivering timely alerts on indicators of compromise and emerging threats.

- Contextualized reporting: intelligence outputs provide not only “what” is happening, but also the “why” and “how” behind a potential attack, enabling deeper situational awareness.

- Operational support for analysts: correlation and enrichment features streamline the triage process, reducing response times and allowing analysts to focus on the most relevant events.

- Ease of integration: seamless compatibility with SIEMs and other platforms already in use, ensuring immediate operational value within daily workflows.

- Responsive and proactive support: Cyberint’s team offers fast assistance and tailored briefings, facilitating the handling of complex and sensitive cases.

Overall, Cyberint stands out as a highly effective tool for SOC operations in sensitive environments, providing enhanced situational awareness, reducing the exposed attack surface, and enabling a more efficient and proactive response to cyber threats. Review collected by and hosted on G2.com.

What do you dislike about Cyberint, a Check Point Company?

Areas for Improvement

Limited number of user accounts: the platform currently imposes restrictions on the number of users that can be created, which may hinder scalability in larger SOC teams.

False positives: while generally accurate, alerts occasionally include false positives that require additional analyst time for validation. Review collected by and hosted on G2.com.

Verified User in Retail
AR
Enterprise (> 1000 emp.)
"Good Overall, Some Areas to Improve"
What do you like best about Cyberint, a Check Point Company?

Cyberint offers a strong feature set (ASM, dark-web monitoring, takedowns) that delivers wide range external-risk coverage. The alerts we received were mostly relevant, helping our internal team focus on real threats.Customer support is excellent, with managed-service options and dedicated analysts who respond promptly, validate findings, and help reduce the workload for our internal team. Review collected by and hosted on G2.com.

What do you dislike about Cyberint, a Check Point Company?

Our subscription allowed access to the system for only a limited number of users. Review collected by and hosted on G2.com.

Quebec V.
QV
Gerente de Cyber Threat Intelligence
Mid-Market (51-1000 emp.)
"Excellent cyber-intelligence company"
What do you like best about Cyberint, a Check Point Company?

I really like the Intel-Dataleak part, it is a powerful tool that provides visibility into significant breaches of any asset. It helps me make those important decisions proactively to mitigate any leaks that may occur, in addition to the specific alerts we have about actor groups and vulnerabilities, as well as vulnerability searches on your exposed attack surface. Review collected by and hosted on G2.com.

What do you dislike about Cyberint, a Check Point Company?

I don't like the sandbox part, I think it could be improved by allowing more types of files to be uploaded and generating a more complete analysis, since it only allows uploading an .exe, but if we upload a compressed file, it might not be as effective. Review collected by and hosted on G2.com.

קובי .
ק
CISO
Enterprise (> 1000 emp.)
"Highly Recommend Check Point's Cyberint System for Superior Threat Intelligence"
What do you like best about Cyberint, a Check Point Company?

We have been consistently impressed with Check Point's Cyberint system and the exceptional service accompanying it. This platform has proven to be an invaluable asset in bolstering our organization's cybersecurity posture.

From a performance perspective, Cyberint delivers robust and actionable threat intelligence. The system's ability to provide deep insights into potential threats, analyze attack surfaces, and offer early warnings has significantly enhanced our proactive defense capabilities. We particularly appreciate its comprehensive data collection and sophisticated analytical tools, which translate complex threat landscapes into clear, digestible information that our security team can act on immediately. The accuracy and relevance of the intelligence provided have consistently exceeded our expectations, allowing us to stay ahead of evolving threats.

Beyond the powerful technology, our experience with Check Point's team and their service has been outstanding. Their professionalism, responsiveness, and dedication to customer success are truly commendable. From the initial onboarding process to ongoing support and expert guidance, the Cyberint team has demonstrated a deep understanding of our specific needs and has always been readily available to assist. Their proactive communication and willingness to go the extra mile have made our partnership feel truly collaborative. Review collected by and hosted on G2.com.

What do you dislike about Cyberint, a Check Point Company?

While not a "dislike" of the product's functionality, some reviews hint at the cost being a factor Review collected by and hosted on G2.com.

TK
Threat Intelligence Analyst
Enterprise (> 1000 emp.)
"A very convenient and user-friendly system"
What do you like best about Cyberint, a Check Point Company?

The best thing about the Cyberint system is its user-friendliness. It is very intuitive and easy to understand how to use its tools efficiently. I am very satisfied with how the system functions and provides us with the necessary information and solutions quickly and simply. Review collected by and hosted on G2.com.

What do you dislike about Cyberint, a Check Point Company?

There is nothing we dislike about the Cyberint system. Everything required for the system to function optimally is perfect and easy to use. Review collected by and hosted on G2.com.

Verified User in Marketing and Advertising
AM
Enterprise (> 1000 emp.)
"All in one threat intelligence platform"
What do you like best about Cyberint, a Check Point Company?

The ability to get assets discovered for you and alerting on them is very helpful. It recommends the action for the alerts on the page itself. The range of alerts is vast and mostly accurate. It also has the functionality to check for phishing of our products using a phishing beacon. The ease by which we can reach out to support for more information on an alert from the alert page itself is seamless. The weekly and monthly threat landscape reports are very informative. Cyberint has greatly enhanced our security initiatives and has added a lot of value to us. Review collected by and hosted on G2.com.

What do you dislike about Cyberint, a Check Point Company?

There are some minor ui bugs like the alerts dont open in a new page when you ctrl and click. No ability to add ip ranges. Review collected by and hosted on G2.com.

Pricing Insights

Averages based on real user reviews.

Time to Implement

2 months

Return on Investment

6 months

Average Discount

12%

Cyberint, a Check Point Company Comparisons
Product Avatar Image
Recorded Future
Compare Now
Cyberint, a Check Point Company Features
Asset Management
Proactive Alerts
Malware Detection
Intelligence Reports
Security Validation
Monitoring - Deep Web
Monitoring - Dark Web
Analysis
Product Avatar Image
Product Avatar Image