0% found this document useful (0 votes)
66 views8 pages

Solution Brief Infinity Platform Overview

The Check Point Infinity Platform addresses rising complexity, cost, and risk in digital security by offering a unified system for managing security controls across various environments. It features AI-powered tools, collaborative threat prevention, and a flexible per-annum licensing model to improve total cost of ownership (TCO) while enhancing compliance and risk posture. The platform supports a hybrid mesh network security architecture, enabling organizations to optimize security across on-premises and cloud environments efficiently.

Uploaded by

hermannthibaut98
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views8 pages

Solution Brief Infinity Platform Overview

The Check Point Infinity Platform addresses rising complexity, cost, and risk in digital security by offering a unified system for managing security controls across various environments. It features AI-powered tools, collaborative threat prevention, and a flexible per-annum licensing model to improve total cost of ownership (TCO) while enhancing compliance and risk posture. The platform supports a hybrid mesh network security architecture, enabling organizations to optimize security across on-premises and cloud environments efficiently.

Uploaded by

hermannthibaut98
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

REDUCE COMPLEXITY, IMPROVE TCO, AND

STRENGTHEN YOUR RISK POSTURE


INFINITY PLATFORM 2

Complexity, cost and risk are going up


Infinity Platform Immediate Benefits
for digital and security
Generative AI tools, interconnected supply • Lower complexity through consolidation,
automation and AI services
chains and cloud applications are all expanding
the attack surface, while making it easier than • Improved TCO through a single all-
ever for threat actors to launch cyberattacks. inclusive license, and lower operational
overheads
And as organizations adopt hybrid work,
hybrid networks, and hybrid clouds, talent • Stronger compliance and risk posture with
shortages and churn exacerbate the difficulty unified auditing, and collaborative threat
prevention
of maintaining an acceptable risk posture while
meeting both new and existing regulations.

Distilling core enterprise security Pivoting to a Platform Approach


needs If there is one step that executives can take
to address these predicaments, it is moving
The ongoing evolution and convolution of digital
to a single unified system for managing their
environments is creating three main challenges
security controls. Pivoting to a platform
for executives:
approach lets you tear down product silos,
• Managing complex and changing consolidate vendors and gain a central source
environments – Hybrid and interconnected of truth for compliance and auditing.
digital environments lead to an abundance The Check Point Infinity Platform is an AI-
of security controls, with no central visibility powered, cloud-delivered security management
and mitigation, while emerging technology platform that reduces complexity, lowers TCO
adds complexity and risk and tightens your compliance and risk posture,
• Demonstrating cost-effectiveness - while delivering the industry’s #1 catch rate.
Budgets are always tied to risk reduction Consolidate security for networks, clouds,
and business value, requiring stakeholders email, networks, endpoints, applications
to show how any new security investment and more. Slash overheads through unified
will lower risk and add value administration and SecOps, cross-product
policy enforcement and AI-based services, all
• Managing compliance and risk – CIOs,
packaged as a single, flexible, and predictable
CISOs, CDOs and other executives need to
per annum license.
minimize security risk to the business while
ensuring optimal uptime and complying
with industry regulations
INFINITY PLATFORM 3

What is the Check Point Infinity Platform?


The Infinity Platform is the shared infrastructure that powers Check Point’s network security,
cloud security, workspace security, and cross-product security operations (detection and
response). Below are the platform’s core shared components:

Unified management • The Infinity Portal consolidates security management for your
portal entire digital estate – from clouds, email, applications, and devices
to networks, and the anywhere workspace. Run security from one
console instead of 3, or 5, or 12.
Shared users, admins • Users and administrators are defined once, and available for policy
and logging creation across the portfolio.
• TrustID – Delivers centralized identity management across on-prem
and cloud-based identity providers.
• Unified cross-product, visibility, logging, events and reporting.
Collaborative threat Cross-portfolio threat prevention and policy enforcement through:
prevention
• ThreatCloud AI – Shares new threat signals across all Check Point
enforcement points globally in less than 2 seconds, protecting against
zero-days, phishing and ransomware
• Infinity Playblocks – Automatically extends policy-based threat
prevention from one enforcement point to multiple others, including
3rd party security vendors
• Infinity XDR – Provides incident correlation and response across
the product portfolio and even 3rd party security vendors for a true
platform-based approach to security operations
AI-based tools • AI Copilot – Accelerates security administration, trouble-ticket
resolution and security operations with a generative AI assistant that
provides insights, suggests solutions, and creates or updates policies
• GenAI Protect – Enables the safe adoption of GenAI tools in the
enterprise with AI-based data classification and data loss prevention
• AI-enhanced Management – Get network health insights across
branches and datacenters with AIOps, and optimize policy
configuration with AI Policy Insights and AI Policy Auditor
Unified per-annum • Infinity Platform Agreement - Offers a simple, flexible and predictable
license per-annum pricing model that lets you stay agile by changing
enforcement points throughout the year using the same contract.
Consulting and managed • Infinity Global Services - Provides security assessment services,
Services including external risk management, training programs, professional
services, consulting, incident response and managed services
INFINITY PLATFORM 4

The Infinity Platform comprises four pillars, aligned with key security use cases:

Quantum AI-powered threat prevention for securing mesh networks


Secure the Network including the data center, perimeter, branch, and remote users.

CloudGuard
Prevention-first cloud security from code to cloud.
Secure the Cloud

Harmony Comprehensive workspace security, including endpoint, mobile,


Secure the Workspace email, and SaaS applications.

Infinity Platform Services Security operations that span External Risk Management,
Security Operations Extended Prevention and Response (XDR), and Infinity Global
and Services Services (mentioned above).
INFINITY PLATFORM 5

Hybrid Mesh Network Security Architecture


The new corporate network has become exponentially more complex, leading organizations to
reevaluate their security architecture and connectivity fabric. Adopting security models that are
solely cloud-based or on-premises, leads to performance degradation, security inconsistencies
and compliance issues. A hybrid security model, on the other hand, combines the best of all worlds
to optimize business agility, security, overall experience, and costs.

At Check Point, we
On-Premises Security Cloud (SASE) Security Hybrid Security
recognized the need for a
Connectivity Limited Mesh only Agile mesh hybrid approach to deliver
Enforcement point Site Cloud Site and/or cloud network security and have
developed an architecture
Performance Limited Limited Optimal over the years that delivers
Cost Medium High Optimal on that promise.

What is a Hybrid Mesh Network Security Architecture?


Our unique approach, called a Hybrid mesh
Network Security Architecture, combines
security enforcement points in multiple
form factors, enabling enterprises to mix
and match them to best meet their unique
needs and network architecture. This
approach eliminates reliance on a single
enforcement point, making security more
resilient, distributed, cost-effective and
scalable.

Hybrid Mesh Network Security form factors


include hardware and virtual appliances,
cloud-delivered points of presence (PoPs),
endpoint agents, browser extensions and
mobile device agents. This approach enables organizations to effectively secure branch offices,
data centers, cloud deployments, SaaS applications, mobile users and email correspondence.

At the heart of the Hybrid Mesh Network architecture lies SASE . However, connectivity between
the different edge types, doesn’t rely solely on the SASE network, as other security form factors
can communicate directly with each other or externally to SaaS and web destinations.

For example, remote users browsing the web with an on-device agent can connect directly to the
destination website without going through the cloud SASE service for security inspection. Similarly
workloads can be migrated from the on-prem datacenter to IaaS, without requiring cloud-based
routing. Conversely, a remote user connecting to public cloud applications, can do so through the
nearest SASE PoP, so their traffic isn’t backhauled through an on-prem appliance, delivering a
better user experience.
INFINITY PLATFORM 6

Infinity Platform Immediate Benefits Improved TCO


By adopting a platform approach to security Lower overall cost by paying for all your security
management, enterprises reap several critical needs with a single, flexible license that lets
benefits. you change enforcement points at any time.
Experience fewer breaches, and spend less time
and money patching your own firewalls. Do more
Reduced management complexity with less using AI-based services and automated
Organizations can quickly reduce management workflows.
complexity and implement strategic initiatives.
Simple, flexible per annum pricing
One Intuitive Portal • The Infinity Platform Agreement offers a
simple, flexible and predictable per-annum
• Get one console for managing security across
pricing model that includes all the hardware,
networks, email, clouds, applications and
software, licensing and support you will
devices
need—with no hidden costs(!)
• Reduce the number of steps required to
create and update policies with our standard
Lower breach and patching-related expenses
setting UI
• Demonstrate improved TCO with a better
• Apply consistent policy across virtual, cloud
overall risk posture, fewer breaches to
and on-premises workloads and networks handle thanks to Check Point’s industry-
• Centrally audit across your digital estate leading catch rate for malware and phishing,
with unified visibility, logging and incident and shorter incident response times through
management unified security operations
• Spend less time patching your own security
Increased Automation and Integration
infrastructure against high severity in-
product vulnerabilities (CVEs) thanks to
Automate processes through ready-made APIs
Check Point’s superior product integrity
for common cloud providers, ticketing solutions
and networking systems
Reduced administration overhead
• Secure CI/CD pipelines from the get-go, with
agile automated policy—enforced in the cloud • Save precious staff time by consolidating
administration with our standard-setting UI,
or on-prem—leveraging our first-packet
automating cross-product workflows, and
detection engine that auto-recognizes over
integrating your environment with 3rd party
10,000 applications.
security vendors and common ticketing tools
• Share security alerts to and from 3rd party
• Leverage built-in expert generative AI
security vendors like CrowdStrike and MS
assistants to slash the time required to
Defender
perform common tasks
Support for Strategic Initiatives • Get AI-based insights on network health and
• Kick off strategic initiatives such as adopting optimized policy configuration
a hybrid mesh firewall or enforcing zero trust
security from a unified architecture Tighter compliance and risk posture
• Step up your security architecture by Meet new and emerging regulations with central
leveraging our expert consulting services for auditing and dedicated compliance modules.
complex installations, architecture reviews Strengthen your risk posture with the proven #1
and product roadmaps to support your vendor for threat prevention and unified security
initiatives (IGS). operations.
INFINITY PLATFORM 7

Ensure regulatory compliance threat signals from any enforcement point are
• Get unified monitoring and auditing for shared globally in less than 2 seconds, so up-to-
central visibility and event management. the moment protections are consistently enforced
everywhere.
• Verify compliance status and improve
risk posture with dedicated modules • Spend less time and resources on remediating in-
that provide actionable insights for IaaS, product vulnerabilities (CVEs) and related incidents.
SaaS, on-prem firewalls and GenAI Thanks to our high product integrity, Check Point
applications. has up to 98% less high severity in-product CVEs
than comparable security vendors firewalls.
• Manage external risk arising from third
party supply chains, phishing, brand • Virtually patch against the latest 3rd party
impersonation, social media, dark web vulnerabilities (CVEs) faster, with the shortest
and more. Easily request takedowns turnaround time for newly released patches issued
with a 90% success rate. by third party vendors.

Strengthen your security posture • Automate remediation of security incidents with


fully integrated playbooks that apply policies across
• Get the best threat prevention available enforcement points (e.g., email, network, clouds
on the market with our industry-leading and more) and even integrate with third party
99.9% catch rate for never-before-seen security vendors for fully consolidated detection and
malware, phishing and zero days. New response.

Why choose Check Point?


While other vendors offer a ‘single-logo’ solution, Check Point has built a truly integrated single-
vendor platform that delivers the #1 catch rate for malware and phishing, sold as a simple, single
per-annum license.

• 99.8% industry-leading catch rate for 0-day


malware and phishing per Miercom report
The best • Industry’s highest catch rate • Fewest in-product vulnerabilities (CVEs) among
security. • Leader in product integrity security platform vendors
Period. • Leader in Zero Trust enablement • Per Miercom Zero Trust Platform Assessment
and Q3 2023 Forrester Wave™: Zero Trust Platform
Providers

• One console vs. three, five or nine portals among


• One portal to manage it all top-tier vendors
The most
• Most intuitive policy management • Fewer clicks and less time to complete common
intuitive
• Support for the broadest set of tasks – see the Agony Meter
interface
use-cases • Code to cloud,email, networks, applications,
devices, SecOps, external risk and more

• On average – 20% lower cost for three or more


The only • All-inclusive pricing with no enforcement points based on vendor’s list price
license to cover hidden costs - hardware, • Learn more here about the Infinity Platform
EVERYTHING software, subscriptions and Agreement
you need support • Ask your partner about the Infinity Assessment
Calculator
INFINITY PLATFORM 8

Why Settle for Complexity? Start Exploring Infinity.


Shifting to one platform won’t happen overnight, but we’ll help you get there.

Engage with our Global CISO team to discuss your needs with former CISOs who know the ins and
outs of your role and discover how we can help. Itching to get your hands dirty?

It takes a minute to sign up for an Infinity Portal account and start exploring it from the inside.

Worldwide Headquarters
5 Shlomo Kaplan Street, Tel Aviv 6789159, Israel | Tel: +972-3-753-4599
U.S. Headquarters
100 Oracle Parkway, Suite 800, Redwood City, CA 94065 | Tel: 1-800-429-4391
[Link]

You might also like