Infinity ThreatCloud AI

The Brain Behind Check Point’s Best Security​

Read MoreMeet ThreatCloud AI

Collaborative Security - Infinity ThreatCloud AI

With Check Point defending your business, you are empowered with enhanced and precise prevention capabilities against the most sophisticated attacks. This is made possible by the formidable intelligence of Infinity ThreatCloud AI, the central nervous system for our  security solutions.

ThreatCloud Collaborative Security 600x250 1

Prevention first

Fastest block attack rate to prevent attacks

ThreatCloud Collaborative Security 600x250 2

Best catch rate

With both known and unknown threats

ThreatCloud Collaborative Security 600x250 3

Near zero false positives

Regain time that would be lost addressing false alarms

How ThreatCloud AI Works

threatcloud the brain diagram horizon

As part of Infinity Core Services, ThreatCloud AI aggregates and analyzes big data telemetry and millions of Indicators of compromise (IoCs) every day. Our threat intelligence database is fed from 150,000 connected networks and millions of endpoint devices, as well as Check Point Research (CP) and dozens of external feeds. Over 50 engines are packed  with AI-based features and capabilities.

ThreatCloud AI employs advanced AI with over 50 technologies to detect and neutralize novel threats, using big data to update its defenses with the latest Indicators of Compromise. It analyzes telemetry data for precise threat categorization, enhancing security across networks with Quantum, cloud with CloudGuard, operations with Infinity, and user access with Harmony.

How AI changes the world of cyber security

Big Data Threat Intelligence

Aggregating and analyzing big data telemetry and millions of Indicators of Compromise (IoCs) every day

View Live Map

New Zero-Day Phishing

4X More attacks Blocked compared to Signature technologies

zero phishin

DNS Attack Prevented

5X More attacks blocked compared to Signature based technologies

Data Leak (DNS Tunneling), Command and Control Servers Machine-generated domains (DGA)

DNS

Check Point Protects Your Everything with Accurate Prevention

Over 50+ Engines Packed with​ AI-based Features and Capabilities​

600x250

Unknown Malware Detection

Infected hosts detection, sandbox static analysis for executables, documents, and macros

600x250

Zero-Day Phishing

Network and mobile zero-phishing detection, anti-phishing AI engine, email static analysis, and HTML body NLP

600x250

Classify

Documents meta classifier vectorization family classifier, XDR/XPR incidents aggregation, ML Similarity Model, MRAT classifier, IP Port

600x250

Improve Accuracy

Network AI and mobile AI engines aggregator, machine validated signature

600x250

Anomaly Detection

Cloud networks anomaly detection, XDR/XPR user behavior analysis, SSH tunneling

600x250

DNS Security

DNS tunneling, DGA domain generation algorithm

600x250

Campaign Hunting

ThreatCloud AI Campaign Hunting

600x250

Expose Stealth Breaches

Analyst Mind, Malicious Activity Detection

Use Cases for ThreatCloud AI

infinity platform collaborative 600x250
Threat Extraction – Check Point’s Content Disarm and Reconstruction (CDR)

Threat extraction is a Content Disarm and Reconstruction capability of Quantum network and Harmony Endpoint, powered by ThreatCloud AI, the brain behind all of Check Point’s products, Threat extraction: real-time threat prevention that never disrupts the flow of business and provides best security.

infinity platform igs 600x250
Proactively prevent emerging threats

  • Browsing web pages
  • Filling out electronic forms
  • Typing-in credentials
  • Receiving emails
  • Download documents

Explore More about ThreatCloud AI

harmony email collab

New ThreatCloud AI engine designed to prevent IPFS attacks

ThreatCloud AI, the brain behind all of Check Point’s products, combines the latest AI technologies with big data threat intelligence.

Read More

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK