Workflow
External Risk Management solution
icon
Search documents
Check Point Software Emerges as a Leader in Attack Surface Management After Acquiring Cyberint, According to Latest GigaOm Radar Report
Newsfilterยท 2025-03-31 15:20
Core Insights - Check Point Software Technologies has strengthened its position in Attack Surface Management (ASM) through the acquisition of Cyberint, which is recognized as a top performer in the GigaOm Radar report [1][2] - The integration of Cyberint's ASM expertise into Check Point's External Risk Management solution enhances automated asset discovery and continuous risk monitoring, providing superior attack surface oversight [1][2] - Gartner predicts that by 2026, organizations prioritizing security investments based on continuous exposure management will be three times less likely to experience a breach, underscoring the importance of robust ASM solutions [2] Company Developments - Cyberint's innovative approach to threat intelligence and strong integration capabilities have earned it the status of Outperformer, positioning it for significant market growth [2] - Check Point's External Risk Management solution, part of the Check Point Infinity Platform, offers proactive security capabilities, integrating ongoing asset discovery, advanced threat intelligence, and AI-powered prevention for real-time visibility and automated risk mitigation [2][3] - The company emphasizes its leadership in the ASM space, highlighting the benefits for customers in managing threats related to their assets and simplifying remediation processes [3] Industry Context - The GigaOm Radar for Attack Surface Management evaluated 29 leading ASM solutions, with Cyberint being recognized for its continuous improvement of core features and accurate alerts [2] - The evolving nature of cyber threats necessitates advanced solutions like Check Point's to help organizations stay ahead of adversaries and enhance their security posture [3] - Check Point's platform includes various technologies aimed at securing different aspects of cyber environments, such as cloud, network, and workspace security [5]