Check Point Software Emerges as a Leader in Attack Surface Management After Acquiring Cyberint, According to Latest GigaOm Radar Report
Cyberint, rebranded as Check Point External Risk Management, offers a comprehensive view of an organization's cyber threats across the open, deep, and dark web
April 08, 2025

Check Point® Software Technologies Ltd.(link is external) has emerged as a leading player in Attack Surface Management (ASM) with its acquisition of Cyberint, as highlighted in the recent GigaOm Radar report.

Cyberint, recognized as a top performer in the Maturity/Platform Play quadrant, now brings its ASM expertise to Check Point’s External Risk Management(link is external) solution. This combination of automated asset discovery and continuous risk monitoring with advanced threat intelligence provides customers with superior attack surface oversight and enhanced security measures.

According to Gartner(link is external), “by 2026, organizations that prioritize their security investments based on a continuous exposure management program will be 3X less likely to suffer a breach,” highlighting the need for a strong ASM solution. The GigaOm Radar for Attack Surface Management assessed 29 leading ASM solutions, with analyst Chris Ray highlighting Cyberint’s performance. According to Ray, “Cyberint achieved its Outperformer status thanks to its innovative approach to threat intelligence and robust integration capabilities. The company’s continuous improvement of core features, along with an expanded scope of threat intelligence and more accurate alerts, positions it for significant market growth in the coming years.”

As part of the Check Point Infinity Platform(link is external), the External Risk Management solution equips organizations with proactive security capabilities to effectively oversee their attack surface. By merging ongoing asset discovery, cutting-edge threat intelligence, and AI-powered prevention, this solution delivers real-time visibility and automated risk mitigation, integrating smoothly with the Check Point portfolio.

“We are proud to be recognized as a leader in this space,” said Yochai Corem, VP of External Risk management at Check Point Software Technologies. “Our leadership shows how our customers can benefit from a comprehensive external view mapped to the threats related to their assets and the ability to simplify the remediation to those threats.”

With cyber threats evolving at an unprecedented pace, Check Point’s approach ensures organizations can stay ahead of adversaries, reduce exposure, and enhance their overall security posture with ease. Other standout features highlighted in GigaOm’s evaluation include:

Augmented Threat Visibility: Continuous and autonomous scanning of the entire modern attack surface including IP, Domains, third party, dark web and more

Proactive Security Validation: Passive attack surface discovery combined with active exposure validation. This proactive scanning capability tests the exploitability of vulnerabilities and exposures on internet-facing assets so customers can quickly identify and remediate imminent risks

Advanced Threat Intelligence: Through Check Point ThreatCloud AI(link is external), the platform provides a combined view, facilitating rapid, real-time threat intelligence sharing, enhancing the speed and effectiveness of threat detection and response

Share this

Industry News

May 29, 2025

Sauce Labs announced the general availability of iOS 18 testing on its Virtual Device Cloud (VDC).

May 29, 2025

Infragistics announced the launch of Infragistics Ultimate 25.1, the company's flagship UX and UI product.

May 29, 2025

CIQ announced the creation of its Open Source Program Office (OSPO).

May 28, 2025

Check Point® Software Technologies Ltd.(link is external) announced the launch of its next generation Quantum(link is external) Smart-1 Management Appliances, delivering 2X increase in managed gateways and up to 70% higher log rate, with AI-powered security tools designed to meet the demands of hybrid enterprises.

May 28, 2025

Salesforce and Informatica have entered into an agreement for Salesforce to acquire Informatica.

May 28, 2025

Red Hat and Google Cloud announced an expanded collaboration to advance AI for enterprise applications by uniting Red Hat’s open source technologies with Google Cloud’s purpose-built infrastructure and Google’s family of open models, Gemma.

May 28, 2025

Mirantis announced Mirantis k0rdent Enterprise and Mirantis k0rdent Virtualization, unifying infrastructure for AI, containerized, and VM-based workloads through a Kubernetes-native model, streamlining operations for high-performance AI pipelines, modern microservices, and legacy applications alike.

May 28, 2025

Snyk launched the Snyk AI Trust Platform, an AI-native agentic platform specifically built to secure and govern software development in the AI Era.

May 28, 2025

Bit Cloud announced the general availability of Hope AI, its new AI-powered development agent that enables professional developers and organizations to build, share, deploy, and maintain complex applications using natural language prompts, specifications and design files.

May 27, 2025

AI-fueled attacks and hyperconnected IT environments have made threat exposure one of the most urgent cybersecurity challenges facing enterprises today. In response, Check Point® Software Technologies Ltd.(link is external) announced a definitive agreement to acquire Veriti Cybersecurity, the first fully automated, multi-vendor pre-emptive threat exposure and mitigation platform.

May 27, 2025

LambdaTest announced the launch of its Automation MCP Server, a solution designed to simplify and accelerate the process of triaging test failures.

May 27, 2025

DefectDojo announced the launch of their next-gen Security Operations Center (SOC) capabilities for DefectDojo Pro, which provides both SOC and AppSec professionals a unified platform for noise reduction and prioritization of SOC alerts and AppSec findings.

May 22, 2025

Red Hat announced enhanced features to manage Red Hat Enterprise Linux.