Listing Thumbnail

    Infinity Playblocks

     Info
    Infinity Playblocks is a security automation and response platform for collaborative security with collaborative approach that transforms the prevention paradigm, offering out-of-the-box security and operational oriented playbooks, that are automatically triggered by the connected security products upon attack detection, and operational related incidents, to contain threats and prevent future attacks, always keeping the SOC team alerted and informed.

    Overview

    Play video

    Infinity Playblocks is a security collaboration platform that augments security from local actions to Infinity Playblocks trigger prevention measures across the entire security environment. This allows organizations to contain attacks, prevent them from spreading and reoccurring. With traditional security approach, any security product works at the local environment level in which attacks and threats are assumed to be contained within the silo. Infinity Playblocks shifts the prevention paradigm by introducing a collaborative approach - When the enforcement point identifies a potential security threat, it triggers preventive actions across the entire security infrastructure.

    Infinity Playblocks gives Collaborative Prevention a. Prevention playbooks, a set of predefined preventive actions to contain the threat and prevent future attacks, are automatically triggered by any security product, upon attack detection. b. Contain and prevent the attack from spreading across the entire security environment with preventive actions including isolating hosts, initiating kill processes and notifying admins c. Automatically integrated with Check Point products: Quantum, Harmony (Endpoint, Mobile)

    Infinity Playblocks allow immediate prevention: d. Reduce operational overhead by eliminating the need to manually update policies and rules e. +60 Out of the Box playbooks include the ability to automatically block an IP across all enforcement points, notifying admins of policy installations on gateways, quarantining internal IPs, quarantining files etc.

    Highlights

    • The Playblocks Security Automation & Collaboration Platforms offers dozens of automated playbooks off-the-shelf, include the ability to automatically block an IP across all enforcement points, notifying admins of policy installations on gateways, quarantining internal IPs, quarantining files etc. Infinity Playblocks can be integrated with existing workflow management systems, such as ServiceNow, Jira, Microsoft Teams, etc. make products, people & processes work together.

    Details

    Delivery method

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Infinity Playblocks

     Info
    Pricing is based on contract duration. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    Integrations with Check Point's security solutions and IT management tools
    Security automation and response platform for collaborative security with collaborative approach that transforms the prevention paradigm, offering out-of-the-box security and operational oriented playbooks, that are automatically triggered by the connected security products upon attack detection, and operational related incidents, to contain threats and prevent future attacks, always keeping the SOC team alerted and informed.
    $12.84

    Vendor refund policy

    No Refunds.

    Custom pricing options

    Find a fit for enterprise or unique needs with a private offer.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    This offer includes Premium Support. For the full list of included support services visit: https://www.checkpoint.com/support-services/support-plans/  To open a support ticket, you would need to have a Check Point user center account. If you do not have a user center account, you can sign up for one here: https://accounts.checkpoint.com . Need support? Contact us at

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    19 external reviews
    External reviews are sourced from G2  and are not included in the star rating for this product.
    Michael T.

    Efficient endpoint security tracking software

    Reviewed on Oct 30, 2024
    Review provided by G2
    What do you like best about the product?
    Check Point Endpoint Security Suite has enhanced secure collaboration of teams in the enterpries and remote areas. The platform tracks data from initial processing to the end user providing best security measures that cannot be easily compromised. Data analysis has been safe and there is zero cases of malicious attacks.
    What do you dislike about the product?
    The security suite has achieved most crucial objectives of securing endpoint devices.
    What problems is the product solving and how is that benefiting you?
    We have effectively configured this software with endpoint devices to enhance reliable data safety. Remote workforce can easily share data and communicate with full protection from malware attacks.
    John D.

    Robust protection suite against cyber attacks

    Reviewed on Oct 10, 2024
    Review provided by G2
    What do you like best about the product?
    The platform offers comprehensive protection cover against all forms of external threats that can affect development lifecycle. It provides secure access with powerful VPN to our remote developers to enhance secure collaboration and connection. Check Point Endpoint Security Suite has enhnaced compliance with security policies that safeguards data.
    What do you dislike about the product?
    The performance has been stable since we deployed this platform in the enterprise.
    What problems is the product solving and how is that benefiting you?
    The software has maintained top notch security services that responds quickly to curb cyber threats. It easily integrates with CI/CD pipelines that enforces security checks for deployed codes.
    Milton P.

    Comprehensive malware threat prevention platform

    Reviewed on Aug 13, 2024
    Review provided by G2
    What do you like best about the product?
    This is the most advanced tool that has highly prevented cyber attacks in my department. It offers timely alerts when there impending ransoware attacks targeting our development projects. There were high rate of cases that could lead to higher risks and expose confidential customer data to external threats. Check Point Endpoint Security Suite has promoted secure data handling ethics.
    What do you dislike about the product?
    I encountered few learning curve challenges after deployment which lasted shortly afer full enrollment for video and physical training sessions.
    What problems is the product solving and how is that benefiting you?
    It provides effective data protection services for both personal and customer data. The antivirus and firewall protections have prevented me from most risks when I am browsing.
    Gaurav C.

    Enhancing Endpoint Security

    Reviewed on Jul 24, 2024
    Review provided by G2
    What do you like best about the product?
    Check Point Endpoint Security is valued for its complete solution to endpoint security concerns, manageability and strong protection capabilities.
    What do you dislike about the product?
    Working with Check Point Endpoint Security no dislikes.
    What problems is the product solving and how is that benefiting you?
    1)Advanced Threat Prevention
    2)Centralized management
    3)Secure Remote Access
    4)Operational Efficiency
    Nayana K.

    Safeguarding Endpoints

    Reviewed on Jul 23, 2024
    Review provided by G2
    What do you like best about the product?
    Check Point Endpoint Security provides soutions to protecst endpoint devices from cyber threats. It protects sensational data from unverified access or sharing.
    What do you dislike about the product?
    While working with Check point Endpoint Security, No dislike occured about the product.
    What problems is the product solving and how is that benefiting you?
    As working with product,faced many challenges, protection againsd advanced cyber threats. It improves the efficiency. Due to it protects from wide range of threats, Organization focuses on various business activities.
    View all reviews