HomeRisk ManagementsCheckpoint's new generative AI tool provides platform-wide intelligence and remediation

Checkpoint’s new generative AI tool provides platform-wide intelligence and remediation

Published on

spot_img
Checkpoint’s new generative AI tool provides platform-wide intelligence and remediation

Check Point Software Technologies has introduced a new AI-based tool called Infinity AI Copilot aimed at improving the efficiency and speed of security decision-making within its Infinity range of solutions. The tool is designed to handle routine administrative tasks and analytical assessments to address the challenges of time and expertise that organizations face in the current threat environment.

Infinity AI Copilot is extended across the platform, covering security for workspaces, networks, and the cloud, to provide a more comprehensive threat intelligence. Eyal Manor, VP of product management at Check Point Software, explains that the tool utilizes generative AI to integrate across the entire platform. When an administrator raises a question about a security incident, the tool considers XDR data, observed events, other tools in use, and the configuration of security policies across other products to provide a holistic response.

Utilizing natural language processing, the AI tool allows administrators to create and update policies, conduct guided incident investigations, and apply controls and rules through a text-based chat interface, similar to ChatGPT. By extending its reach across the platform, the organization aims to address the limitations of single-point tools by providing a more integrated and comprehensive view of threat intelligence to tackle the latest vulnerabilities.

Manor provides an example of how the AI tool can identify and address security threats. If a computer is compromised, the tool can determine the extent of the vulnerability across the organization, quarantine the infected computer, and even remove malicious email attachments to prevent threats from spreading. Moreover, it learns the organization’s policies, rules, objects, logs, and product documentation to provide contextualized and relevant answers to administrative queries, incident response, and threat detection.

Check Point Software emphasizes the uniqueness of the AI tool, highlighting its ability to learn from a wider set of data sources across the organization. Manor points out that the tool’s capability to observe data, logs, security policies, blogs, and other external sources makes it stand out from other GenAI-based security tools.

The Infinity AI Copilot aims to address time-consuming security tasks by harnessing AI automation and intelligence. Check Point intends to reduce the time and expertise required for common administrative tasks, which are often in short supply in the cybersecurity field. Manor explains that the tool is designed to assist analysts by automating tasks that would typically require years of experience and expertise.

Overall, the introduction of the Infinity AI Copilot marks a significant advancement in the field of cybersecurity, as it leverages AI to provide a more comprehensive and integrated approach to security decision-making and incident response. By addressing the challenges of time and expertise, the tool aims to empower organizations to navigate the evolving threat landscape more effectively.

Source link

Latest articles

Bhojon Restaurant Management System 2.7 Vulnerable to Insecure Direct Object Reference

The Bhojon restaurant management system version 2.7 has been found to have an insecure...

North Korean Hackers Aim for Military Advantage by Targeting Critical Infrastructure

The global cybersecurity community has been put on high alert, as the UK, US,...

Learn PenTesting and hacking in this $45 course bundle

The cybersecurity industry is facing a high demand for skilled professionals, but the traditional...

More like this

Bhojon Restaurant Management System 2.7 Vulnerable to Insecure Direct Object Reference

The Bhojon restaurant management system version 2.7 has been found to have an insecure...

North Korean Hackers Aim for Military Advantage by Targeting Critical Infrastructure

The global cybersecurity community has been put on high alert, as the UK, US,...

Learn PenTesting and hacking in this $45 course bundle

The cybersecurity industry is facing a high demand for skilled professionals, but the traditional...
en_USEnglish