Check Point unveils AI security strategy
Check Point Software Technologies says it has commenced a strategic transformation aimed at adapting for the AI era. The company has unveiled a four-pillar strategy designed to help organisations securely navigate the adoption of AI, as well as three strategic acquisitions to reinforce its platform and support the transformation.
The first component of the four-pillar strategy centres on hybrid mesh network security. This involves solutions for protecting distributed enterprises across hybrid cloud, data centres, branch networks and internet environments via a single AI-powered architecture.
Check Point’s second focus will be workplace security, involving securing the components of the modern digital workspace including endpoints, browsers, email, collaboration platforms and Software-as-a-Service applications.
Third, the exposure management pillar will seek to provide visibility into an organisation’s attack surfaces to enable risk prioritisation based on business context.
Finally, the AI security pillar will seek to protect the lifecycle of AI adoption, including employee usage, enterprise AI applications and autonomous AI agents.
To support the new focus, Check Point has acquired three security companies. Cyata has developed an AI agent identity management platform that enables organisations to discover active AI agents, map permissions, monitor behaviour and enforce automated security policies. Cyclops provides a cyber attack surface management platform. The third company, Rotate, offers an all-in-one platform for managed service providers based on enabling centralised protection across a distributed workforce.
Check Point Chief Strategy Officer Roi Karo said AI is reshaping how organisations operate and how security threats evolve. This is necessitating a fundamental rethink of security, he said.
“Our four-pillar strategy provides a clear framework to secure networks, workspaces, exposure risks and AI-driven environments as a unified platform,” Karo said. “The acquisitions we are announcing today demonstrate how we are executing on this vision and helping customers securely navigate the AI transformation.”
Palo Alto completes CyberArk acquisition
Palo Alto has completed the acquisition of identity security company CyberArk, establishing...
RCE vulnerability discovered in Microsoft Power BI
The Missing Link has announced the disclosure of CVE-2026-21229, a Power BI...
CrowdStrike achieves ISO certification for AI security
CrowdStrike has achieved ISO 42001 certification, validating its approach to responsible...
