Check Point Software Technologies Ltd. (‘Check Point’) develops, markets and supports a wide range of products and services for IT security by offering a multilevel security architecture that defends enterprises’ cloud, network, mobile devices, Endpoints information and IOT solutions.
The company’s solutions operate under a unified security architecture, Infinity, that enables end-to-end security with a single line of unified security gateways, and allows a single agent for all endpoint securit...
Check Point Software Technologies Ltd. (‘Check Point’) develops, markets and supports a wide range of products and services for IT security by offering a multilevel security architecture that defends enterprises’ cloud, network, mobile devices, Endpoints information and IOT solutions.
The company’s solutions operate under a unified security architecture, Infinity, that enables end-to-end security with a single line of unified security gateways, and allows a single agent for all endpoint security that can be managed from a single unified management console. This unified management allows for ease of deployment and centralized control, and is supported by, and reinforced with, real-time threat intelligence, and autonomous security updates. The company’s products and services are sold to enterprises, service providers, small and medium-sized businesses, and consumers. The company’s open platform framework allows customers to extend the capabilities of its products and services with third-party hardware, and security software applications. The company’s products are sold, integrated, and serviced by a network of channel partners worldwide.
Check Point delivers collaborative security across an organization’s security architecture of the network, cloud, and the workspace. Through its Infinity Global Services product, Check Point provides comprehensive technical services to fulfill the cybersecurity needs of its global customers.
The 3 Cs to Provide Effective Threat Prevention and Security
The Check Point Infinity Platform provides a comprehensive, consolidated, and collaborative security platform to provide threat prevention and security across all attack vectors.
Comprehensive Real-time Threat Prevention: Real-time AI-powered comprehensive threat prevention across all attack vectors, from code to cloud, networks, users, email, and IoT. AI engines deliver industry-leading threat prevention to stop the most sophisticated attacks, including zero-day malware, phishing, and DNS spoofing.
Consolidated Security Operations and Unified Management: Leverage a unified security management platform for efficient security operations to deliver threat prevention to seal security gaps, and enable automatic, immediate threat intelligence sharing across all security environments.
Collaborative: True collaboration across the security platform is essential to gain an advantage over attackers. Security that automatically responds to every threat: AI-powered security engines applied to any attack vector, shared real-time threat intelligence, and anomaly detection with Infinity ThreatCloud AI, automated threat response and orchestration with Infinity XDR/XDR, and Infinity Playblocks, and API-based third-party integration.
With the Infinity Platform, customers obtain these advanced core competencies:
AI-powered
Check Point utilizes real-time, AI-powered comprehensive threat prevention across all attack vectors, from code to cloud, networks, users, email, and IoT. Leveraging over 50 AI engines to deliver industry-leading threat prevention to stop the most sophisticated attacks, including zero-day malware, phishing, and DNS spoofing.
Cloud-driven
The Check Point Infinity Platform leverages the cloud to achieve speed, agility, and scalability. Prevention-first cloud-native security across applications, workloads, and networks gives customers the confidence to automate security, prevent threats, and manage posture at cloud speed and scale.
Centralized management
Customers gain the ability to leverage a unified security management platform for efficient security operations to deliver threat prevention to seal security gaps, and enable automatic, immediate threat intelligence sharing across all security environments.
Prevention-first
Check Point allows its customers to prevent advanced threats with a high level of accuracy and efficacy.
Check Point’s Key Platform Components
The Check Point Infinity Platform offers a comprehensive security platform powered by AI, built on a hybrid mesh network security architecture, with unified management across data centers, perimeter, cloud, endpoint, mobile, IoT, and OT. Key features include:
Best Threat Prevention: On-premises (Quantum), cloud (CloudGuard), workspace (Harmony)
Unified Infinity Management: One security policy across the hybrid mesh network, including on-premises, cloud, and the workspace.
Real-Time Collaborative Threat Intelligence: Integration with Check Point and third-party security products.
Hybrid Network Security Architecture: Agile, full-mesh connectivity supporting direct and cloud-based routing for efficiency, and cost reduction.
The platform leverages AI to reduce complexity, fill security gaps, and protect against expanding threats, providing greater visibility and control.
The Check Point Infinity Platform includes the following:
On-premises Security with Quantum
Hyperscale AI-powered threat prevention for securing mesh networks, including the data center, perimeter, branch, and remote users. A comprehensive family of on-premises security gateways, hyperscale orchestrator, SD-WAN networking, DDoS security, automated prevention for IoT, and cloud security management.
Cloud Security with CloudGuard
Unified, prevention-first cloud-native security across applications, workloads, and networks, giving the confidence to automate security, prevent threats, and manage posture at cloud speed and scale.
Workspace Security with Harmony
Prevents sophisticated attacks across the IT workspace, including emails, web applications, devices, and remote corporate access.
Collaborative Security Operations with Infinity Platform Services
Collaborative prevention-first security operations, and unified management including Extended Prevention and Response (XDR), orchestration, automation, ThreatCloud AI, and generative AI copilot, supported by Check Point 24/7 managed security services, consulting, and training.
In addition, managed and professional services fortify defenses with a comprehensive suite of cybersecurity services, including managed detection and response (MDR), incident response, security architecture design, consulting, and training.
Check Point Infinity Platform Product Solutions
Customer security requirements can change rapidly, as the company has most recently seen with the explosive growth of AI as a means to create more complex and difficult-to-detect social engineering attacks, and as a method to develop more dangerous attack methods. While different industry sectors can have unique security needs, they all share one clear desire: to obtain security solutions that are uniformly comprehensive, consolidated, and collaborative. These 3 Cs are the core of Check Point offerings, and they are clearly achieved through the Check Point Infinity Platform and the four strategic solution areas.
Quantum: Secure Your Network and Data Center Security for Perimeter and Data Center
Check Point Quantum Network Security provides effective and ultra-scalable protection against the most dangerous cyber-attacks targeting customers' networks, cloud, data center, IoT devices, and employees across the enterprise. Check Point Quantum Security Gateways deliver comprehensive security beyond any Next Generation Firewall (NGFW), and manage the most complex security policy requirements. Powered with over 60 security services, these gateways are designed to prevent the most evasive and sophisticated 5th generation cyber attacks.
The speed and evolution of today's zero-day DNS and phishing attacks require AI-powered threat prevention to predict and block malicious behavior without human intervention. Check Point's innovative cybersecurity software revolutionizes cybersecurity and policy management by leveraging AI-powered, cloud-delivered advanced threat prevention, cloud services, integrated IoT security, and SD-WAN, and firewall performance auto-scaling to secure mission-critical applications.
Quantum Network Security
Quantum Network Security delivers security gateways and firewalls that provide comprehensive security beyond any Next Generation Firewall (NGFW), and are designed to manage the most complex security policy requirements, and prevent the 5th generation of cyber attacks. Quantum Security gateways are powered by over 60 security services, including the industry’s complete range of security capabilities, including firewalling, intrusion prevention, application control, anti-malware, anti-phishing, DNS security, as well as sandboxing and file sanitization of email and web documents. All Check Point security gateways receive immediate threat data from Check Point’s ThreatCloud AI global threat intelligence system.
Quantum Force AI-Powered Security Gateways
In February 2024, Check Point introduced a major addition to its enterprise security gateway product line - the new Quantum Force series. This innovative lineup of ten high-performance security gateways and firewalls are designed to meet and exceed the stringent security demands of enterprise data centers, network perimeters, campuses, and organizations of all sizes and industries.
Powered by the advanced Check Point Infinity Platform, which integrates cloud-based security intelligence, Quantum Force Security Gateways present a sophisticated automated threat response system. In addition, customers can manage their Quantum on-premises firewalls and Check Point CloudGuard Network cloud firewalls through a single consolidated management console, to deliver the same consistent security policy across their entire enterprise.
Quantum Maestro: Hyper-scalable security platform delivers on-demand scalability for requirements that range from 30 Gbps to over 1 Terabit per second of full threat prevention. Organizations of any size can benefit from Maestro’s intelligent load balancing firewall cluster design.
Quantum Lightspeed: Data center firewalls, designed for the most demanding environments in the world.
Quantum Firewall Software R82 (security operating system/software): All Quantum Force security gateways and firewalls share the same underlying security operating system. This latest threat prevention and security management release delivers top-rated threat prevention, cloud services, and performance acceleration for Check Point firewalls. This industry-leading operating system provides security controls and management that are a foundational and integral part of today’s security infrastructure. In 2024, Check Point announced the Quantum Firewall Software R82 delivering over 50 new capabilities for enterprise customers, including:
Four new AI engines to find hidden relationships and patterns to prevent sophisticated zero-day phishing and malware campaigns.
Agile Datacenter Operations to accelerate app development with automated integration of security policy. With dramatically simplified firewall virtualization, organizations can achieve faster provisioning of virtual systems for multi-tenancy and agile application development benefiting DevOps.
Operational Simplicity to offer seamless scalability for networks of all sizes, automatically adapting to business growth and traffic spikes. It enables organizations to achieve resilience with built-in load sharing and clustering technology (ElasticXL), while benefiting from faster provisioning and operations for firewall management.
Post-Quantum Cryptography (PQC) to provide the latest NIST-approved cryptography Kyber (ML-KEM) for quantum-safe encryption, providing assurance that today’s encrypted data won’t turn into tomorrow’s treasure chest for threat actors.
Quantum Spark: This family of small/medium business (SMB) security gateways and firewalls feature best-in-class threat prevention performance up to 5 Gbps threat prevention. These firewalls are easy to deploy and manage, and they integrate communication and security into an ‘all-in-one’ solution. Quantum Spark security gateways provide protection for businesses with 1 to 1000 employees, and they can be easily managed from a web portal and from a mobile app. Alternatively, Quantum Spark firewalls can be managed by local Managed Service Providers (MSPs) using Check Point’s specialized MSP management system. Quantum Spark firewalls also offer additional important features, including 5G Cellular and Wi-Fi 6 connectivity, as well as cloud services like SD-WAN and IoT security.
In 2024, Check Point introduced the new high-performance Quantum Spark 1900/2000 series. These new security gateways offer high-performance network security at scale with zero-touch provisioning, advanced cloud management, and automated threat management capabilities, making them ideal for medium-sized businesses.
Quantum IoT Protect: Enables Check Point Security Gateways to auto-discover all IoT devices in a customer’s environment. Automatically identifies and maps IoT devices, and assesses the risk. Prevents unauthorized access to and from IoT/OT devices with Zero Trust profiling and segmentation, and blocks zero-day IoT attacks.
Quantum SD-WAN: Quantum SD-WAN is a new software blade in Check Point Quantum Gateways that extends Check Point’s marketing-leading threat prevention to Software Defined Wide Area Networks (SD-WAN) for optimized network performance and internet connectivity. Quantum SD-WAN enables enterprises to leverage local internet service providers for faster, less expensive internet connectivity without compromising security. Check Point’s Quantum SD-WAN takes a security-first approach to networking by delivering advanced threat prevention along with optimized internet connectivity.
Quantum Rugged (Industrial/OT): Quantum Rugged Security Gateways are specifically engineered to protect against attacks directed at Industrial Control Systems (ICS) and Operational Technology (OT) networks. These firewalls are purpose-built for industrial, manufacturing, and critical infrastructure environments. Check Point Quantum Rugged security gateways deliver proven, integrated AI security, high-speed secure 5G connectivity, and more for deployments in harsh environments as part of a complex end-to-end ICS security solution.
CloudGuard: Prevention-First Cloud Security
From code to cloud, Check Point CloudGuard delivers comprehensive cloud-native security, across applications, workloads, and networks to prevent threats and reduce risks at cloud speed and scale. CloudGuard’s prevention-first approach protects applications and workloads throughout the software development lifecycle, and includes an effective risk management engine, with automated remediation prioritization, to allow users to focus on the security risks that matter, in context. Check Point cloud-native security, delivered through CloudGuard, provides automated security and advanced threat prevention to protect cloud assets and workloads from cyber threats, including sophisticated cyber attacks, and misconfigurations. CloudGuard secures cloud workloads in multiple environments, including AWS, Microsoft Azure, Google, and others, providing relevant capabilities for each cloud environment.
Cloud Network Security: Advanced threat prevention and network security through a virtual security gateway—automated and unified across all multi-cloud environments.
Cloud Web Application and API Security: Powered by contextual-AI, protects web applications and APIs from the most sophisticated types of threats.
Cloud Native Application Protection Platform (CNAPP): Secures the entire application lifecycle from code to cloud. Manages security posture, detects misconfigurations, enforces best practices, prevents threats, and prioritizes risks.
In February 2025, Check Point entered into a strategic partnership with Wiz Ltd. to address the growing challenges enterprises face securing hybrid cloud environments. This collaboration is intended to bridge the longstanding gap between cloud network security and CNAPP through a deep technological integration and strategic business alliance, delivering an industry-leading unified, holistic security solution.
Cloud Security and Posture Management (CSPM): Automates governance across multi-cloud assets and services, including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks, to prevent threats and achieve high fidelity posture management.
Cloud Workload Protection: Seamless vulnerability assessment and runtime protection of modern cloud workloads, including serverless functions and containers.
Code Security: Developer-centric security that seamlessly monitors, classifies, and protects codes, assets, and infrastructure. Protects against exposed API keys, tokens, and credentials, as well as identifies and stops misconfigurations.
Cloud Infrastructure and Entitlement Management: Optimizes user and workload access and privilege management to ensure a least privilege state, and eliminate overly permissive roles. Gains visibility of effective permissions, identifies over-permissive entitlements, and implements suggested roles.
Cloud Detection and Response: Cloud-native threat security forensics through rich machine learning visualization, giving real-time context of threats and anomalies across the multi-cloud environment.
Harmony: Securing the Workspace
Check Point Harmony protects employees, devices, and internet connectivity from malicious attacks, while ensuring secure, remote Zero Trust access at any scale to any corporate application. Check Point Harmony provides endpoint and secure connectivity in various forms for easy and comprehensive remote user access.
Harmony unifies security products to deliver complete remote workspace user security.
Harmony SaaS discovers all the company’s SaaS services, reduces its attack surface, and automatically prevents SaaS-based threats using machine learning engines.
Harmony SASE converges network security capabilities into a single solution with unified management, internet security, and comprehensive Zero Trust network access.
Harmony Endpoint protects users’ PCs from ransomware, phishing, and malware, and minimizes breach impact with autonomous detection and response capability.
Harmony Mobile protects employees’ mobile devices against malicious apps, and network or operating systems attacks.
Harmony Email & Collaboration secures users’ email clients and provides protection for Microsoft Office 365, Exchange, Google G, and others. In 2021, Check Point extended Harmony with cloud-email security through the acquisition of Avanan – a leading cloud-email security company.
Harmony Browse provides secure, fast, and private web browsing by inspecting all SSL traffic directly on the endpoint.
Infinity Platform Services: Security Operations & Services
Collaborative security operations with automated threat response with XDR and Playblocks, shared real-time threat intelligence, and generative AI with ThreatCloud AI and AI Copilot, Managed Services, Consulting, and API integrations with third-party partners.
Managed Services provide comprehensive support for Check Point and third-party systems, delivered with predefined Service Level Agreements (SLAs) for a fixed monthly fee.
Managed Detection and Response (MDR/MPR) is a fully managed SecOps platform providing access to Check Point analysts, researchers, and incident response resources.
Incident Response Services provide structured services to address and mitigate security incidents efficiently.
Security Consulting Services offer expertise in threat exposure management, threat intelligence, and risk assessment.
Professional Services deliver end-to-end design, deployment, optimization, and operational support for Check Point solutions.
Training Services include programs focused on security awareness and executive training to enhance organizational security maturity.
IGS Flex Credits are prepaid service credits offering one year of flexible access to a range of cybersecurity services.
Security Operations & AI
XDR/XPR provides extended detection, prevention, and response capabilities.
Events offer cloud-based monitoring and reporting.
Playblocks deliver advanced orchestration and automation solutions.
Threat Cloud AI provides AI-driven threat intelligence enabling real-time insights for proactive defense.
Network Detection and Response (NDR) is a plug-and-play solution for identifying, investigating, and responding to network-based threats.
External Risk Management (ERM) is a comprehensive solution covering threat intelligence, attack surface management, brand protection, and third-party risk evaluation.
Infinity AI Copilot transforms cybersecurity with Intelligent GenAI and automation to improve security effectiveness and incident response while making security administrators more efficient.
Infinity GenAI Protect enables the safe adoption of generative AI applications in the enterprise. Using groundbreaking AI-powered data analysis that accurately classifies conversational data within prompts, GenAI security solutions deliver GenAI application discovery, prevent data leakage, and enable compliance with regulations.
Infinity AI Cloud Protect: In March 2024, Check Point announced the collaboration with NVIDIA® to enhance the security of AI cloud infrastructure. Check Point Infinity AI Cloud Protect integrates with NVIDIA AI technologies to secure cloud infrastructures at scale. The partnership enables service providers to offer a secure environment for enterprises to develop and deploy AI solutions.
Acquisition
In September 2024, Check Point acquired 100% of the share capital of Cyberint Technologies Ltd., a privately held Israeli company that specializes in comprehensive external risk management solutions, including the detection and takedown of impersonating websites, phishing, and social media accounts, as well as stolen credentials and leaked data associated with organizations.
Sales and Marketing
The company mostly sells its products and services through a two-tier distribution model; distributors that sell to resellers and to service providers and MSSPs, who sell to end-customers. The company supports its channel partners with a dedicated team of experienced sales professionals, including account managers, channel managers, and sales engineers.
The company’s corporate marketing efforts include building its brand through its ‘Security in Action’ brand campaign. In 2024, the company created a demand generation marketing organization focused on the development and conversion of prospect and customer marketing leads to high-quality sales leads. In addition to corporate and demand generation marketing, Check Point marketing also includes marketing for products, partners, field promotions, digital promotions, and solutions-oriented thought leadership. In 2024, the company continued to invest in sales and marketing resources.
Support and Services
The company operates a worldwide technical services organization that provides a wide range of services, including technical customer support programs and plans; professional services in implementing, upgrading, and optimizing Check Point products, such as design planning and security implementation; and certification and educational training on Check Point products.
The company’s technical assistance centers in the United States, Israel, Canada, Japan, India, China, and Australia offer support worldwide, 24-hour service, seven days per week.
Proprietary Rights
Check Point and its subsidiaries have 147 issued patents in the U.S., and in other regions, and 19 pending patent applications worldwide.
Competition
The company’s competitors include Cisco Systems, Inc., Fortinet Inc., Palo Alto Networks, Inc., SonicWall Inc., and other companies in the network security space.
The company also competes with several other companies, including Zscaler, Inc., Trellix, Trend Micro Inc., NortonLifeLock Inc., Lookout, Inc., Zimperium, Inc., CrowdStrike Holdings, Inc., SentinelOne, Inc., Sophos Group plc, Proofpoint, Inc., Broadcom, Inc., Mimecast Limited, Microsoft Corp., Wiz Ltd., Netskope, Inc., and Abnormal Security Corp., with respect to specific products that it offers.
Research and Development
The company’s research and development expenses were $395 million in 2024.
History
Check Point Software Technologies Ltd. was founded in 1993. The company was incorporated under the laws of the state of Israel in 1993.