Check Point Software Technologies is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organisations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats.

Established by CEO Gil Shwed in 1993, Check Point introduced FireWall-1, the IT industry’s first stateful inspection firewall technology. Over a quarter of a century later, Check Point’s ground-breaking technology remains the gold standard for network security, and the company has continued to deliver innovative cybersecurity solutions.

For the last three decades, Check Point Software Technologies  has set the standard for Cyber Security. Our mission is to secure your everything. Across the ever-evolving digital world, from enterprise networks through cloud transformations, from securing remote employees to defending critical infrastructures, we protect organizations from the most imminent cyber threats.

With Check Point Infinity, the only consolidated cyber security solution across cloud, networks, endpoints, mobile and IoT, we are continuously pioneering cyber security innovation with the most advanced AI-based threat Intelligence and prevention technologies, unified security management, and cloud security automation to help protect organizations from 6th generation of cyber attacks.

With over 6,000 security experts, a world-acclaimed research and intelligence unit, and the broadest ecosystem of business and technology partners, we protect over 100,000 organizations of all sizes across all industry verticals in 88 countries to achieve allow better experiences for in a safer digital world.

Check Point Incident Response Team (CPIRT) offers 24/7, data(Intelligence)-driven, and vendor-agnostic incident response services. The CPIRT global team helps our customers manage, mitigate, and understand active cyber incidents. The team helps customers of all sizes prepare for cyber incidents through proactive services; such as Playbook Development, Tabletop Exercises, and Threat Hunting.

Secure the Network

Check Point Quantum: Deep Learning & AI Driven Network security.

Protect your enterprise network from the most sophisticated cyber-attacks with the highest caliber of security, real-time prevention and the world’s highest performing security gateways.

Secure the Cloud

Check Point CloudGuard AppSec provides Web Application and API protection.

With deep application contextual analysis, it eliminates the tradeoff between the level of security and the complexity of managing application security.  Whether your application is hosted in a data center or in a public/private cloud, CloudGuard’s innovative, patent-pending decision engine covers, OWASP top ten attacks, API attacks and blocks automated attacks (Bots)

Licensing Instructions AppSec Standalone:

  • CloudGuard AppSec is licensed by number of HTTP requests
  • It can be purchased in 2 ways: as part of CloudGuard workload, or Standalone
  • For workload pricing, see under CloudGuard workload
  • The minimum amount to purchase is 100M requests, multiples of 100M can be added
  • Fair use policy:
  • Logs: 10GB logs for every 100M requests, kept for 1yr
  • File Security: 1M files for every 100M requests
  • Up to 100 agents
  • Additional storage can be added in 1TB multiples, kept for 1yr

Secure Users & Access

Check Point Harmony: Highest level of security for remote users.

Protect remote users’ devices and access. Wherever you connect from, whatever you connect to and however you connect – your devices, your privacy and your organizational data must be secure and protected from any cyber threat.

Unified Management & Security Operations

Check Point Horizon: Prevention-first Security Operations.

Proactively prevent attacks on your organization with powerful prevention-focused SOC operations tools and services. Horizon’s prevention-first approach offers complete coverage for the network, endpoints, cloud, email, and more – all from one pane of glass.

Cloud Email & Collaboration Security

Harmony Email & Collaboration (HEC) provides complete protection for Microsoft 365, Google Workspace and all your collaboration and file-sharing apps. HEC is designed specifically for cloud email environments and is the ONLY solution that prevents, not just detects or responds to, threats from entering the inbox.

Harmony email and collaboration

Full Protection

Complete protection for cloud email and collaboration apps that protects sensitive business data (DLP) and secures all lines of business communication

harmony email and collaboration

Bulletproof Security

An API-based solution that catches what everyone else misses, including ransomware, account takeover, BEC and supply chain attacks

harmony email and collaboration

Superior Catch Rate

99.2% reduction in phishing attacks reaching the inbox
Blocks 30% more than cloud native security