- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Q&A during the session is below the video.
Slides are linked below the Raffle Winners which are linked below the Q&A.
If you would like to schedule a more detailed conversation or demo, please fill out this form: https://www.research.net/r/LMMTZT3
in the cloud, yes, both PAYG and BYOL models
Very realiable!
Our cloud security solution is deployed by thousands of customers protecting the most largest cloud environment. Largest banks, retails and technology companies.
We have been securing various aspects of cloud environments for over 7 years.
This is a field of active research across all our solutions. Specific to CloudGuard, we plan to announce specific solutions to protect AI engines using CloudGuard WAF. Stay tuned!
API Discovery and API Schema Validation are now available... you can definitely start using it!
Our CloudGuard Network can scan and prevent malware from entering your cloud. If a user upload a malware file to cloud application, we can prevent it. We also allow application developers to integrate with our ThreatCloud solution to check if file are malicious, you can do it with API calls to ThreatCloud. We offer the same service also for URL and File reputations and File emulation and extraction.. All via API.
First, Multi/Hybrid Cloud is the most common IT set up for organizations. Not only that but also, the DC are distributed acosss the globe.
The first advantage is managing everything on a single pane of glass. Additional advantage is getting the same level of visibility and security across all your DCs. It will save you training of teams....
CloudGuard Network supporting numerous public cloud providers and it's likely your choice of platform will be supported.
Addressing growth of could and growing challenges - We are building all features to simplify operations, automate process, enabling high resiliency constructs, and scaled architecture.
Here is a short list of some of the integrations that we have
The risk is huge... obviously there are many attack vectors available and we have different cloud solution to protect against them.
Example 1: On the service door - limiting access with our amazing cloud network security solution will eliminate the way to access your cloud even if something was leaked.
Example 2: Prevent injection attacks to your exposed web applications (company site, other systems). Log4Shell allowed command injection on the server itself.
We have Agentless vulnerability scanning both for VMs, Serverless currently avaialble for AWS and Azure and registries & live running containers scanner which is available for any cloud and on prem. The scanner is constantly up to date, VMs are continuously rescanned while images in registries are rescaned when needed. The SBOM information are stored on our end we continiously examine it for newly discovered threats. All without storing any PII on our end.
We offer a number of zero-phising technologies in our Harmony suite and in Quantum Security Gateways. Harmony Email and Collaboration should also assist in identifying and preventing such emails from reaching your users.
On top of our full support for machine level redundancy, we have some architectures that provide even greater level of resiliency such as Cross AZ clusters on AWS.
There are different aspects of using AI in CloudGuard:
While we support all the major Cloud Service Providers, each one is different which results in small differences when integrating CloudGuard on AWS versus GCP.
CloudGuard Network is using AI in a couple of ways... Starting from AI engines to better derive multi vector attacks and block them. The second for CloudGuard WAF all our detection is based on AI using a patented detection methodology to detect malicious requests. And last, soon enough we will be adding Chat to opreate and analyze your security based on Open AI integration.
Yes, as the infrastructure that scans the traffic will be provided as a service, cost for WAF as a Service will be higher than agent based WAF.
Yes. unfortunately, this will require a side by side deployment and traffic steering.
Suppose you have a machine / workload that is publicly available to the Internet and it wasn’t meant to be. You will be notified about this and it can be made private automatically. The same goes for S3 buckets for example, which might be public and contain sensitive data. These are just a few of the examples of events that you can be notified on.
Harmony Email is unique in that it is flexible in deployment and policy creation. Organizations can choose to deploy it inline before the inbox, or in a post-delivery mechanism. Organizations can also mix and match per department (Finance, for example, could be inline while HR isn't.) Our use of AI/ML with ThreatCloud helps minimize false positives and we have a strong feedback loop to continue training the AI. Organizations can also be very granular with policy, if they want, or use it right out of the box. The goal of Harmony Email is to ensure that when a user receives an email, they know it's clean and safe to act on.\
We will start showing the residual risk on affected protected cloud assets that will be protected by Check Point cloud network security firewall deployed in the cloud environment.
We have few ways of deployments - we can deploy a container that will act as a reverse proxy to you app and you can deploy using docker-compose.
Obviously - with Waf as a Service you don't need to deploy anything on your end and we can protect any app...
This is the exact reason we are introducing the new paradigm shift, to include the front door and service door. CloudGuard is largely cloud agnostic so you can mange multi CSP’s in the same place and have a complete view or your cloud security.
By integrating Check Point WAF and Network security to CNAPP and adding additional layers of security to your cloud environment, we will be able to present the residual risk of your cloud asset , prioritizing other assets that need to be prioritized. CNAPP Effective risk management (ERM) take into consideration the additional security layers that were added to protect your cloud environment.
We rely on a number of mechanisms.
It starts with ThreatCloud AI. This is fed by over 50 unique AI technologies, as well as a threat intel database from over 150,000 connected networks, millions of endpoints, 2.8 billions websites and much more. When a detection is found in any of our products from this database, it's instantly propogated to all customers. Further, we have a renonwed Check Point Research (CPR) team, compromised of 150+ threat researchers?
We presented a customer use case last week where we migrated a 6,000 person company to Harmony SASE over a weekend. See: https://community.checkpoint.com/t5/SASE/Harmony-SASE-Masters-Migration-Video-Slides-and-Q-amp-A/m-p...
They can't protect preemptively against unknown attacks as they require a specific signature. In CloudHuard WAF, using our AI mechanism we have proven many times that we can do it - our engine allows us to detect unknown attacks based on anomaly detection from the normal behavior of users + identify just specific indicators and any combination of them instead of full blown specific signature
Yes, it’s supported
Yes, onboarding CloudGuard is super easy!
How does Check Point envision SASE transforming the way organizations secure their networks, particularly in the context of distributed and remote workforces?
We’re working on enhancing the SASE fabric with the best of the Check Point’s security while allowing a completely hybrid approach, meaning that you can run the security stack on device (without) connecting to the edge, on the edge, or mixed, this allows maximum security, flexibility and user experience.
Can CNAPP FW effectively determine whether enabling a specific IPS signature or adjusting the threat policy is necessary to mitigate a particular risk? It is based on Check Point’s Threat Cloud which is AI based on doesn’t require tuning to mitigate risks.
Competitive information is out of scope for this session. Partners can access competitive information in our CheckMates for Partners community. Customers should reach out to their local Check Point office.
Today, SWG (URL Filtering and Malware Protection) is running on the device, Firewall is enforced on the edge.
These solutions compliment each other, SASE is not protecting the device itself, it is functioning on the network stack of OS and in the cloud edge.
Today SWG (URL Filtering and Malware Protection) is running on the device, Firewall is enforced on the edge. On top of that, each agent is being scanned continuously by Device Posture Check.\
In addition to this, we also offer agentless ZTNA as reverse proxy (For Web, RDP, SSH and VNC).
Flexibility - you choose where to run the security, Performance and Capacity planning - offloading the heavy lifting of inspection from the edge.
Also, we are able to provide more bandwidth to the end user at lower latency than SASE solutions that are entirely cloud-based.
We keep scanning your application assets for configurations, CVE, secrets, malware, network topology and try to give you security findings on top so you can improve you security posture.
We’re integrating the best Check Point’s Threat Prevention based on ThreatCloud Intel, UEBA and advanced network features are on our roadmap.
We offer today more than 60 PoPs and support IPsec tunnels, Wireguard-based connectors, and OpenVPN; this allows us to be completely agnostic about the infrastructure we’re interconnecting; we act as a switchboard no matter the cloud platform or premises equipment you’re connecting to.
Today SWG (URL Filtering and Malware Protection) is running on the device, Firewall is enforced on the edge. On top of that, each agent is being scanned continuously by Device Posture Check.
In addition to this, we also offer agentless ZTNA as a reverse proxy (For Web, RDP, SSH, and VNC).
Moreover, we are working on deepening the integration with other key components of the Infinity platform, including XDR, Playblocks, Events and more.
Integration with SD-WAN allows a security layer on top of SD-WAN by forwarding the traffic to the cloud edge for inspection.
Harmony SASE has clients for mobile devices. IoT devices generally require some sort of on-premise device to provide protection since IoT devices typically don’t allow installation of additional software. For specific details, please contact your local Check Point office.
Your local Check Point office can arrange this. You can also reach the right team via the contact form here: https://www.checkpoint.com/services/infinity-global/
It depends on the public cloud vendor you are utilizing and the use cases you want to address and the security perception of your organization.
If you are on Azure / AWS and globally distributed we are offering something Gartner is calling Cloud Hybrid Mesh Firewall Platform. We have an amazing offering around Azure Virtual WAN as well.
SD-WAN is largely about traffic steering and does not have a security component. SASE is about security and can include SD-WAN functionality.
Harmony SASE is the successor product for Harmony Connect, which was made End of Support in October 2023 with End of Life at the end of 2025. For more details, see: https://support.checkpoint.com/results/sk/sk181531 and reach out to your local Check Point office for further assistance.
In addition to the above, we also offer browser security. In the coming months, we are also adding Threat Emulation/Extraction and Zero Phishing.
Have a look here: https://www.checkpoint.com/cloudguard/devsecops/
We’re working to integrate the Threat Prevention engines into SASE, these will be introduced gradually starting Q3 this year.
We’re working to integrate Harmony SASE into Infinity Portal, this includes XDR, soon we will introduce the capability to enforce Custom IOCs in Harmony SASE and also send SASE events to Infinity Events and XDR.
SASE fabric functions as a switchboard, each endpoint connected into can communicate with each other.
The policy is a single policy, just like with cloud only SASE. The policy is managed from the cloud. However the enforcement is either on the agent or the cloud.
Check Point offer unified policy and management solution to manage security across AWS, Azure, GCP and on-prem datacentre. Our best security, scalability and multicloud solution is what brings customer to select Check Point.
1/ Faster Internet Security (local breakout).
2/ Cloud based service advantages without the disadvantages of high latency, privacy and higher cost
We encourage all organizations to adopt a p=reject status, as it represents a great layer of security. Our AI analyzes SPF, DKIM and DMARC in our email analysis, and we offer a DMARC monitoring tool.
The idea is to enhance security while keeping usability at a premium. We offer multiple deployment modes that allow for flexibility that fits the organization's needs.
This is our patent. Gateways scan emails before the inbox, but it passes by Microsoft or Google. Post-delivery means that the email hits the inbox before it is scanned. Being inline ensures that emails are scanned by default security and by us before it reaches the end-user inbox.
Yes. Some is already available but agentless RDP and RDP recording are expected later this year.
Yes. It's a 7-click, 30-second install. Very similar to installing an app. We use the API to integrate deeply with Office 365, and it allows many advantages, such as scanning internal email, access to the social graph and more.
Yes. We secure Teams, Slack, Dropbox, Box, Google Drive, SharePoint, OneDrive and ShareFile.
By preventing phishing before it reaches the inbox, it doesn't matter where employees are located. all phishing attacks will be blocked.
Our technology is actually invisible to the outside world, but admins have full visibility into every action taken.
It plays a huge part. AI and ML can help us better understand the scale of attacks, find new patterns and deploy new preventions. Of course, like any technology, AI is still evolving, but it gives us a great baseline.
Yes. Malware and phishing won't be released to the end-user.
Both options are viable. You can have it as a managed solution from one of our MSPs or manage it directly. or both 🙂
Amid the surge in supply chain attacks targeting cloud environments, how does CheckPoint fortify its cloud security solutions to
Impersonation attacks are done with AI and ML. Our catch rate is better than gateways because we don't rely on signatures. In terms of API-based vendors, they don't technically catch anything, as every email is delievered to the inbox before analysis.
For phishing simulation, yes, we have a product called Smart Awareness that handles this.
Yes. All attachments and links are run in a sandbox. There is plenty of customization, from OS used and more.
Yes and yes!
Yes!
Yes
Yes. We scan back 13 months
Yes we have DLP and it's fairly granular and as customizable as you want to make it.
WAF can do bot protection and rate limit - both are legitimate techniques to block brute force attacks.
In a SASE-centric approach, the concept of "Zero Trust" assumes paramount importance. How does Check Point conceptualize and implement Zero Trust principles within its SASE solutions to mitigate risks associated with unauthorized access and lateral movement of threats?
Cloud Firewall allows for efficient network segmentation. Each agent is being scanned continuously by Device Posture Check. In addition to this, we also offer agentless ZTNA as a reverse proxy (For Web, RDP, SSH, and VNC). Moreover, we are working on deepening the integration with other key components of the Infinity platform, including XDR, Playblocks, Events and more.
Congratulations to our winners of our random draw for attending this session! Winners will be contacted separately and include:
Congrats to the winners! ✌️
Hey... where can we find more information about "Browser Security" being added to Harmony SASE? Is this Harmony Browse? Or something else?
Cheers
I suspect the functionality will be the same (or very similar) to Harmony Browse.
Whether we refer to it as Harmony Browse in Harmony SASE is a separate question 🙂
Thanks. The slide says it's already available, but I can't find anything in the management console or documentation. Is this actually available yet?
Today, it is literally Harmony Browse with its existing separate management.
A deeper integration with the rest of Harmony SASE (i.e. one management console) is planned.
Thank you! Is Harmony Browse now part of the HSASE subscription/license, or does it still need to be purchased separately?
Only included with specific SKUs currently (Essentials+)...trying to find the exact SKUs.
Thank you, Checkpoint.
Q&A during the session is below the video.
Slides are linked below the Raffle Winners which are linked below the Q&A.
If you would like to schedule a more detailed conversation or demo, please fill out this form: https://www.research.net/r/LMMTZT3
in the cloud, yes, both PAYG and BYOL models
Very realiable!
Our cloud security solution is deployed by thousands of customers protecting the most largest cloud environment. Largest banks, retails and technology companies.
We have been securing various aspects of cloud environments for over 7 years.
This is a field of active research across all our solutions. Specific to CloudGuard, we plan to announce specific solutions to protect AI engines using CloudGuard WAF. Stay tuned!
API Discovery and API Schema Validation are now available... you can definitely start using it!
Our
...Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
11 | |
8 | |
6 | |
6 | |
6 | |
5 | |
5 | |
5 | |
5 |
Mon 22 Sep 2025 @ 03:00 PM (CEST)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security EMEAMon 22 Sep 2025 @ 02:00 PM (EDT)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security AMERTue 23 Sep 2025 @ 06:00 PM (IDT)
Under the Hood: CloudGuard Network Security for Nutanix - Overview, Onboarding, and Best PracticesMon 22 Sep 2025 @ 03:00 PM (CEST)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security EMEAWed 24 Sep 2025 @ 03:00 PM (CEST)
Bereit für NIS2: Strategische Werkzeuge für Ihre Compliance-Reise 2025Thu 25 Sep 2025 @ 03:00 PM (IDT)
NIS2 Compliance in 2025: Tactical Tools to Assess, Secure, and ComplyAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY