Connect with us

Artificial Intelligence

Check Point Leverages AI to Strengthen Network Security

Published

on

Check Point Software Technologies has announced the new Check Point Quantum Firewall Software R82 (R82) and additional innovations for the Infinity Platform. As organizations face a 75% surge in cyber-attacks worldwide, R82 delivers new AI-powered engines to prevent zero-day threats including phishing, malware, and domain name system (DNS) exploits. It also includes new architectural changes and innovations that drive DevOps agility for data centre operations as well as simplicity and scale.

“Threats are continuing to multiply exponentially, and organizations need intelligent solutions that can keep them a step ahead,” said Nataly Kremer, Chief Product Officer at Check Point Software Technologies. “Network security is increasingly strategic. Our suite of AI-powered threat prevention tools – from Check Point Quantum Firewall Software R82 to GenAI Protect and more – are not only bringing world-class innovations but also relentlessly focused on making it operationally simple and resilient.”

Quantum Software R82 delivers over 50 new capabilities for enterprise customers including:

  • Industry Leading AI-Powered Threat Prevention to block 99.8% of zero-day threats. It introduces four new AI engines to find hidden relationships and patterns to block over 500K additional attacks per month that protect against sophisticated zero-day phishing and malware campaigns.
  • Agile Datacenter Operations to accelerate app development with automated integration of security policy.
  • With dramatically simplified firewall virtualization, organizations achieve 3X faster provisioning of virtual systems for multi-tenancy and agile application development benefiting DevOps.
  • Operational Simplicity to offer seamless scalability for networks of all sizes, automatically adapting to business growth and traffic spikes. It enables organizations to achieve resilience with built-in load sharing and clustering technology (ElasticXL) while benefiting from 3x faster provisioning and operations for firewall management.
  • Post-Quantum Cryptography (PQC) to provide the latest NIST-approved cryptography Kyber (ML-KEM) for quantum-safe encryption, assuring that today’s encrypted data won’t turn into tomorrow’s treasure chest for threat actors.

“Maintaining effective network security requires AI, automation, and the ability to adapt quickly to the latest threats,” said Frank Dickson, IDC Group Vice President of Security and Trust. “Security needs to be strong, but it also needs to enable business innovation at the speed of DevOps. With Check Point’s new collaborative AI-powered solutions and Quantum Firewall Software, Check Point looks to deliver high-performance AI threat prevention while enabling organizations to innovate quickly.”

The new capabilities build upon Check Point’s recently released suite of AI-powered threat prevention innovations:

  1. Check Point Infinity AI Copilot is a responsive AI-powered assistant designed to automate and accelerate security management and threat resolution.
  2. Check Point GenAI Protect is a pioneering solution for the safe adoption of generative AI in enterprises.
  3. Check Point Infinity External Risk Management (ERM) delivers continuous monitoring and real-time threat prevention, augmented by expert-managed services. This protects customers against a wider array of external risks, from credential threat and vulnerability exploitation to phishing attacks and fraud.

“We’ve seen a definite performance increase and operational value with our upgrade to Check Point’s Quantum Firewall Software R82 software release. The new Quantum Firewall software allows us to secure and manage our encrypted traffic more easily than ever,” said Jeff Burgess, Manager of I.T. Enterprise, Aviation Technical Services. “With Check Point, all of our security products are working in sync together to provide a level of security which was previously unattainable.”

Artificial Intelligence

As Adversarial GenAI Takes Off, Threat Intel Must Modernize

Published

on

Written by Bart Lenaerts, Senior Product Marketing Manager, Infoblox (more…)

Continue Reading

Artificial Intelligence

Help AG and F5 Collaborate on Managed App and API Security

Published

on

Help AG, the cybersecurity arm of e& enterprise, has become the first Managed Services Provider (MSP) partner for F5 in the Middle East. Building on their existing relationship, Help AG is now offering a new Managed App and API Protection Service based on the F5 Distributed Cloud Platform. This service is designed to provide continuous, cloud-delivered security for modern digital systems, including those in public, private, edge, and hybrid cloud environments.

Today’s threat landscape is increasingly complex. As businesses move towards API-driven architectures, edge computing, and cloud-native applications, they expose a wider attack surface. Security teams face growing pressure from automated bot attacks, API misuse, and sophisticated Distributed Denial of Service (DDoS) attempts. Many organizations also lack the necessary knowledge and tools to defend against these attacks effectively.

Help AG’s new service directly addresses these challenges. It offers multi-layered protection as a managed, Software-as-a-Service (SaaS) solution. The service uses F5’s globally recognized Distributed Cloud Services and is operated 24/7 by Help AG’s expert Security Operations Center (SOC) team. This allows clients to streamline operations, meet compliance requirements, and respond to threats in real time. Businesses can now deploy resilient, compliant, and cost-efficient application protection, backed by Help AG’s local expertise.

Stephan Berner, CEO of Help AG, stated, “This partnership with F5 is a major step forward for enterprise security. It reflects our shared goal of securing every application, API, and digital interaction at scale. This new service provides regional organizations with enterprise-grade security that is proactive, cost-effective, and built for the cloud-first era.”

The new solution offers unified protection that includes Web Application Firewall (WAF), advanced bot mitigation, API discovery and security, and DDoS defense. All these features are managed through a centralized SaaS-based console, providing full visibility and control. Clients also benefit from flexible deployment options across various locations and continuous support and tuning from Help AG’s expert teams.

Mustapha Hlil, Director of Channel Sales for the Middle East, Türkiye and Africa at F5, commented, “As cyber threats grow more sophisticated, the need for always-on, adaptable security is critical. Help AG’s security expertise, managed services leadership, and 24/7 SOC support, combined with the F5 Distributed Cloud platform, offer a powerful solution. This will greatly help enterprises that lack the in-house expertise to deploy and manage security solutions.”

This launch marks a new phase in the Help AG and F5 partnership, reinforcing their commitment to securing the region’s digital future and helping organizations build trust in their digital interactions.

Continue Reading

Artificial Intelligence

Cloud Security Trade-Offs Rise: 91% of Leaders Face AI Threats

Published

on

Gigamon has released its 2025 Hybrid Cloud Security Survey, revealing that hybrid cloud infrastructure is under mounting strain from the growing influence of artificial intelligence (AI). The annual study, now in its third year, surveyed over 1,000 global Security and IT leaders across the globe. As cyberthreats increase in both scale and sophistication, breach rates have surged to 55 percent during the past year, representing a 17 percent year-on-year (YoY) rise, with AI-generated attacks emerging as a key driver of this growth.

Security and IT teams are being pushed to a breaking point, with the economic cost of cybercrime now estimated at $3 trillion worldwide according to the World Economic Forum. As AI-enabled adversaries grow more agile, organizations are challenged with ineffective and inefficient tools, fragmented cloud environments, and limited intelligence.

Key findings highlight how ai is reshaping hybrid cloud security priorities:

  • AI’s role in escalating network complexity and accelerating risk is evident. The study reveals that 46 percent of Security and IT leaders say managing AI-generated threats is now their top security priority. One in three organizations report that network data volumes have more than doubled in the past two years due to AI workloads, while nearly half of all respondents (47 percent) are seeing a rise in attacks targeting their organization’s large language model (LLM) deployments. More than half (58 percent) say they’ve seen a surge in AI-powered ransomware—up from 41 percent in 2024 underscoring how adversaries are exploiting AI to outpace and outflank existing defenses.
  • Compromises highlight continued trade-offs in foundational areas of hybrid cloud security. Nine out of ten (91 percent) Security and IT leaders concede to making compromises in securing and managing their hybrid cloud infrastructure. The key challenges that create these compromises include the lack of clean, high-quality data to support secure AI workload deployment (46 percent) and lack of comprehensive insight and visibility across their environments, including lateral movement in East-West traffic (47 percent).
  • Public cloud risks prompt industry recalibration. Once considered an acceptable risk in the rush to scale post-COVID operations, the public cloud is now coming under increasingly intense scrutiny. Many organizations are rethinking their cloud strategies in the face of their growing exposure, with 70 percent of Security and IT leaders now viewing the public cloud as a greater risk than any other environment. As a result, 70 percent report their organization is actively considering repatriating data from public to private cloud due to security concerns and 54 percent are reluctant to use AI in public cloud environments, citing fears around intellectual property protection.
  • Visibility is top of mind for security leaders. As cyberattacks become more sophisticated, the limitations of existing security tools are coming sharply into focus. Organizations are shifting their priorities toward gaining complete visibility into their environments, a capability now seen as crucial for effective threat detection and response. More than half (55 percent) of respondents lack confidence in their current tools’ ability to detect breaches, citing limited visibility as the core issue. As a result, 64 percent say their number one focus for the next 12 months is achieving real-time threat monitoring delivered through having complete visibility into all data in motion.

With AI driving unprecedented traffic volumes, risk, and complexity, nearly nine in 10 (89 percent) Security and IT leaders cite deep observability as fundamental to securing and managing hybrid cloud infrastructure. Executive leadership is taking notice, as boards increasingly prioritize complete visibility into all data in motion, with 83 percent confirming that deep observability is now being discussed at the board level to better protect hybrid cloud environments.

“Security teams are struggling to keep pace with the speed of AI adoption and the growing complexity and vulnerability of public cloud environments,” said Mark Jow, technical evangelist, EMEA, at Gigamon. “Deep observability addresses this challenge by combining MELT data with network-derived telemetry such as packets, flows, and metadata, delivering increased visibility and amore informed view of risk. It enables teams to eliminate visibility gaps, regain control, and act proactively with increased confidence. With 88 percent of Security and IT leaders agreeing it is critical to securing AI deployments, deep observability is fast becoming a strategic imperative.”

“With nearly half of organizations saying attackers are already targeting their large language models, AI security can’t be an afterthought, it needs to be a top priority,” said Mark Walmsley, CISO at Freshfields. “The key to staying ahead? Visibility. When we can clearly see what’s happening across AI systems and data flows, we can cut through the noise and manage risk more effectively. Deep observability helps us spot vulnerabilities early and put the right protections in place before issues arise.”

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.