CIO Influence
Analytics Machine Learning

Check Point Software Unveils Quantum Firewall Software R82.10 to Secure the AI-Driven Enterprise

Check Point Software Unveils Quantum Firewall Software R82.10 to Secure the AI-Driven Enterprise

New software release introduces more than 20 capabilities that secure AI transformation, enforce Zero Trust and unify hybrid mesh network protection

Check Point Software Technologies Ltd., a pioneer and global leader of cyber security solutions, announced its new Check Point Quantum Firewall Software, R82.10, introducing 20 new capabilities designed to help enterprises safely adopt AI, protect distributed environments and simplify Zero Trust across hybrid networks.`

โ€œAs organizations embrace AI, security teams are under growing pressure to protect more data, more applications and more distributed environments,โ€ said Nataly Kremer, Chief Product Officer at Check Point Software Technologies. โ€œR82.10 helps enterprises shift to a prevention-first model by unifying management, strengthening Zero Trust and adding protections that support safe, responsible AI adoption and development.โ€

Enterprises are rapidly increasing their use of AI tools and LLM development, expanding connectivity across users, branches and cloud environments. This creates new risks, including AI-generated threats, identity abuse and configuration drift. R82.10 addresses these challenges with unified, prevention-first capabilities that improve visibility, control and protection across hybrid mesh networks.

Also Read:ย CIO Influence Interview with Duncan Greatwood, CEO at Xage Security

โ€œWith the efficiency gains promised by AI, security professionals cannot slow down business innovation or risk being excluded,โ€ said Frank Dickson, Group Vice President, Security & Trust, IDC. โ€œThe benefits of innovation do not negate the looming security threat being introduced by AI. Enterprises need to reduce risk, unify controls and stay ahead of sophisticated malicious actors. Check Pointโ€™s approach of embedded AI security into the network stack is an appropriate approach to quickly improve an organizationโ€™s AI security posture.โ€

Check Point R82.10 introduces 20 new capabilities in four core areas where enterprises face the highest operational pressure today:

  1. Supporting Safe AI Adoption
    R82.10 strengthens oversight of AI-driven activity by detecting unauthorized GenAI tools, expanding visibility into AI applications such as ChatGPT, Claude, Gemini, and monitoring MCP (model context protocol) usage to protect AI-powered workflows.
  2. Strengthening Hybrid Mesh Network Security
    Organizations gain more consistent protection across distributed environments with centralized internet access management for SASE and firewalls, simplified gateway-to-SASE connectivity, and improved identity and device posture validation to support Zero Trust at scale.
  3. Taking a Prevention-First Approach to Modern Threats
    R82.10 introduces phishing protection that works without HTTPS inspection, adaptive IPS to reduce alert fatigue, and new Threat Prevention Insights to highlight misconfigurations and posture gaps before attackers can exploit them.
  4. Eliminating Silos with a Unified Security Platform
    R82.10 expands Check Pointโ€™s open-garden architecture with more than 250 integrations. These integrations allow organizations to apply endpoint posture signals from their existing providers directly within Check Point policies, improving identity-based controls and Zero Trust enforcement.

โ€œCheck Point continues to deliver AI Security innovations at the exact moment customers need them,โ€ said Chris Konrad, Vice President, Global Cyber, World Wide Technology. โ€œTheir AI-driven security capabilities help organizations safeguard their businesses from the latest cyber threats, while providing enterprise-grade protection for sensitive AI workloads from model training to inference without compromising performance.โ€

Check Point Quantum Firewall Software R82.10 integrates with Check Pointโ€™s full AI security stack, strengthened by the recent acquisition of Lakera. Together with the Infinity Platform and Check Pointโ€™s open-garden architecture, enterprises gain a unified path to secure AI usage, automate prevention and ensure resilience across their hybrid environments.

The new capabilities will be highlighted in Check Pointโ€™s upcoming webinarย Securing the AI Transformation in a Hyperconnected Worldย on December 4th, featuring leaders from Check Point, NVIDIA, and IDC. The R82.10 software will be available to download later this month.

Catch more CIO Insights:ย The CIOโ€™s Role In Data Democracy: Empowering Teams Without Losing Control

[To share your insights with us, please write toย psen@itechseries.com ]

Related posts

Snowflake Scales Data Cloud Ecosystem Through Industry Solutions and Powered by Snowflake Program

CIO Influence News Desk

Cloudera Report Enterprise Data Strategy is the Bridge to the Post-Pandemic Economy

CIO Influence News Desk

Totalmobile Acquires Working Time Solutions for Rostering Software & Shift Pattern Capabilities

CIO Influence News Desk