Check Point: ‘AI is Not a Revolution, but a New Dimension’

During the CPX 2025 congress, the cybersecurity manufacturer advocates unified security for the hyper-connected world in the age of artificial intelligence, which is generating an increasing number of threats.

This week, the CPX 2025 conference was held in Vienna, where Check Point unpacked the keys to dealing with increasingly sophisticated cyber threats, which are varied and growing at an alarming rate.

European companies receive an average of 1,679 attacks per week, with the education and research sectors being the most targeted, with an average of 4,247 attacks per week.

One of the reasons for this growing number of cyberattacks is the implementation of artificial intelligence by cybercriminals, which is why the manufacturer also wanted to make it clear that AI must also be used to confront them.

Silicon has been there to bring readers closer to all these keys, which affect not only companies but also people: ‘People will need more cybersecurity,’ said Gil Shwed, founder and former CEO of Check Point, who now holds the position of executive chairman, in the opening presentation. We spoke with him at length in an interesting interview that will be published soon.

On the right, Gil Shwed, founder and CEO of Check Point, during his need at CPX 2025.

Check Point stressed the need to be prepared for all the challenges and changes that come with the emergence of generative AI, which ‘is not a revolution, but a new dimension’.

This is because generative AI is being adopted at a frenetic pace, much faster than any other technology of the past. This is highlighting the limitations of people understanding what is happening and what is changing because we need time to come to terms with all these changes, even more so in a hyper-connected world.

It is true that generative artificial intelligence is offering many positive things for the daily lives of millions of people and professionals, but it is also generating new attack surfaces and techniques such as data poisoning, among others.

This technique of ‘data poisoning’ in AI involves deliberately corrupting the training data of machine learning models to manipulate their behaviour, resulting in biased or detrimental results.

Through this technique, attackers inject malicious data to influence the model’s decisions during the training phase, compromising its integrity and reliability.

The impact of these techniques can be very negative for anyone querying the infected generative AI, so it is critical to detect these types of attacks early, even before they occur.

‘Check Point is creating a new industry and a great community to mitigate any type of cyber attack, including those related to AI,’ added Nadav Zafrir, new CEO of Check Point: ’Through honesty and innovation we have been building teams and a great ecosystem for more than 30 years. Security is tough and increasingly complex’.

Nadav Zafrir, Check Point’s new CEO, unpacking the capabilities of the hybrid mesh architecture developed by the software maker.

Certainly, the complexity of cyber-attacks with AI will be increasing, which means it will also be harder to anticipate what is coming: ‘AI can go beyond human possibilities, it doesn’t sleep,’ said Zafrir, who is clear that the future of these cyber-attacks is not coming, but is already here: ‘We are facing a new dimension that until recently was unknown’.

Check Point’s vision is therefore to build real security to deal with AI-generated threats, but also to make use of AI to deal with all these attacks. In other words, the same weapons must be used so that the fight is not unequal.

Infinity, the security platform for a hyper-connected world

According to Check Point, this ‘real security’ involves building a platform that covers all areas of cybersecurity in a unified way. Even more so if we take into account that perfection in the cyber world does not exist, ‘but we can reduce as much as possible the loopholes through which attackers can sneak in’.

To do this, it is necessary to go beyond isolated cybersecurity silos and apply unified security at application, device and network level. All this with the fundamental support of SOCs (Security Operations Centres).

The manufacturer’s proposal is based on a Hybrid Mesh Network Architecture through SASE, which it calls Infinity Platform.

Basically, it is about preventing all kinds of threats by using unified security management and policies together with threat intelligence.

Check Point has unified the different products and their management, but also the collaboration between them in the Infinity platform, which it claims greatly enhances its efficiency.

Thus, the Infinity platform consists of the following capabilities:

  • Quantum: On-premise operational security with high performance and scalability.
  • CloudGuard: Security in multi-cloud environments and data centres with cloud-native integrations. Features web application firewalls and APIs.
  • Harmony: Security in local workspaces that completes the hybrid SASE vision, which goes beyond the cloud and networks to also cover different devices (PCs, smartphones, etc.).
  • ThreatCloud AI: AI-based collaborative threat prevention solution. It shares real-time intelligence to detect threats, allowing you to prevent, block and manage external risks.

What’s new for the Infinity platform

Check Point has taken advantage of the CPX 2025 conference in Vienna to announce several new additions to its platform. These innovations are designed to improve the effectiveness of security policies, collaboratively prevent threats and simplify security operations through the use of AI:

Unified Identity and Policy:
  • Quantum Policy Insights: Analyses and recommends changes to security policies, reinforcing the Zero Trust approach.
  • Quantum Policy Auditor: Ensures alignment with corporate security guidelines and analyses thousands of rules in seconds.
  • Infinity Identity: Cloud service that centrally manages identity, integrating with third-party identity providers and new sources such as Microsoft Defender, Microsoft Intune and Harmony Endpoint.
Collaborative threat prevention:
  • Infinity Playblocks: Provides security automation and orchestration, with over 100 pre-configured playbooks and the ability to create custom playbooks using generative AI.
Operational Simplicity:
  • Infinity AIOps: AI agent that proactively monitors gateways to predict and mitigate failures.
  • Infinity AI Copilot: Generative AI conversational assistant that provides contextualised and comprehensive responses, improving security management and incident response.