Connect with us

Hi, what are you looking for?

AI Cybersecurity

Check Point Launches Prevention-First Cybersecurity Framework for Autonomous AI Threats

Check Point Software unveils a $150M prevention-first cybersecurity framework to tackle autonomous AI threats, streamlining security for distributed enterprises.

Check Point Software Technologies has unveiled a new cybersecurity framework designed to combat the escalating threats posed by autonomous artificial intelligence (AI) agents. This restructured model emphasizes a prevention-first approach, aiming to bridge the visibility gaps and alert overload that many Chief Information Security Officers (CISOs) currently face within distributed and hybrid environments. As the landscape of cyber threats evolves, so too must the strategies deployed to counter them.

Roi Karo, Chief Strategy Officer at Check Point, highlighted the urgency of this architectural shift. He noted that AI innovation is consistently outpacing the defensive capabilities of many enterprise security teams, creating a critical imbalance. “As AI reshapes how work gets done, and how attacks are carried out, Check Point believes organizations need to rewire security for the AI era: not by adding more tools, but by rethinking how security is designed and operated when both attackers and defenders use AI,” Karo said. This paradigm aims to allow organizations to leverage AI while maintaining robust security controls.

The current cybersecurity environment is often described as an “AI Arms Race,” where adversaries are increasingly leveraging AI to enhance the scale and effectiveness of their attacks. Although defenders are integrating similar technologies to bolster Security Operations Centers (SOCs), the rapid emergence of autonomous agents has resulted in new challenges, particularly in visibility and alert management. Many CISOs find their workloads exacerbated by the integration of AI into daily business operations, leading to increased complexity and an upsurge in security alerts.

As traditional reactive models of vulnerability management become insufficient for the protection of distributed enterprises that encompass data centers, hybrid clouds, and remote branches, there is an increasing demand for security to be embedded throughout the AI transformation process. This involves integrating protective measures at every level, from the network layer to individual autonomous agents.

To facilitate this comprehensive transformation, Check Point has structured its technological investments around four strategic pillars aimed at creating a unified, AI-powered control plane that promises consistent enforcement across an organization’s digital footprint.

The first of these pillars is **Hybrid Mesh Network Security**, which focuses on securing distributed environments, including data centers, hybrid clouds, and remote access points. By employing a unified control plane, Check Point seeks to eliminate the fragmentation often seen in large-scale network infrastructures.

The second pillar, **Workspace Security**, addresses the increasing interaction between human employees and AI entities within digital workspaces. This framework aims to protect various elements, including devices, browsers, email, and SaaS applications, ensuring that productivity is not compromised by security lapses, particularly against threats like phishing and credential theft.

**Exposure Management** constitutes the third pillar, shifting the focus from reactive vulnerability scanning to a continuous, intelligence-driven approach to risk reduction. This allows organizations to visualize their entire attack surface and prioritize risks based on the business context, facilitating quicker remediation decisions.

Lastly, the pillar of **Dedicated AI Security** tackles the specific risks associated with the AI stack itself. This entails monitoring employee AI use, enterprise applications, and the underlying models and infrastructure. A central aspect of this pillar is the governance of autonomous agents, which, if left unregulated, can pose significant risks due to their ability to handle sensitive data autonomously.

To enhance the effectiveness of these pillars, Check Point has made three strategic acquisitions, estimated to total around **$150 million**. These acquisitions are part of the development of the “Open Garden” platform, which aims to strengthen the overall security ecosystem. The company acquired **Cyclops Security** for approximately **$85 million**, focusing on visibility in hybrid environments. Cyclops specializes in Cyber Asset Attack Surface Management (CAASM), providing a dynamically updated view of a digital footprint across various assets.

Additionally, Check Point’s acquisition of **Cyata** enhances its AI Security capabilities by focusing on the discovery and governance of autonomous AI agents. This technology will enable organizations to maintain oversight of these agents’ interactions with data, allowing for the implementation of necessary safeguards without hindering innovation.

The acquisition of the team from **Rotate** aims to strengthen the Workspace Security pillar by providing a unified platform tailored for Managed Service Providers (MSPs). This integration is expected to lead to more consistent protection across workspace components while improving security for environments that utilize AI technology.

Looking ahead, Check Point’s strategy underscores a departure from closed-stack architectures that limit customer flexibility. The “Open Garden” approach promotes collaboration within the existing security ecosystem, enabling enterprises to seamlessly integrate various security tools. By embedding security measures throughout the network, workspace, and AI systems, Check Point aims to deliver the clarity and efficiency that modern CISOs require in the face of evolving cyber threats.

See also
Rachel Torres
Written By

At AIPressa, my work focuses on exploring the paradox of AI in cybersecurity: it's both our best defense and our greatest threat. I've closely followed how AI systems detect vulnerabilities in milliseconds while attackers simultaneously use them to create increasingly sophisticated malware. My approach: explaining technical complexities in an accessible way without losing the urgency of the topic. When I'm not researching the latest AI-driven threats, I'm probably testing security tools or reading about the next attack vector keeping CISOs awake at night.

You May Also Like

AI Technology

IoTeX unveils a groundbreaking infrastructure for AI data management, featuring a device identity system and real-time analytics that can cut processing costs by 90%

AI Generative

Nandan Nilekani urges India to leverage its digital infrastructure and youth for effective AI diffusion, highlighting ethical concerns and workforce training as key challenges.

Top Stories

AI-generated characters are reshaping fandom dynamics, creating community-driven "soft canon" that challenges traditional narratives and raises ethical questions about authorship.

AI Generative

Oklahoma's House Bill 3299 advances to protect individuals from deepfake exploitation, imposing up to five years in prison for severe violations.

AI Technology

Entanglement launches Maritech Intelligence Systems, featuring quantum-logic AI for real-time maritime intelligence, enhancing ocean sustainability and security.

AI Cybersecurity

Social engineering attacks, now primarily driven by AI, are predicted to surge significantly in 2026, with tools enabling fraud and impersonation becoming alarmingly accessible.

AI Research

AIMET-NL's March 2026 workshop in Amsterdam will explore cutting-edge AI advancements in weather forecasting, emphasizing Scientific Machine Learning and Uncertainty Quantification.

AI Technology

U.S. State Department unveils pilot AI concierge service to enhance access for Pax Silica partners, promoting secure tech supply chains and competitive edge.

© 2025 AIPressa · Part of Buzzora Media · All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site. Some images used on this website are generated with artificial intelligence and are illustrative in nature. They may not accurately represent the products, people, or events described in the articles.