Check Point Software has released a new version of its Quantum firewall software that targets security risks posed by the rapid adoption of artificial intelligence in enterprises.
The R82.10 release introduces 20 new features across network, identity, and AI security. We focus on hybrid environments spanning data centers, branch offices, and multiple public clouds.
Check Point said the update is in response to increased pressure on security teams as companies deploy AI tools and large-scale language modeling projects across their operations.
“As organizations embrace AI, security teams are under pressure to protect more data, more applications, and more distributed environments,” said Nataly Kremer, chief product officer at Check Point Software Technologies. “R82.10 helps enterprises move to a prevention-first model by unifying controls, strengthening zero trust, and adding protections that support safe and responsible AI adoption and development.”
Many companies are now connecting AI services to their existing systems and data stores. This raises concerns about data leakage, model abuse, and new types of automated attacks.
Check Point said the new software focuses on four operational areas: These areas are AI deployment, hybrid mesh network security, threat prevention, and platform integration.
AI monitoring
The company has added the ability to track and control the use of its generative AI tools. This software can detect rogue AI services in network traffic. Adds unique visibility to tools like ChatGPT, Claude, and Gemini.
This release also includes monitoring for the use of model context protocols. This protocol supports AI workflows that combine various tools and data sources. This monitoring capability is intended to reduce the risk of unsupervised AI agents accessing sensitive systems.
Check Point says these controls will give security teams more insight into which AI services employees are using and how data flows through those services.
hybrid mesh focus
R82.10 is targeted at organizations that manage many sites and clouds. This software links on-premises firewalls and Secure Access Service Edge (SASE) services through a centralized Internet access policy.
With this approach, the same rules apply to traffic from branch offices, remote workers, and cloud workloads. This reduces the need to use separate policy sets for each environment.
This release also adds functionality for identity and device health checks. These checks support zero trust models at scale. This software uses stronger user and device validation before granting access to applications.
Threat prevention
Check Point has added phishing protection that doesn't require HTTPS inspection. This method allows you to detect malicious sites and links without having to decrypt the traffic content.
The company says this feature is suitable for environments where encrypted traffic must remain private for regulatory or privacy reasons.
R82.10 also includes what Check Point calls adaptive intrusion prevention. The system adjusts alerts based on threat context. It is intended to reduce alarm fatigue in security operations centers.
New threat defense insights highlight configuration weaknesses and posture gaps. The system flags issues before attackers can exploit them. Security teams can prioritize remediation efforts based on these findings.
integrated platform
This update strengthens Check Point's integration strategy. The company says R82.10 supports over 250 third-party integrations.
Customers can feed endpoint posture data from their existing providers into their Quantum firewall policies. This data may include device health, operating system status, and security agent information.
The firewall then uses these signals in identity-based rules. This approach provides stronger access control and supports more granular zero trust enforcement.
Industry analysts say changes in AI are reshaping network security strategies. “With the efficiency gains promised by AI, security professionals cannot afford to slow down or risk being excluded from business innovation,” said Frank Dixon, Group Vice President, Security & Trust, IDC. “The benefits of innovation do not negate the immediate security threats posed by AI. Enterprises need to reduce risk, unify controls, and stay ahead of advanced malicious actors. Check Point's approach to embedding AI security into the network stack is the right approach to quickly improve an organization's AI security posture.”
AI stack link
R82.10 forms part of Check Point's broader AI security portfolio. The firewall software is integrated with the company's Infinity Platform and its open integration framework.
Check Point said its platform approach allows organizations to apply the same policies across on-premises networks, cloud workloads and remote users.
The new firewall release also connects with Lakera's AI security technology. Check Point acquired Raykera earlier this year. Lakera's tools focus on securing AI models during training and inference.
Check Point says this combination can protect AI workloads from data ingestion to model output inspection.
Channel partners are recognizing the demand for such an integrated approach. “Check Point continues to deliver AI security innovations at the exact moment our customers need them,” said Chris Conrad, vice president of global cyber at Worldwide Technologies. “The company's AI-driven security capabilities help organizations protect their businesses from the latest cyber threats and provide enterprise-grade protection for sensitive AI workloads, from model training to inference, without compromising performance.”
Check Point plans to further develop AI security capabilities across its Quantum and Infinity product lines as customers expand their AI projects across hybrid networks.
