From its founding over 30 years ago, the Check Point mission has been to secure the digital world for everyone, everywhere. From pioneering firewall technology to fueling the next generation of intelligent security with AI, we remain at the forefront of safeguarding organizations.
Check Point’s AI-powered, Cloud-delivered Infinity Platform is the culmination of decades of innovation and acquired technologies needed to provide collaborative security solutions across the entire enterprise landscape. The Infinity Platform offers customers comprehensive solutions, products, and services, and the flexibility to add them and stay ahead of evolving cyberthreats.
1993
Check Point
Founded
2004
Zone Labs
Endpoint Security
2009
Nokia Security
Enterprise Network Security
2015
Hyperwise
Threat Prevention
2018
Dome9
Cloud Security Posture Management
2021
Avanan
Cloud Email Security
2023
Perimeter 81
SASE / SSE Platform
2024
Cyberint
External Risk Management Platform
Understanding our customers’ needs for business and cyber resilience are at the core of Check Point’s history of innovation. We provide leading-edge technologies to secure networks, enterprise multi-cloud environments, and endpoint, mobile, and IoT devices.
Here is a sample of the technologies that have helped create our comprehensive platform approach.
In 2006, Check Point raised the bar with the creation of a unified security architecture using a single management console, unified security gateways, and the first agent-based endpoint security. This was followed by Check Point’s software blade architecture, a dynamic and flexible architecture to meet the security needs of all organizations.
By 2009, the company acquired Nokia’s security appliance business and FaceTime Communications’ application database, adding security controls for over 50,000 Web 2.0 widgets and more than 4,500 internet applications to our security gateways.
In April 2017, the company introduced Check Point Infinity, the first consolidated threat prevention security platform across networks, cloud, endpoints, and mobile. With the acquisition of ForceNock, Check Point Infinity incorporated web application and API protection (WAAP) technology, which uses machine learning, behavioral, and reputation-based security engines.
In October 2018, Check Point acquired Dome9 to make cloud deployments safer and more manageable for organizations transitioning their IT infrastructures.
Today, Check Point is the only vendor to provide a fully consolidated cyber security architecture and platform powered by AI that provides unprecedented protection against mega-cyberattacks and zero-day cyber threats.
Check Point’s history with preventative solutions uniquely combines policy, people, and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Our foundation for success is our customer-driven philosophy, our continuous technological innovation, as well as our relentless focus to provide comprehensive, innovative security throughout the world.
Here’s the table reordered by year from newest to oldest:
Year | Acquired Company | Description |
---|---|---|
2024 | Cyberint | External Risk Management Platform |
2023 | Atmosec | SaaS Security |
2023 | Perimeter 81 | SASE / SSE Platform |
2023 | rmsource | Managed Services |
2022 | Spectral | Cloud- Secrets, Infra-as-Code |
2021 | Avanan | Cloud Email Security |
2020 | Odo | SASE (Secure Remote Access) |
2019 | ForceNock | Cloud- Web & API Security |
2019 | Cymplify | IoT |
2019 | Protego | Cloud- Serverless |
2018 | Dome9 | Cloud – CSPM |
2015 | Hyperwise | Threat Prevention |
2015 | Lacoon | Mobile |
2011 | Dynasec | Compliance |
2011 | Sofaware | SMB network security |
2010 | Liquid Machines | Document Security |
2009 | Nokia | Enterprise Network Security |
2009 | FaceTime | Application identification |
2007 | PointSec | Disk Encryption |
2006 | NFR | IPS |
2004 | Zone Labs | Endpoint Security |
1998 | Metainfo | IP address management |
Discover cutting-edge innovations in network, cloud, and user/access security today.