• About
  • Subscribe
  • Contact
Tuesday, January 27, 2026
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home Technology Endpoint Security

Quantum Firewall Software R82.10 to unify approach to AI-driven security

FutureCISO Editors by FutureCISO Editors
December 5, 2025
Quantum Firewall Software R82.10 to unify approach to AI-driven security

Photo by Jakub Zerdzicki: https://www.pexels.com/photo/surveillance-web-cameras-observing-computer-mouse-activity-27904906/

Share on FacebookShare on Twitter

Check Point Software Technologies has launched its Quantum Firewall Software R82.10, introducing over 20 new capabilities designed to help enterprises safely adopt AI, protect distributed environments, and simplify Zero Trust across hybrid networks. R82.10 addresses the growing pressure on security teams to protect expanding data, applications, and distributed environments as organisations embrace AI.

"As organisations embrace AI, security teams are under growing pressure to protect more data, more applications and more distributed environments," said Nataly Kremer, chief product officer at Check Point Software Technologies.

Nataly Kramer

"R82.10 helps enterprises shift to a prevention-first model by unifying management, strengthening Zero Trust and adding protections that support safe, responsible AI adoption and development." Nataly Kramer

The new software aims to mitigate risks associated with increased AI tool usage, LLM development, and expanded connectivity across users, branches, and cloud environments. These risks include AI-generated threats, identity abuse, and configuration drift. R82.10 offers unified, prevention-first capabilities to improve visibility, control, and protection across hybrid mesh networks.

“With the efficiency gains promised by AI, security professionals cannot slow down business innovation or risk being excluded. Enterprises need to reduce risk, unify controls and stay ahead of sophisticated malicious actors. Check Point’s approach of embedded AI security into the network stack is an appropriate approach to quickly improve an organisation’s AI security posture,” said Frank Dickson, group vice president, security & trust at IDC.

This launch comes at a crucial time, as the Asia Pacific region faces increasing cybersecurity threats intensified by AI adoption. A recent report highlights that AI is lowering the barrier to entry for cybercrime, enabling a new wave of cybercriminals. Moreover, the rise of sophisticated infostealer malware and rapid exploitation of vulnerabilities pose significant challenges for defenders.

Related:  Lessons from a global IT outage

To address these challenges, R82.10 focuses on four core areas: supporting safe AI adoption, strengthening hybrid mesh network security, taking a prevention-first approach to modern threats, and eliminating silos with a unified security platform.

The software detects unauthorised GenAI tools, expands visibility into AI applications, and monitors Model Context Protocol (MCP) usage to protect AI-powered workflows. It also expands Check Point’s open-garden architecture with over 250 integrations, improving identity-based controls and Zero Trust enforcement.

These advancements align with the increasing need for Zero Trust architectures in the face of evolving cyber threats. A recent survey indicated that 76% of organizations have started implementing Zero Trust, but only 35% have fully rolled it out, highlighting the ongoing efforts to enhance security.

Tags: Check Point Software Technologies
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • PodChats for FutureCISO: Practical defence strategies against industrialised cyber threats
  • More Singapore firms setting up own SOCs
  • 2026: When autonomous AI transforms cyber attacks and security models
  • Recalibrating CISO strategies amid AI complexity
  • Study reveals urgent need for JIT privileged access amid AI expansion

Categories

  • Artificial Intelligence
  • Blogs
  • CISO
  • CISO strategies
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Compliance and Governance
  • Compliance and Governance
  • Compliance and Governance|People
  • Compliance and Governance|Technology
  • Computer, Storage, Networks, Connectivity
  • Culture and Behaviour
  • Culture and Behaviour|People
  • Cyber risk management
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity careers
  • Cybersecurity operations
  • Cybersecurity operations
  • Data Protection
  • Data Protection
  • Endpoint Security
  • FutureCISO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • Incident Response
  • Network Security
  • People
  • Process
  • Remote work
  • Resources
  • Risk Management
  • Risk Management
  • Security
  • Technology
  • Training and awarenes
  • Videos
  • Vulnerabilities and threats
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl