• About
  • Subscribe
  • Contact
Wednesday, December 10, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home Technology Endpoint Security

Quantum Firewall Software R82.10 to unify approach to AI-driven security

FutureCISO Editors by FutureCISO Editors
December 5, 2025
Quantum Firewall Software R82.10 to unify approach to AI-driven security

Photo by Jakub Zerdzicki: https://www.pexels.com/photo/surveillance-web-cameras-observing-computer-mouse-activity-27904906/

Share on FacebookShare on Twitter

Check Point Software Technologies has launched its Quantum Firewall Software R82.10, introducing over 20 new capabilities designed to help enterprises safely adopt AI, protect distributed environments, and simplify Zero Trust across hybrid networks. R82.10 addresses the growing pressure on security teams to protect expanding data, applications, and distributed environments as organisations embrace AI.

"As organisations embrace AI, security teams are under growing pressure to protect more data, more applications and more distributed environments," said Nataly Kremer, chief product officer at Check Point Software Technologies.

Nataly Kramer

"R82.10 helps enterprises shift to a prevention-first model by unifying management, strengthening Zero Trust and adding protections that support safe, responsible AI adoption and development." Nataly Kramer

The new software aims to mitigate risks associated with increased AI tool usage, LLM development, and expanded connectivity across users, branches, and cloud environments. These risks include AI-generated threats, identity abuse, and configuration drift. R82.10 offers unified, prevention-first capabilities to improve visibility, control, and protection across hybrid mesh networks.

“With the efficiency gains promised by AI, security professionals cannot slow down business innovation or risk being excluded. Enterprises need to reduce risk, unify controls and stay ahead of sophisticated malicious actors. Check Point’s approach of embedded AI security into the network stack is an appropriate approach to quickly improve an organisation’s AI security posture,” said Frank Dickson, group vice president, security & trust at IDC.

This launch comes at a crucial time, as the Asia Pacific region faces increasing cybersecurity threats intensified by AI adoption. A recent report highlights that AI is lowering the barrier to entry for cybercrime, enabling a new wave of cybercriminals. Moreover, the rise of sophisticated infostealer malware and rapid exploitation of vulnerabilities pose significant challenges for defenders.

Related:  Fortifying the digital frontier amidst rising AI-driven misinformation

To address these challenges, R82.10 focuses on four core areas: supporting safe AI adoption, strengthening hybrid mesh network security, taking a prevention-first approach to modern threats, and eliminating silos with a unified security platform.

The software detects unauthorised GenAI tools, expands visibility into AI applications, and monitors Model Context Protocol (MCP) usage to protect AI-powered workflows. It also expands Check Point’s open-garden architecture with over 250 integrations, improving identity-based controls and Zero Trust enforcement.

These advancements align with the increasing need for Zero Trust architectures in the face of evolving cyber threats. A recent survey indicated that 76% of organizations have started implementing Zero Trust, but only 35% have fully rolled it out, highlighting the ongoing efforts to enhance security.

Tags: Check Point Software Technologies
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • Okta polls says Singapore organisations struggle with AI risk governance
  • Quantum Firewall Software R82.10 to unify approach to AI-driven security
  • Mitigating risks of shortened TLS certificate lifespans
  • Elevating machine identity security as a national cybersecurity mandate
  • Fragmented cybersecurity regulations threaten mobile operators

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl