Check Point Software Technologies has launched its Quantum Firewall Software R82.10, introducing over 20 new capabilities designed to help enterprises safely adopt AI, protect distributed environments, and simplify Zero Trust across hybrid networks. R82.10 addresses the growing pressure on security teams to protect expanding data, applications, and distributed environments as organisations embrace AI.
"As organisations embrace AI, security teams are under growing pressure to protect more data, more applications and more distributed environments," said Nataly Kremer, chief product officer at Check Point Software Technologies.
Nataly Kramer
"R82.10 helps enterprises shift to a prevention-first model by unifying management, strengthening Zero Trust and adding protections that support safe, responsible AI adoption and development." Nataly Kramer
The new software aims to mitigate risks associated with increased AI tool usage, LLM development, and expanded connectivity across users, branches, and cloud environments. These risks include AI-generated threats, identity abuse, and configuration drift. R82.10 offers unified, prevention-first capabilities to improve visibility, control, and protection across hybrid mesh networks.
“With the efficiency gains promised by AI, security professionals cannot slow down business innovation or risk being excluded. Enterprises need to reduce risk, unify controls and stay ahead of sophisticated malicious actors. Check Point’s approach of embedded AI security into the network stack is an appropriate approach to quickly improve an organisation’s AI security posture,” said Frank Dickson, group vice president, security & trust at IDC.
This launch comes at a crucial time, as the Asia Pacific region faces increasing cybersecurity threats intensified by AI adoption. A recent report highlights that AI is lowering the barrier to entry for cybercrime, enabling a new wave of cybercriminals. Moreover, the rise of sophisticated infostealer malware and rapid exploitation of vulnerabilities pose significant challenges for defenders.
To address these challenges, R82.10 focuses on four core areas: supporting safe AI adoption, strengthening hybrid mesh network security, taking a prevention-first approach to modern threats, and eliminating silos with a unified security platform.
The software detects unauthorised GenAI tools, expands visibility into AI applications, and monitors Model Context Protocol (MCP) usage to protect AI-powered workflows. It also expands Check Point’s open-garden architecture with over 250 integrations, improving identity-based controls and Zero Trust enforcement.
These advancements align with the increasing need for Zero Trust architectures in the face of evolving cyber threats. A recent survey indicated that 76% of organizations have started implementing Zero Trust, but only 35% have fully rolled it out, highlighting the ongoing efforts to enhance security.