Check Point Software Technologies has announced its new Check Point Quantum Firewall Software, R82.10, introducing 20 new capabilities designed to help enterprises safely adopt AI, protect distributed environments and simplify Zero Trust across hybrid networks.
“As organisations embrace AI, security teams are under growing pressure to protect more data, more applications and more distributed environments,” says Nataly Kremer, chief product officer at Check Point Software Technologies. “R82.10 helps enterprises shift to a prevention-first model by unifying management, strengthening Zero Trust and adding protections that support safe, responsible AI adoption and development.”
Enterprises are rapidly increasing their use of AI tools and LLM development, expanding connectivity across users, branches and cloud environments. This creates new risks, including AI-generated threats, identity abuse and configuration drift. R82.10 addresses these challenges with unified, prevention-first capabilities that improve visibility, control and protection across hybrid mesh networks.
“With the efficiency gains promised by AI, security professionals cannot slow down business innovation or risk being excluded,” says Frank Dickson, group vice-president: security and trust at IDC. “The benefits of innovation do not negate the looming security threat being introduced by AI.
“Enterprises need to reduce risk, unify controls and stay ahead of sophisticated malicious actors. Check Point’s approach of embedded AI security into the network stack is an appropriate approach to quickly improve an organisation’s AI security posture.”
Check Point R82.10 introduces 20 new capabilities in four core areas where enterprises face the highest operational pressure today:
- Supporting Safe AI Adoption – R82.10 strengthens oversight of AI-driven activity by detecting unauthorised GenAI tools, expanding visibility into AI applications such as ChatGPT, Claude, Gemini, and monitoring MCP (model context protocol) usage to protect AI-powered workflows.
- Strengthening Hybrid Mesh Network Security – Organisations gain more consistent protection across distributed environments with centralised internet access management for SASE and firewalls, simplified gateway-to-SASE connectivity, and improved identity and device posture validation to support Zero Trust at scale.
- Taking a Prevention-First Approach to Modern Threats – R82.10 introduces phishing protection that works without HTTPS inspection, adaptive IPS to reduce alert fatigue, and new Threat Prevention Insights to highlight misconfigurations and posture gaps before attackers can exploit them.
- Eliminating Silos with a Unified Security Platform – R82.10 expands Check Point’s open-garden architecture with more than 250 integrations. These integrations allow organisations to apply endpoint posture signals from their existing providers directly within Check Point policies, improving identity-based controls and Zero Trust enforcement.