
Check Point to acquire Veriti, boosting threat management suite
Check Point Software Technologies has entered into a definitive agreement to acquire Veriti Cybersecurity, expanding its offering in threat exposure and risk management.
The acquisition aims to strengthen Check Point's Infinity Platform with Veriti's automated, multi-vendor platform for pre-emptive threat exposure and mitigation. Veriti is recognised for introducing pre-emptive exposure management that delivers automated remediation of threat exposure risks across more than 70 security vendors, without disrupting ongoing operations.
Nadav Zafrir, Chief Executive Officer at Check Point Software Technologies, said, "The acquisition of Veriti marks a significant step toward realising our hybrid mesh security vision. It strengthens the Infinity Platform's open-garden approach, enabling seamless, multi-vendor remediation across the entire security stack. With Veriti, we're advancing preemptive, prevention-first security – an imperative in today's AI-driven threat landscape."
The announcement addresses the growing challenge of AI-enabled cyber attacks and the complexities brought about by hyperconnected IT environments in modern enterprises.
As organisations distribute their assets across clouds, datacentres, and endpoints, the risk of cyber attacks grows due to an expanded attack surface. Traditional reactive security methods are considered inadequate to address these increased risks effectively.
Veriti's platform continuously identifies, prioritises, and remediates risk in multi-vendor security environments through automated patching and collaborative threat intelligence. The company, founded in 2021, has pioneered the Preemptive Exposure Management (PEM) category by actively discovering and mitigating risks that can be hidden in gaps between disparate security tools.
The technology continuously monitors logs, threat indicators, and vulnerabilities present in an organisation's environment, and then coordinates protections in real time. Its integrations cover more than 70 security vendors, enabling security teams to detect and prevent attacks promptly without business disruption.
Veriti's core capabilities to be integrated into the Check Point Infinity Platform include automated, cross-vendor virtual patching, which instantly applies non-disruptive protections based on vulnerabilities identified by security platforms such as CrowdStrike, Tenable, and Rapid7. This approach can reduce patching time from several weeks to a matter of minutes.
The platform also enables real-time threat intelligence enforcement by verifying threat indicators from any connected tool, and orchestrating automated protection across firewalls, endpoints, web application firewalls, and cloud platforms.
This coordination is designed to improve response times and effectiveness in multi-vendor security scenarios.
An additional aspect of Veriti's offering is its seamless integration with existing environments through an API-based architecture, which does not require software agents or cause operational disruptions. The platform is compatible with more than 70 security vendors and supports a wide ecosystem.
Veriti also extends its synergy with Wiz by ingesting Wiz's cloud exposure insights, such as information on unpatched servers or applications, and enables safe, automated virtual patching via Check Point or other vendors' network gateways.
The platform's context-aware remediation analyses an organisation's exposures, configurations, and existing protections to apply appropriate controls in a manner that does not impair operations.
Adi Ikan, Chief Executive Officer and co-founder of Veriti, said, "Security teams today suffer from a lack of action: exposures aren't just detected, they're compounding, hiding in the gaps between tools, teams, and timelines."
He added, "We founded Veriti to help organisations not just see risk, but remediate it safely, at scale, and most importantly - without disruption."
By joining Check Point, we're accelerating that mission. Together, we'll help organisations reduce their exposure faster through the security tools they already trust."
Upon completion of the transaction, Veriti's capabilities will be incorporated into Check Point's Infinity Platform as part of its Threat Exposure and Risk Management suite. Combined with Check Point's recent External Risk Management solution, Veriti enhances the company's ability to address internal and external exposures across the complete enterprise attack surface.
The finalisation of the acquisition is subject to customary closing conditions and is expected by the end of the second quarter of 2025.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Techday NZ
4 days ago
- Techday NZ
Pure Storage unveils Enterprise Data Cloud & flash upgrades
Pure Storage has announced the launch of its Enterprise Data Cloud platform and a series of flash hardware updates designed to address the demands of modern data management and high-performance workloads. Enterprise Data Cloud platform The newly introduced Enterprise Data Cloud (EDC) aims to simplify data and storage management for organisations, enabling a focus on business outcomes rather than infrastructure concerns. The platform, delivered by Pure Storage, facilitates centralised management of data across on-premises, public cloud, and hybrid environments through a unified control plane. According to the company, the EDC model is intended to combat the fragmentation and inefficiencies often associated with traditional storage solutions, which can result in silos and uncontrolled data sprawl. Pure Storage claims that their approach provides IT teams with agile, efficient, and simplified data governance on a broad scale. Charles Giancarlo, Chairman and Chief Executive Officer, Pure Storage, said: "It's time to stop managing storage and start managing data. With AI increasing the potential value of enterprise data, and cyber-threats imperiling it, data storage architectures and the tools for managing data have not kept pace. Only Pure Storage has innovated an architectural approach that enables enterprise customers to manage their global data estate. Pure Fusion allows customers to create their own global Enterprise Data Cloud empowering them to manage their data with the control, automation and tracking needed to lead in a data-driven world." At the core of the EDC is Pure Fusion, a capability which virtualises storage resources and provides autonomous management. Pure Fusion is embedded within storage arrays, allowing for self-discovery and centralised management across an array fleet, minimising the need for manual configuration. Automation and security enhancements The introduction also brings expanded automation options to Pure Fusion, including workload-aware provisioning of file, block, and object storage across the fleet, and automated workflow orchestration. These features are intended to minimise manual operations, reduce non-compliance risks, and improve application resilience. Workflow orchestration now leverages existing integrations with a range of third-party applications such as Cisco, Microsoft, VMware, ServiceNow, and Slack. Users can deploy pre-defined or custom workflows to automate storage, compute, network, database, and application configuration processes. Security is further strengthened through integrations with partners like Rubrik and CrowdStrike. Rubrik Security Cloud is now integrated with Pure Fusion, enabling automated tagging of backup snapshots and improved cyber recovery in response to detected threats. CrowdStrike's Falcon LogScale, combined with Pure Storage infrastructure, aims to provide high-performance, on-premises log analytics and threat detection. Additional enhancements include new disaster recovery options for VMware workloads via Pure Protect and the general availability of an AI Copilot that provides fleet-level insights across topics such as security, performance, and sustainability. Matt Kimball, Vice President and Principal Analyst at Moor Insights & Strategy, observed, "Pure's Enterprise Data Cloud represents a tangible shift in how enterprises manage data and represents real change at the architectural level. By abstracting the complexity of hybrid environments into a unified, policy-driven platform, Pure is enabling organizations to bring clarity and control to data management at scale. With automation, intelligence, and simplicity built in, Pure is delivering on the vision of an enterprise data cloud in a way that's actionable today. It's a bold, thoughtful approach — and one that sets a new bar for the industry." Flash hardware updates In a parallel announcement, Pure Storage detailed upgrades to its FlashArray and FlashBlade product lines to support performance at larger scales and new storage workloads. The new FlashArray//XL R5 is designed to double Input/Output Operations Per Second (IOPS) per rack unit and increase maximum raw capacity by 50% compared to previous models. Steven Allgeier, Vice President, Distributed Infrastructure Group at Fiserv, commented, "At Fiserv we recognize our customers' urgent need to manage escalating data demands with greater efficiency. With Pure Storage FlashArray, we are able to continuously deliver an optimal all-flash performance with reliability for most mission-critical workloads. We are excited to see the benefits of the next-gen FlashArray//XL R5 and how they will empower our customers to scale for extreme demands." The FlashArray//ST supports latency-sensitive workloads, delivering more than 10 million IOPS per five rack units. Meanwhile, the upgraded FlashBlade//S features controller blades that Pure Storage claims boost performance by up to 30% over competitors in tasks like genome sequencing and AI-driven analysis. Pure Storage has also consolidated its approach to unstructured data by extending object support to FlashArray, allowing block, file, and object management within a single platform. John Colgrove, Founder and Chief Visionary at Pure Storage, said, "In an era where data is king and IT complexity remains a major hurdle to accessing and using data for optimal business value, Pure Storage is once again redefining what's possible for customers. Pure Storage delivers the magic by rejecting the norms we've come to accept for storage infrastructure; they are what's holding us back within this new era of exponential data growth and logarithmic growth of insight value." He added, "Pure Storage was born to disrupt the industry, as we introduced new capabilities to reliably achieve better and better performance at any scale. We are unwavering in our mission to enable our customers' ambitions, providing the most innovative and reliable foundation they need to confidently meet any future challenge or opportunity."


Techday NZ
6 days ago
- Techday NZ
CrowdStrike Falcon boosts AWS security with faster AI incident response
CrowdStrike and Amazon Web Services (AWS) have announced the launch of Falcon for AWS Security Incident Response, a new programme allowing AWS customers to access the CrowdStrike Falcon cybersecurity platform at preferred rates via the AWS Marketplace. The initiative is designed to assist organisations in responding to cloud security incidents more quickly while aiming to lower risk and strengthen their overall security stance through simplified access and integration, without requiring a separate procurement process. Response speed The backdrop of this announcement is an environment where cyberattacks have grown more frequent and complex, outpacing the capabilities of traditional response methods, particularly in dynamically shifting cloud environments. The Falcon platform, which is AI-driven, reportedly enables organisations to detect significantly more threats in less time. According to company data, organisations using the Falcon platform can detect 96% more threats twice as fast and investigate incidents 66% more quickly, aiding efforts to prevent breaches. The Falcon platform is positioned as a complement to AWS Security Incident Response's automated triage and investigation capabilities. Together, the companies state, customers can address the entire lifecycle of a security incident, from detection through to resolution. The integration is built to take advantage of AWS infrastructure, offering what is described as a secure, reliable, and highly available environment for joint customers. Customer access "Speed is everything in cybersecurity. When cloud intrusions spread at ever-accelerating speeds, organisations can't afford to wait hours – or days – for help," said Daniel Bernard, Chief Business Officer at CrowdStrike. "Falcon for AWS Security Incident Response puts the proven protection of the Falcon platform into the hands of AWS customers the moment they need it – making AI-powered incident response faster, smarter, and more accessible than ever." With this programme, AWS Security Incident Response customers receive access to the Falcon platform at optimised rates directly through the AWS Marketplace. This move is expected to facilitate cost savings and streamline the procurement process by allowing customers to manage everything within the AWS environment they already use. CrowdStrike states it is committed to helping AWS customers maximise the return on their cloud security investments through this streamlined approach. CrowdStrike's offerings have received the designation of being "Deployed on AWS", verifying their availability and compatibility through the AWS Marketplace. This development further supports customers in deploying cybersecurity capabilities alongside the established security and operational practices of AWS. Industry perspective "In the evolving threat landscape, cloud security needs to be powerful, practical, and properly priced," said Hart Rossman, Director of Security Incident Response at AWS. "Falcon for AWS Security Incident Response checks all three boxes – integrating CrowdStrike's AI-native Falcon platform with our enterprise-grade security services at optimized pricing through AWS Marketplace, creating exceptional value for our joint customers." The Falcon platform is based on the CrowdStrike Security Cloud and incorporates artificial intelligence to interpret real-time indications of attacks, inform threat intelligence, and track adversarial tactics. According to CrowdStrike, the platform is purpose-built for cloud deployment and uses a single, lightweight agent, which is aimed at simplifying and speeding up deployment across multiple environments while reducing overall security complexity. The company highlights that this new approach to delivering Falcon to AWS customers is part of a broader commitment to support organisations in protecting data, workloads, and identities in increasingly distributed cloud computing landscapes. Procurement and deployment The bundled offer is managed through a customer's existing AWS procurement channel, removing the need for additional processes or systems to adopt extended cybersecurity protection. This not only supports operational efficiency but is also intended to make incident response and threat investigations more accessible at times of need. The availability of the Falcon platform in the AWS Marketplace is highlighted by CrowdStrike as providing more straightforward access for customers, as well as the opportunity to leverage the AWS infrastructure's security protocols, reliability, and operational protocols. This announcement underscores the growing trend towards integrating third-party security tools with cloud provider services as organisations continue to transition more critical workloads and sensitive data to cloud environments.


Techday NZ
10-06-2025
- Techday NZ
Pax8 expands cybersecurity offerings with Check Point suite
Pax8 has announced that Check Point Software Technologies is expanding its cybersecurity portfolio on the Pax8 Marketplace, giving managed service providers enhanced access to a range of AI-powered, cloud-delivered security solutions. Portfolio expansion The expansion will make a broad suite of Check Point security solutions available to Pax8 partners worldwide. The newly integrated offerings include Harmony Email & Collaboration, Harmony SASE, Harmony Endpoint, Harmony Mobile, Harmony Browse, and Infinity MDR. According to the company, Harmony Email & Collaboration delivers email security with what the companies state are 99.2% catch rates for threats using both artificial intelligence and human intelligence. Harmony SASE offers internet security, Zero Trust Access, and optimised SD-WAN performance, as well as mobile, browser, and SaaS security. Harmony Endpoint consolidates EPP, EDR, and XDR capabilities within a single client. Harmony Mobile addresses mobile device protection across apps, files, networks, and operating systems. Harmony Browse is aimed at web threat prevention across devices. Infinity MDR provides infrastructure monitoring and incident response through access to Check Point's analysts and incident response staff. Partner access Oguo Atuanya, Corporate Vice President of Vendor Experience at Pax8, said the expansion would strengthen the company's global partner ecosystem, enabling managed service providers (MSPs) to access the majority of Check Point's security solutions. "The expansion of Check Point's portfolio on our Marketplace represents a significant milestone in our partnership and underscores our commitment to delivering enterprise-level security solutions to our MSPs," said Atuanya. "Our partners will now have access to the majority of Check Point's security ecosystem - from email and endpoint protection to cloud security and SASE solutions - all managed through a single, intuitive platform. This unified approach enables MSPs to deliver cybersecurity strategies to their SMB clients, while streamlining operations and driving greater profitability." Technology integration The company says all products will be delivered through the Check Point Infinity Platform, a central interface enabling management and monitoring of security operations, tracking threats and attacker behaviours, and managing incidents across network, endpoint, email, cloud, and IoT environments. Shahar Divon, Director of WW MSSP & SMB Sales at Check Point, commented on the partnership's aim to support MSPs. "This integration demonstrates our commitment to supporting MSPs with enterprise-grade security solutions," said Divon. "By bringing our technologies to Pax8's single Marketplace, we're empowering partners to deliver cybersecurity strategies that protect their clients across all attack vectors, while simplifying management and driving business growth." Follow us on: Share on: