cxo voice
  • Business
  • Technology
    • Artificial Intelligence
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • CXO Insights
  • Cyber Security
  • CXO Interviews
No Result
View All Result
  • Business
  • Technology
    • Artificial Intelligence
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • CXO Insights
  • Cyber Security
  • CXO Interviews
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home Cyber Security

Check Point Launches Quantum Firewall Software R82.10 to Secure the AI-Driven Enterprise

Deepa Sharma by Deepa Sharma
December 5, 2025
Check Point Quantum Firewall

Check Point

Check Point Software Technologies announced its new Check Point Quantum Firewall Software, R82.10, a major upgrade designed to protect enterprises operating in an increasingly AI-driven threat landscape.

“As organisations embrace AI, security teams are under growing pressure to protect more data, more applications and more distributed environments,” said Nataly Kremer, Chief Product Officer at Check Point Software Technologies.

AI Brings Speed, but Also New Attack Vectors

Enterprises are accelerating AI adoption, and this transformation is widening the attack surface at an unprecedented pace. R82.10 is engineered to counter these emerging risks. The software integrates advanced AI-adaptive threat prevention, giving security teams the ability to detect malicious patterns in real time, even when attackers use generative AI tools to disguise behaviour, automate reconnaissance or launch polymorphic malware.

Key Enhancements

Check Point’s update focuses heavily on usability and operational efficiency, areas where security teams often struggle under load. R82.10 includes:

Unified AI Threat Engine that correlates signals from endpoints, cloud workloads and gateways to produce more reliable detections.

Accelerated packet inspection capable of handling AI-era traffic volumes without performance bottlenecks.

Automatic policy optimisation, reducing manual configuration errors and ensuring rules keep pace with dynamic cloud and hybrid environments.

Deep integration with Check Point’s Infinity Platform, extending visibility from on-premise networks to SaaS, APIs and distributed AI services.

Zero-touch deployment options that simplify rollout across geographically dispersed networks.

Check Point says these improvements are driven directly by customer feedback, particularly from organisations struggling to unify governance across mixed environments where automation, microservices and AI systems continuously change network behaviour.

R82.10 Designed for the Reality of Hybrid, AI-Powered Enterprises

Security leaders are increasingly dealing with environments where data moves between edge devices, private data centres, cloud platforms and external AI services. R82.10 aims to secure this complexity with context-aware inspection. R82.10 provides granular inspection, anomaly detection and automated blocking for high-risk API operations.

The company positions R82.10 as a defence mechanism built for this new reality: a firewall that understands AI-driven threats and responds with AI-powered protections.

Analysts say this launch underscores a broader industry trend, security is shifting from static rule-based systems to autonomous, self-optimising defence layers. As enterprises expand their use of AI, security vendors are embedding automation, predictive analytics and behaviour-based detection into their core offerings.

Also Read: Cyberattacks Surge 5% Year-Over-Year with Ransomware Threats on the Rise, Education Sector Most Targeted

Deepa Sharma

Deepa Sharma

Deepa Sharma is CXOVoice’s Managing Editor, overseeing all coverage technology, cybersecurity, banking, and financial coverage. She can be reached at [email protected]

Related Posts

Palo Alto Acquisition of CyberArk
Cyber Security

Palo Alto Networks Completes Acquisition of CyberArk to Lead in AI-Era Security

February 12, 2026
Cyber Resilience
Cyber Security

Why Identity Will Define Enterprise Cyber Resilience in an AI-First World

February 10, 2026
Cyber Attacks AI
Cyber Security

Cyber Attacks Surge 70% as AI-Powered Threats Reach Record Levels, Check Point Report

January 29, 2026
Check Point Exposure Management
Cyber Security

Check Point Unveils AI-Driven Exposure Management to Close Cybersecurity Remediation Gap

January 22, 2026
Cybersecurity predictions 2026
Cyber Security

Prioritizing Proactive Cybersecurity as a Strategic Advantage: The Top 5 Predictions for India in 2026

December 23, 2025
Home Routers
Cyber Security

The Home Router Crisis of 2026: How India’s Living Rooms Became the New Cyberwar Frontline

December 23, 2025
Palo Alto Networks and Google Cloud
Cyber Security

Palo Alto Networks and Google Cloud Expand Partnership to Enhance AI Security for Enterprises

December 22, 2025
AI attack
Cyber Security

Palo Alto Networks Report Reveals AI is Driving a Massive Cloud Attack Surface Expansion

December 17, 2025
Load More

More Articles

SDV

India’s Automobile Demand Isn’t Just About EVs,  It’s Becoming a Software-First Market

February 18, 2026
Unilever Google

Unilever, Google Cloud Announce Five-Year Partnership Focused on AI-Led Consumer Goods Transformation

February 17, 2026
Infosys Unveils “AI-First Value Framework” to Capture Expanding AI Services Market

Infosys Unveils “AI-First Value Framework” to Capture Expanding AI Services Market

February 17, 2026
Adani Group Data Center

Adani Group Commits $100 Billion Investment to Build AI-Ready Data Center by 2035

February 17, 2026

Get Weekly CXO Intelligence.

Loading

CXO Insights

AI India
Artificial Intelligence

AI as a Public Good: From Democratic Principles to Ground-Level Practice

by News Desk
February 13, 2026
Cyber Resilience
Cyber Security

Why Identity Will Define Enterprise Cyber Resilience in an AI-First World

by Sunil Sharma
February 10, 2026
HDDs storage
Opinion

5 Reasons HDDs Will Continue to Dominate Enterprise Storage in the AI Era

by Owais Mohammed
January 13, 2026
Cybersecurity predictions 2026
Cyber Security

Prioritizing Proactive Cybersecurity as a Strategic Advantage: The Top 5 Predictions for India in 2026

by Heba Sayed
December 23, 2025

CXO Interviews

1Point1
Business

How 1Point1 Solutions Is Betting Its Future on AI to Redefine BPM

>
NewgenONE
Business

Reimagining Enterprise Transformation: Varun Goswami on the Future of NewgenONE and AI-Driven Automation

>
Jagat Shah, Chairman & CEO of MITSUMI Group
Business

Leadership in Emerging Markets: Exclusive Interview with Jagat Shah, Chairman & CEO of MITSUMI Distribution

>
Tokenization
Blockchain

Revolutionizing Finance: An Exclusive Interview with Sid Ugrankar, Co-founder of Qila.io on the Future of Blockchain and Tokenization

>

CXOVoice.com is a leading online publication for CXOs, entrepreneurs, senior leaders, developers, and industry professionals. We publish informed analysis, news reporting, expert commentary, and expert insights across enterprise technology, digital transformation, cybersecurity, data, AI, sustainability, and governance.

Connect with us

Easy Links

  • Cryptocurrency
  • Company Announcements
  • Event
  • Blockchain
  • Resources & Downloads
Loading
  • Home
  • About Us
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Editorial Policy
  • Feedback

Copyright © 2026 CXOVoice - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/

No Result
View All Result
  • Home
  • News
  • Business
  • Technology
  • Cyber Security
  • Opinion

Copyright © 2026 CXOVoice - All Rights Reserved