Agentic AI,
Artificial Intelligence & Machine Learning,
Next-Generation Technologies & Secure Development
CEO Nadav Zafrir Addresses Recent Acquisitions and Shifts in AI Strategy
As organizations increasingly integrate artificial intelligence (AI) into their operational frameworks, Check Point is evolving its security protocols to enhance proactive threat management and real-time defense capabilities. CEO Nadav Zafrir outlined these strategic adjustments in light of the company’s recent activities, including acquisitions and technology developments.
In his remarks, Zafrir highlighted Check Point’s intensified focus on network connectivity, workspace security, exposure management, and AI runtime security. These initiatives are part of a comprehensive effort to deliver adaptable cybersecurity solutions. The acquisitions of Veriti and Cyberint have significantly augmented the company’s capabilities in threat detection and remediation. Additionally, the issuance of convertible notes is designed to facilitate swift mergers and acquisitions as well as talent acquisition to fortify its technology stack.
Zafrir expressed the ongoing journey toward enhancing human capabilities with AI tools. “Currently, we see the initial phase of human augmentation through LLMs and other AI technologies, necessitating a more agile and precise approach to existing security measures,” he said. As AI systems evolve further into interactive agents, Zafrir emphasized the need to rethink security paradigms to accommodate these advancements.
In a recent interview with Information Security Media Group, he elaborated on the significance of AI runtime security and the mechanisms for training security models aimed at countering threats posed by large language models. He also shared insights on Check Point’s strategic pivot towards strengthening core competencies instead of pursuing cloud-native application protections.
Zafrir joined Check Point in December 2024, bringing with him a wealth of experience from his previous role as a co-founder and managing partner at Team8, a venture group concentrating on cybersecurity and AI investments. His leadership in establishing the Israel Defense Forces’ Cyber Command equips him with a comprehensive perspective on cybersecurity challenges.
As businesses continue to face evolving threats, understanding the tactics utilized by adversaries is crucial. Using the MITRE ATT&CK framework, one can identify potential adversary tactics such as initial access, persistence, and privilege escalation that may have been employed in recent attacks. This structured approach allows organizations to better prepare their defenses and anticipate emerging vulnerabilities in their operational landscapes.
