Checkpoint logo
Contact us
Maxim Rakosiy
Head of Information Security Department
Nikolay Trofimets
Information security engineer

Check Point

A leader in providing comprehensive protection for organizations of any size in the field of Internet security. The company is a provider of comprehensive security solutions for networks, data and network endpoints with a unified management structure.

Solutions Check Point Software Technologies Ltd. designed to ensure the security of information exchange and resources of corporate networks.
Request a demo

Check UP your IT-infrastructure

How to prevent cyber attacks on your business?
Order Security CheckUp and check your IT infrastructure

Check Up

Checkpoint Quantum

Network security from the most sophisticated cyber attacks

Explore Next Generation Firewalls


The Quantum Rugged 1570R complies with industrial specificationssuch as IEEE 1613 and IEC 61850-3 for heat, vibration and immunity to electromagnetic interference (EMI). In extremetemperatures from -40°C to 75°C where other security gateways would fail, this appliance keeps you secure!
More information


Check Point Quantum Smart-1 Appliancesconsolidate security management, including logging, event management, and reporting into a single dedicated managementappliance. Organizations can now efficiently manage their data and event management requirements across networks, cloud andmobile ꟷ gaining centralized visibility into billions of logs, visual indication of risks, and the ability to quickly investigate potentialthreats.
More information


DDoS Protector Appliances offer flexible deployment options to easily protect any size business, and integrated securitymanagement for real-time traffic analysis and threat management intelligence for advanced protection against DDoS attacks.Check Point also provides dedicated 24/7 support and resources to ensure up-to-the-minute protections.
Contact the manager


Check Point SandBlast Zero-Day Protection provides comprehensive protection from the most dangerous attacks while ensuring quick delivery of safe content to your users. Twounique capabilities -Threat Emulation and Threat Extraction take threat defense to the next level.

SandBlast Network offers flexible deployment options, letting you add zero-day protection to your current securitygateways as a:
• Cloud-based service
• On-premises physical or virtual appliance, suitable for regulated environments
• Standalone Threat Emulation inline appliance, or Mail Transfer Agent (MTA), when deployed with a third partysecurity gateway
Download the guide


Cyber Security Platform release (R81.20). Faster, AI-Enabled Network Security and Advanced Threat Prevention for On-Premise, Cloud and IoT
A new era in network security with Quantum​
— Deep Learning Threat Prevention
— New Zero-Day Phishing: 4xMore attacks blocked compared to Signature based technologies, 40%Zero-Day phishing MISSED by other AI based technologies
New Zero phishing software blade
The Four Pillars: Building Blocks of R81 Cyber Security Platform
1. Automated Security
2. Consolidated Security
3. Dynamic
4. Efficient operations
More information

Quantum IoT Protect for Enterprise, Healthcare and Industrial

Quantum IoT Protect prevents IoT cyber attacks, adapting protections to any IoT or OT device across smart-office, smart-building, medical and industrial environments.
Delivering zero-trust policy tailored per device, Quantum IoT Protect uses:
— Real time threat intelligence
— 60 innovative security services
— On-device runtime protection to deliver a complete, end-to-end prevention-first strategy for an ever-evolving cyberphysical world
Uncompromising Security
Delivers the highest-caliber threat prevention with award winning SandBlast Zero Day protection out of the box
Security at Hyperscale
On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises
Unified Security
R81 unified security management control across networks, clouds, and IoT increases efficiency cutting security operations up to 80%

Checkpoint CloudGuard

Secure your cloud

Unified cloud native security across your applications, workloads, and network-giving you the confidence to automate security, prevent threats, and manage posture-at cloud speed and scale.

Security and Posture Management
Threat prevention and high fidelity posture management
Automated DevSecOps
Multi-cloud security from DevOps to production
Unified Security for Multi-Cloud
Visibility, intelligence and threat prevention under one platform

Checkpoint Harmony

Secure Users and Access

Harmony Unifies 6 Cloud-based Security Products to Keep Remote Workforce 100% Safe

Conneted anywhere
Securely connect users to any resource anywhere
Any corporation application
Zero-trust access to any corporate application, from any web browser (web application, database, remote desktop
Web browsing
Secure, fast, and private internet browsing experience
E-mail and collaboration applications
Protection of user email and collaboration apps such as Office 365, MS Exchange, Teams, SharePoint, OneDrive, and G-Suite. and a mobile threat defence solution.
Any user device
Threats prevention on user devices with complete endpoint protection and a mobile threat defence solution.

Checkpoint Horizon

Prevention-First Security Operations & Unified Management Suite

Horizon offers XDR, MDR, and events management solutions for complete coverage of networks, endpoints, cloud, email and IoT, from one pane of glass.

Prevention-first XDR/XPR
Prevent attacks from quickly expanding within the environment
Expose Threats with High Confidence
Based on AI and machine learning innovative technologies
Enterprise Wide Prevention
Unified XDR/XPR across network, cloud, endpoint, mobile, and email