
Check Point to acquire Veriti Cybersecurity for threat exposure
Check Point Software Technologies has reached a definitive agreement to acquire Veriti Cybersecurity, a platform focused on fully automated, pre-emptive threat exposure and mitigation across multi-vendor environments.
The move comes as organisations face increasing cyberattacks, particularly driven by artificial intelligence and the growth of hyperconnected IT networks, making it more challenging to manage cyber risk and reduce the attack surface.
Nadav Zafrir, Chief Executive Officer at Check Point Software Technologies, said: "The acquisition of Veriti marks a significant step toward realising our hybrid mesh security vision. It strengthens the Infinity Platform's open-garden approach, enabling seamless, multi-vendor remediation across the entire security stack. With Veriti, we're advancing preemptive, prevention-first security – an imperative in today's AI-driven threat landscape."
Veriti, established in 2021, introduced the Preemptive Exposure Management (PEM) category, developing technology to actively discover and remediate risks within complex environments where security controls from multiple vendors may be deployed in parallel.
The platform continuously analyses logs, threat indicators, and vulnerabilities across the IT ecosystem, providing organisations with real-time visibility. Integrating with more than 70 security vendors, Veriti enables security teams to detect and respond to threats without delay, while seeking to eliminate gaps that might arise from tools working in isolation.
Veriti's main capabilities include automated, cross-vendor virtual patching, where it applies protective measures across various third-party tools based on threat data from platforms such as CrowdStrike, Tenable, and Rapid7. This process reduces time to patch from weeks to minutes, aiming to close exposure windows quickly and prevent attacks.
Another feature of Veriti is its real-time threat intelligence enforcement, allowing it to verify threat indicators and coordinate the application of protections across firewalls, endpoints, web application firewalls, and cloud platforms amongst different vendors' products.
In addition, Veriti is built on a fully API-based architecture, allowing integration into existing IT environments without the need for agents or operational disruption, which is designed to make the adoption process straightforward for organisations using a diverse array of security solutions.
Veriti also extends support for partners by ingesting exposure data from cloud security providers such as Wiz. This allows for the automatic remediation of vulnerabilities found in cloud servers or applications, using Check Point or third-party gateways, further aligning with Check Point's strategic relationships.
An important aspect of Veriti's approach is safe, context-aware remediation, seeking to apply security measures tailored to each organisation's specific environment, exposures, and existing protections in an effort to avoid operational disruption.
Adi Ikan, Chief Executive Officer and co-founder of Veriti, commented: "Security teams today suffer from a lack of action: exposures aren't just detected, they're compounding, hiding in the gaps between tools, teams, and timelines. We founded Veriti to help organisations not just see risk, but remediate it safely, at scale, and most importantly - without disruption. By joining Check Point, we're accelerating that mission. Together, we'll help organisations reduce their exposure faster through the security tools they already trust."
After the acquisition is completed, Veriti's technology will become part of the Check Point Infinity Platform under the Threat Exposure and Risk Management portfolio. It will work alongside Check Point's recently introduced External Risk Management (ERM) solution to manage both external and internal risk across the entire attack surface.
The completion of the transaction remains subject to customary closing conditions and is expected by the end of the second quarter of 2025.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Techday NZ
4 hours ago
- Techday NZ
Global survey finds gaps leave cloud security dangerously exposed
Check Point has released its 2025 Cloud Security Report, revealing systemic vulnerabilities in cloud security across global enterprises and highlighting key areas where risk and operational inefficiency are leaving organisations exposed. The report is based on a survey of 937 chief information security officers (CISOs) and IT leaders worldwide, focusing on the challenges faced in securing hybrid, multi-cloud, and edge environments. It documents that 65% of organisations suffered a cloud-related security incident in the past year, a rise from 61% in the previous year. The findings underscore the difficulties companies are experiencing in keeping up with rapid technological change and increasingly sophisticated cyber threats. Only 9% of organisations detected a cloud incident within the first hour, with just 6% managing to remediate such incidents in the same timeframe. This gap provides intruders with more opportunity to remain undetected and exploit weaknesses within cloud environments. Paul Barbosa, Vice President of Cloud Security at Check Point, commented: "Security teams are chasing an ever-moving target. As cloud environments grow more complex and AI-driven threats evolve, organisations can't afford to be stuck with fragmented tools and legacy approaches. It's time to shift toward unified, intelligent, and automated defences designed for the realities of today's decentralised world." The report highlights that cloud adoption continues to outpace security preparedness, with 62% of organisations now using cloud edge technologies, 57% operating hybrid cloud models, and 51% using multi-cloud strategies. Legacy, perimeter-based defences have proven inadequate in keeping pace with these distributed architectures. In terms of detection and remediation, the report found that most organisations remain vulnerable, as 62% took more than 24 hours to remediate breaches. This delay in response time presents attackers with a significant opportunity to escalate access and inflict greater harm. The complexity of cloud security toolsets emerged as an additional concern. The report found that 71% of respondents depend on more than 10 different cloud security tools, and 16% use over 50 tools. More than half of these respondents report experiencing nearly 500 security alerts each day. This high volume of alerts results in alert fatigue, which can slow response times and increase the likelihood that genuine threats are missed. Application security appears inadequate for combating modern threats, with 61% of organisations still relying on traditional, signature-based web application firewalls. These are increasingly ineffective against attacks enhanced by artificial intelligence. While 68% of respondents listed artificial intelligence as a top priority for cyber defence, only 25% felt confident in their ability to respond to AI-driven attacks, illustrating a significant gap in capability and readiness to address emerging threats. Visibility into lateral movement—where attackers move undetected between systems within a cloud environment—remains limited. Only 17% of organisations reported having full visibility into east-west cloud traffic. As a result, once attackers breach an initial perimeter, they often have the ability to move freely and undetected within cloud environments. Detection of threats is also problematic, with only 35% of incidents identified by automated security monitoring platforms. The majority are detected by employees, through audits, or via external reports, exposing shortcomings in real-time threat detection capabilities. Internal challenges further complicate progress. The report notes that 54% of respondents pointed to the rapid pace of technological change as a major obstacle. A shortage of skilled security professionals also represents a substantial barrier for 49% of those surveyed. In addition, 40% identified fragmented toolsets and poor integration between platforms as drivers that slow response and exacerbate visibility gaps. The survey was conducted by Cybersecurity Insiders in early 2025 and included CISOs, cloud architects, security analysts, and IT leaders from across North America, Europe, Asia-Pacific, and other regions. Respondents were asked about cloud security issues, the adoption of artificial intelligence, and the complexities associated with current security architectures. Check Point's recommendations include a move towards decentralised, prevention-focused cloud security strategies. The report advises organisations to consolidate their tools, adopt AI-powered threat detection, and implement real-time telemetry to achieve full visibility across all cloud deployments. The company suggests that using its CloudGuard and Infinity Platform solutions can help firms unify defences, automate incident response, and maintain consistent policy enforcement across platforms and providers. Deryck Mitchelson, Global CISO at Check Point, provided further perspective in the report: "Cloud transformation is accelerating faster than our defences. With attackers moving in minutes and defenders responding in days, the gap between detection and remediation is becoming a danger zone. CISOs must consolidate fragmented tools into unified platforms, gain visibility into lateral movement, and prepare their teams and technologies to counter AI-driven threats, or risk ceding control of the cloud to increasingly sophisticated adversaries."


Techday NZ
17 hours ago
- Techday NZ
Cloud security gaps widen as AI threats outpace defences
Check Point has released its 2025 Cloud Security Report, revealing ongoing challenges faced by enterprises in protecting multi-cloud environments against evolving cyber threats. The report draws on a global survey of more than 900 Chief Information Security Officers (CISOs) and IT leaders, offering detailed insights into cloud security priorities, operational risks, and emerging trends such as generative AI threats and increasing infrastructure complexity. According to the findings, 65% of surveyed organisations experienced a cloud-related security incident in the past year, an increase from 61% the previous year. Only 9% detected incidents within the first hour, and just 6% were able to remediate breaches in that timeframe, providing cyber attackers with extended access across cloud environments. Paul Barbosa, Vice President of Cloud Security at Check Point, commented, "Security teams are chasing an ever-moving target. As cloud environments grow more complex and AI-driven threats evolve, organizations can't afford to be stuck with fragmented tools and legacy approaches. It's time to shift toward unified, intelligent, and automated defenses designed for the realities of today's decentralized world." The report's data indicates that cloud adoption is outpacing organisations' security readiness. While 62% of organisations have embraced cloud edge technologies, 57% deploy hybrid cloud models, and 51% operate in multi-cloud environments, many continue to rely on legacy, perimeter-based defences which prove inadequate for these distributed architectures. Detection and remediation of security incidents remains a major challenge. Only 9% of organisations identified incidents within the first hour, while 62% required more than 24 hours to remediate breaches, giving attackers opportunities to escalate their access. The prevalence of tool sprawl is another concern highlighted in the report. A significant 71% of respondents use more than 10 different cloud security tools, with 16% using over 50. As a result, more than half of these organisations contend with nearly 500 alerts daily, which hinders response times and overwhelms security analysts. When addressing application security, the report finds that 61% of organisations still depend on outdated, signature-based Web Application Firewalls (WAFs). These legacy tools are increasingly ineffective against sophisticated, AI-enhanced cyber threats. Artificial intelligence is a growing focus for cyber defence, with 68% of respondents ranking AI as a top priority. However, only 25% feel adequately prepared to counter AI-driven attacks, revealing a substantial gap in defensive capabilities. Lateral movement within cloud environments - a tactic that enables attackers to navigate undetected once inside a network—remains a critical blind spot. Only 17% of organisations report having full visibility into east-west cloud traffic, making it easier for adversaries to avoid detection following an initial breach. The report also points to shortcomings in threat detection mechanisms. Only 35% of cloud incidents were identified via security monitoring platforms. The majority were discovered by employees, routine audits, or through external reporting, demonstrating limitations in real-time threat detection systems. Internal organisational challenges further complicate effective cloud security. Over half of respondents (54%) cite the rapid pace of technological change as a major hurdle, and 49% report a shortage of skilled security professionals. Tool fragmentation and inadequate integration (experienced by 40%) also contribute to slower response times and increased risk of undetected incidents. In response to these ongoing issues, Check Point recommends organisations move toward decentralised, prevention-first cloud security strategies. This approach includes consolidating security toolsets, adopting AI-based threat detection, and deploying real-time telemetry to achieve comprehensive visibility across edge, hybrid, and multi-cloud infrastructures. By using platforms such as Check Point CloudGuard and the Check Point Infinity Platform, the company suggests that organisations can unify cloud defences, automate incident response processes, and maintain consistent policy enforcement across all environments regardless of the underlying technology or provider. Deryck Mitchelson, Global CISO at Check Point Software Technologies, provides guidance in the report and emphasises, "cloud transformation is accelerating faster than our defenses. With attackers moving in minutes and defenders responding in days, the gap between detection and remediation is becoming a danger zone. CISOs must consolidate fragmented tools into unified platforms, gain visibility into lateral movement, and prepare their teams and technologies to counter AI-driven threats, or risk ceding control of the cloud to increasingly sophisticated adversaries." The 2025 Cloud Security Report was prepared by Cybersecurity Insiders, surveying 937 cybersecurity professionals worldwide, including CISOs, cloud architects, security analysts, and IT leaders. The research addresses how businesses securing hybrid, multi-cloud, and SaaS environments are responding to current threats, with particular focus on advancements such as artificial intelligence and the heightened complexity of modern cloud security.


Techday NZ
17 hours ago
- Techday NZ
Portnox & CrowdStrike team up for real-time access control
Portnox has introduced an integration with CrowdStrike to enable organisations to enforce network access policies using real-time risk intelligence derived from endpoint telemetry. The integration brings together Portnox's cloud-native Network Access Control (NAC) platform with CrowdStrike's device telemetry and Zero Trust Assessment (ZTA) scoring, allowing organisations to tailor access controls based on continuous device risk evaluation. Portnox stated that addressing endpoint visibility and risk-based access control is essential to modern cybersecurity, and that the collaboration with CrowdStrike directly supports this goal by aligning endpoint intelligence with network access enforcement. Denny LeCompte, Chief Executive Officer of Portnox, commented: "In an era where cybersecurity threats are constantly evolving, dynamic, real-time access control is paramount. Our integration with CrowdStrike delivers on this need by empowering organizations to make informed, automated access decisions based on the most current device posture. This partnership significantly fortifies our customers' security posture, enabling them to confidently embrace Zero Trust principles and adapt to an ever-changing risk landscape." CrowdStrike's Falcon platform is a cloud-delivered solution employing artificial intelligence to provide protection for endpoints, workloads, and identities. It features real-time detection and response, threat intelligence, and behaviour-based protection mechanisms aimed at preventing security breaches. A distinctive metric offered by CrowdStrike is the ZTA score, which evaluates the risk level of a device based on inputs such as its health, known vulnerabilities, recent threat detections, patterns of user behaviour, and the operational status of the CrowdStrike agent. This score is represented on a scale from 0 to 100, and allows security teams to determine the appropriate level of network access or if device remediation is necessary. Through the integration, Portnox's platform enhances its ability to implement detailed and adaptive access controls without relying on on-premises hardware or complex setups. New capabilities provided by the integration include: Automatic verification of whether a device is managed by the CrowdStrike Falcon agent before granting network access. Incorporation of ZTA scores into policy decision-making, so that only low-risk devices can receive full access, while devices assessed as high-risk may be assigned to guest networks or receive restricted access. Utilisation of real-time CrowdStrike risk signals to reinforce least-privilege models in both corporate and Bring Your Own Device (BYOD) scenarios. Automated network access control policies that adjust to changes in device risk posture as reported by CrowdStrike, with the goal of limiting threats before escalation. The companies note that this collaborative capability is intended to benefit organisations pursuing Zero Trust architectures, particularly those managing hybrid work environments or BYOD programmes. The system is designed to ensure only trusted and compliant devices connect to corporate networks, blocking unauthorised or insecure devices and helping to maintain ongoing security as threat patterns change. Follow us on: Share on: