
Check Point Acquires Veriti
'The acquisition of Veriti marks a significant step toward realizing our hybrid mesh security vision,' said Nadav Zafrir, CEO at Check Point Software Technologies. 'It strengthens the Infinity Platform's open-garden approach, enabling seamless, multi-vendor remediation across the entire security stack. With Veriti, we're advancing preemptive, prevention-first security – an imperative in today's AI-driven threat landscape.'
AI has brought cyber security to a tipping point, enabling the launch of attacks at scale. At the same time, enterprises are hyperconnected, with assets spread across clouds, datacenters, and endpoints, vastly expanding their attack surface. Traditional reactive security is too slow. Veriti continuously identifies, prioritizes, and remediates risk across your multi-vendor environment through automated patching and collaborative threat intelligence, all without disrupting business.
Founded in 2021, Veriti pioneered the Preemptive Exposure Management (PEM) category—actively discovering and mitigating risks across siloed tools. Veriti continuously monitors logs, threat indicators, and vulnerabilities identified across the environment and propagates protections in real time. With integrations into over 70 vendors, it empowers security teams to detect, understand, and prevent attacks without delay.
Core capabilities Veriti brings to the Check Point Infinity Platform: Automated, cross-vendor virtual patching: Veriti instantly applies risk-free, non-disruptive protections across dozens of third-party tools, based on vulnerabilities identified by platforms like CrowdStrike, Tenable, and Rapid7, dramatically reducing patching time from weeks to minutes.
Veriti instantly applies risk-free, non-disruptive protections across dozens of third-party tools, based on vulnerabilities identified by platforms like CrowdStrike, Tenable, and Rapid7, dramatically reducing patching time from weeks to minutes. Real-time threat intelligence enforcement: Veriti verifies threat indicators from any connected tool and automatically orchestrates protection across firewalls, endpoints, WAFs, and cloud platform, enabling fast, coordinated, multi-vendor threat response.
Veriti verifies threat indicators from any connected tool and automatically orchestrates protection across firewalls, endpoints, WAFs, and cloud platform, enabling fast, coordinated, multi-vendor threat response. Seamless integration with 70+ security vendors: Built with a fully API-based architecture, Veriti integrates into existing environments without agents or disruption, supporting the broadest security ecosystem in the market.
Built with a fully API-based architecture, Veriti integrates into existing environments without agents or disruption, supporting the broadest security ecosystem in the market. Stronger synergy with Wiz: Veriti ingests Wiz's cloud exposure insights, such as vulnerable, unpatched cloud servers or applications, and enables automatic, safe virtual patching of those assets through Check Point gateways (and other vendors' as well), enhancing Check Point's ability to execute on its strategic partnership with Wiz.
Veriti ingests Wiz's cloud exposure insights, such as vulnerable, unpatched cloud servers or applications, and enables automatic, safe virtual patching of those assets through Check Point gateways (and other vendors' as well), enhancing Check Point's ability to execute on its strategic partnership with Wiz. Safe, context-aware remediation: Veriti analyzes each customer's environment, including exposures, configurations, and existing protections, to apply the right controls safely, and without operational impact.
'Security teams today suffer from a lack of action: exposures aren't just detected, they're compounding, hiding in the gaps between tools, teams, and timelines,' said Adi Ikan, CEO and co-founder of Veriti. 'We founded Veriti to help organizations not just see risk, but remediate it safely, at scale, and most importantly – without disruption. By joining Check Point, we're accelerating that mission. Together, we'll help organizations reduce their exposure faster through the security tools they already trust.'
Following the closure of the transaction, Veriti's capabilities will be integrated into the Check Point Infinity Platform as part of the Threat Exposure and Risk Management offering. Combined with the recently added External Risk Management (ERM) solution, Veriti enhances Check Point's ability to deliver complete risk lifecycle coverage—proactively managing both internal and external exposures across the entire attack surface.
The closing of the transaction is subject to the customary closing conditions and is expected to occur by the end of Q2 2025. 0 0
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Channel Post MEA
2 days ago
- Channel Post MEA
Tenable One Surpasses 300 Integrations
Tenable has announced a major new milestone as the Tenable One Exposure Management Platform now features over 300 validated integrations, making it the most open and interconnected exposure management platform on the market. This solidifies Tenable's position as the central hub for security data, analytics, and unified risk reduction, limiting the industry silos caused by fragmented visibility that have long plagued security teams. In an era where the average enterprise uses 83 different cybersecurity tools, organizations face a chaotic and siloed view of their attack surface. This fragmentation creates dangerous blind spots that attackers exploit, while security teams waste critical time manually reconciling disparate data instead of stopping threats. Tenable One uniquely solves this challenge by serving as the essential connective tissue for the security stack. While exposure management is still a newer area of focus for most organizations, it has become clear that a robust but open platform with bi-directional partnership among vendors is essential to a preventative approach to cyber risk reduction. 'A closed-off platform isn't just an inconvenience – it's a security risk, and Tenable is leading the charge to tear down these walls,' said Eric Doerr, chief product officer at Tenable. 'Reaching over 300 integrations is a fundamental shift in cyber control. We're giving our customers the power to see everything, connect everything, and manage their exposure from a single, unified platform without having to replace the tools they already trust. This is the future of cybersecurity, and Tenable is delivering it today.' The Tenable One platform unifies data from across the technology ecosystem—including endpoint detection and response (EDR), cloud native application protection platforms (CNAPP), asset inventory, privileged access management (PAM) tools and more—to provide a single, contextualized view of risk. By ingesting and correlating third-party data, Tenable One enriches it with threat intelligence and business context that identifies blind spots, allowing teams to visualize attack paths and perform contextual analysis to cut through the noise and focus on the exposures that matter most. By seamlessly integrating with IT service management systems, communication platforms, security information and event management (SIEM) tools, and patch management tools, Tenable One doesn't just provide insight—it drives action. The platform automates remediation workflows and streamlines cross-team collaboration, dramatically reducing the time it takes to investigate and close exposures. Two-thirds of Tenable One customers — including many of the most security-mature organizations — already leverage Tenable integrations. This open ecosystem delivers measurable impact, with some Tenable customers reporting up to 10x greater visibility and 75% less time spent aggregating data, freeing teams to focus on preemptive, risk-based operations. To further accelerate integration development and expand ecosystem reach, Tenable is introducing a universal integrations connector for the Tenable One platform this fall. This flexible, self-service framework enables customers and partners to easily build and maintain their own integrations – securely connecting custom applications and security tools to Tenable One without waiting on vendor roadmaps. It reinforces Tenable's commitment to openness while empowering organizations to tailor the platform to their unique environments. What Partners Are Saying 'Effective security requires collaboration, and our partnership with Tenable exemplifies this approach in action. By integrating Tenable One's rich exposure data directly into Splunk Cloud Platform, Splunk Enterprise Security, and SOAR, we are providing our joint customers with unparalleled context to detect and respond to threats faster than ever before. The breadth of Tenable's ecosystem is a massive force multiplier for security operations teams.' – Gretchen O'Hara, Vice President, Worldwide Channels & Alliances, Splunk 'The traditional boundaries between security and operational teams have blurred, and meaningful risk reduction demands coordinated action across the business. The deep integration between Tenable One and the ServiceNow AI Platform helps close the gap between vulnerability identification and enterprise-scale remediation. Together, we're enabling customers to accelerate response and embed risk reduction into the fabric of how work gets done, ensuring critical exposures are addressed before they can be exploited.' – Lou Fiorello, GVP and GM of Security and Risk Products, ServiceNow 'Compromising privileged access remains the primary goal of cyberattackers, and understanding exposure is critical. The integration between the CyberArk Identity Security Platform and Tenable One gives our joint customers a powerful advantage. With a unified approach that combines deep vulnerability insights with intelligent privilege controls, organizations can pinpoint risks to their most sensitive accounts and act swiftly to secure them, preventing privilege escalation and stopping breaches.' – Joanne Wu, Vice President, Business Development, CyberArk


Tahawul Tech
3 days ago
- Tahawul Tech
Unified Vulnerability Management Solutions Archives
Tenable's rank as a leader is based on Forrester's analysis of its Strategy and Current Offering, the Tenable One Exposure Management Platform, which received the highest possible score in seven different criteria.


Tahawul Tech
3 days ago
- Tahawul Tech
Tenable named a leader in Unified Vulnerability Management Solutions
Tenable®, the exposure management company, recently announced it has been named a Leader in 'The Forrester Wave™: Unified Vulnerability Management, Q3 2025.' Tenable ranked highest of any evaluated vendor in the Strategy category and received the highest possible scores (5.0) across seven different criteria, including Vision and Roadmap. Forrester defines Unified Vulnerability Management as 'a solution that serves as the primary book of record for all organisational vulnerabilities and improves and facilitates remediation workflows.'1 The report evaluated 10 vendors' unified vulnerability management capabilities based on 19 different criteria. Tenable's rank as a leader is based on Forrester's analysis of its Strategy and Current Offering, the Tenable One Exposure Management Platform, which received the highest possible score in seven different criteria, including: Vision: Tenable credits its 5.0 score to its market momentum and sharp focus on changing the landscape for proactive security teams. The Forrester report notes, 'Tenable continues to extend its established vulnerability management offerings into exposure management with its Tenable One platform'. Tenable credits its 5.0 score to its market momentum and sharp focus on changing the landscape for proactive security teams. The Forrester report notes, 'Tenable continues to extend its established vulnerability management offerings into exposure management with its Tenable One platform'. Breadth of Assets Supported: Tenable credits this score to its unmatched visibility across IT, cloud, OT, identity, and more—through both native discovery and seamless third-party data ingestion. Tenable credits this score to its unmatched visibility across IT, cloud, OT, identity, and more—through both native discovery and seamless third-party data ingestion. Exposure Assessment and Prioritisation: Tenable attributes this score to its holistic organisational and contextual perspective of risk based on threat impact and attack path modelling across multiple environment types. Tenable attributes this score to its holistic organisational and contextual perspective of risk based on threat impact and attack path modelling across multiple environment types. Reporting: The report states, '[Tenable's] reporting stands out with ready-for-presentation reports that include trending and benchmarks.' The report states, '[Tenable's] reporting stands out with ready-for-presentation reports that include trending and benchmarks.' Benchmarking: Tenable attributes its score to its customisable peer-to-peer analyses across industry, geography and more with relevant information to their organisation. According to Forrester's report, 'Tenable's vision considers how proactive security teams will need new strategies to address attackers' evolving techniques over the next three to five years. Its strategy is complemented by a strong roadmap that includes expanding remediation and response capabilities, with a significant focus on remediation orchestration. Tenable's flexible asset-ratio-based pricing model allows customers to scale Tenable One to select different assets to be monitored'. The Forrester report also acknowledged the company 'continues to extend its established vulnerability assessment offerings into exposure management with its Tenable One platform'. 'As attackers grow more sophisticated, organisations need unified visibility and risk-based prioritisation to stay ahead', said Eric Doerr, Chief Product Officer, Tenable. 'Unified vulnerability management is the essential first step toward effective exposure management. To us, this recognition affirms Tenable's prowess in helping customers move from fragmented data to a cohesive, risk-based approach. With Tenable One, we're giving them the clarity and confidence to reduce risk faster and more effectively'. More information on Tenable One is available at: To read the full report, visit: 1 The Unified Vulnerability Management Solutions Landscape, Q1 2025, Forrester Research, Inc. Forrester does not endorse any company, product, brand, or service included in its research publications and does not advise any person to select the products or services of any company or brand based on the ratings included in such publications. Information is based on the best available resources. Opinions reflect judgment at the time and are subject to change. For more information, read about Forrester's objectivity here . Image Credit: Tenable