Check Point Software Technologies Launches Automated Unified Cloud Workload Protection

Check Point

Check Point CloudGuard now offers the broadest workload security in the market, which automatically protects applications, functions, and containers from development through runtime, across any cloud via a single interface

(June 26, 2021, Taipei) Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally, has expanded the capabilities of its unified Cloud Native Security Platform, to deliver application-first workload protection with Check Point CloudGuard Workload Protection. This fully automated cloud workload security solution empowers security teams with tools to automate security across applications, Application Programing Interfaces (APIs) and microservices from development to runtime via a single interface.


As the COVID-19 pandemic forced enterprises to transition to the new ‘work from anywhere’ environment, cloud became a natural progression for organizations looking to enable their remote workers quickly. As more organizations are still migrating to the cloud in parallel to undergoing the “shift-left” organizational change, security teams find themselves with multiple platforms to manage. These platforms provide neither the visibility nor the ability to protect the rapidly growing cloud workload deployments. In fact, according to a recent survey, 68% of enterprises regard the misconfiguration of cloud assets as one of the biggest contributors to cloud security threats.


“By unifying essential cloud security capabilities, Check Point’s CloudGuard platform is meeting a central requirement revealed from ESG’s annual cloud-native security research study, a strong preference for a consolidated set of controls based on an integrated platform. The fully automated approach of the CloudGuard platform reflects another central finding from our research, automating the introduction of controls and processes via integration with the continuous integration and continuous (CI/CD) tools employed by DevOps,” said Doug Cahill, Vice President, Analyst Services and Senior Analyst, Enterprise Strategy Group.


Application-first Approach to Automated Workload Protection

CloudGuard takes an “application-first” approach to workload protection with cloud native automated web application and API protection. Key features and benefits include:


“CloudGuard significantly helps us to improve and automate our overall cloud security posture,” explained Leonardo Amor and Darwin Ochoa, CISO office, Telefonica Tech. “This cloud native solution allows us to visualize and control our security posture, and conform to regulatory requirements and security best practices automatically, and therefore our team can actively enforce security best practices, and protect us against identity theft and data loss in the cloud.”


“To protect cloud native applications, organizations need to implement cloud born solutions that can keep up with the speed of DevOps,” said TJ Gonen, Head of Cloud Product Line, at Check Point Software. “Check Point’s strategy is to help organizations secure their most critical workloads with a unified platform. Check Point CloudGuard is designed to address the challenges that come with cloud computing and automate all aspects of application and workload security. ”


Check Point CloudGuard has expanded to include container security, which completes the cloud native Workload Protection suite. The combination of AppSec, threat intelligence & threat hunting, high fidelity posture management, combined with runtime protection and admission control for containers and serverless functions, makes Check Point CloudGuard the most complete, automated, cloud native workload protection offering in the market.


Check Point CloudGuard Workload Protection is available immediately. For full details, visit this website.

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. ( is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s Infinity solution effectively protects enterprises and public institutions from fifth generation cyberattacks with an industry leading catch rate of malware, ransomware and other types of attacks. The three pillars of “Infinity” provide complete protection for various enterprise environments and advanced threat prevention for fifth generation cyberattacks: Check Point Harmony specially produced for remote work, Check Point CloudGuard for automated cloud protection, and Check Point Quantum for network border and data center protection. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.


About Check Point Research

Check Point Research (CPR) provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point solutions are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.

Contact Us