Check Point Software Technologies Announces Acquisition of Veriti to Transform Threat Exposure Management
Check Point's Strategic Acquisition of Veriti
In a significant move to enhance its cybersecurity solutions, Check Point Software Technologies has announced the acquisition of Veriti Cybersecurity. This strategic decision underscores the pressing need for organizations to address the growing threat landscape accelerated by artificial intelligence and increasingly interconnected IT environments. The integration of Veriti’s innovative exposure management platform is set to revolutionize threat mitigation for businesses across the globe.
The Growing Challenge of Cyber Threats
As cyberattacks become more sophisticated and widespread, companies are finding themselves at a crossroads. The rapid evolution of AI-driven attacks has made risk exposure management one of the most urgent challenges in the industry. With assets scattered across cloud environments, data centers, and endpoints, the attack surface for organizations has increased dramatically, outpacing traditional reactive security measures.
Veriti, established in 2021, has been a pioneer in proactive exposure management. Its platform offers a fully automated, multi-vendor solution that enables businesses to identify and remediate risks in their infrastructure without disrupting operations. Through automated patching and collaborative threat intelligence, Veriti continuously monitors and prioritizes vulnerabilities across complex environments.
Enhancing the Check Point Infinity Platform
According to Nadav Zafrir, CEO of Check Point, the acquisition of Veriti represents a significant step towards the realization of their hybrid mesh security vision. "This acquisition strengthens our open-garden approach within the Infinity Platform, allowing for seamless remediation across the entire security stack. Together with Veriti, we are committed to driving a proactive, prevention-first security model, which is essential in today's AI-driven threat landscape."
The key functionalities that Veriti brings to the Check Point Infinity Platform include:
1. Automated Cross-Vendor Virtual Patching: By leveraging identified vulnerabilities from platforms like CrowdStrike and Tenable, Veriti offers risk-free protection without disrupting business operations. The time taken for patching can be reduced from weeks to mere minutes.
2. Real-Time Threat Intelligence Implementation: Veriti validates threat indicators from all connected tools, automating orchestration to protect firewalls, endpoints, WAFs, and cloud platforms. This leads to faster and more coordinated responses to threats.
3. Seamless Integration with Over 70 Security Vendors: Built on a complete API-based architecture, Veriti integrates smoothly into existing environments without the need for agents, supporting the largest security ecosystem in the market.
4. Strong Synergy with Wiz: By incorporating insights from Wiz regarding cloud leaks, Veriti facilitates the automatic and safe application of virtual patches through Check Point's gateways.
5. Safe and Context-Aware Remediation: Veriti analyzes each customer's environment—including exposure, configurations, and existing protections—and safely applies appropriate controls without impacting operations.
Adi Ikan, CEO and co-founder of Veriti, emphasizes the growing concern in security teams regarding unaddressed vulnerabilities. "Organizations face a significant challenge in managing not only discovered vulnerabilities but also those lurking within gaps across tools, teams, and timelines. Our mission is to enable organizations to not just understand risks but remediate them safely and efficiently without business disruption. Being part of Check Point accelerates this mission."
Future Integration and Expectations
Following the completion of the acquisition, Veriti’s capabilities will be integrated into the Check Point Infinity Platform, serving as part of a comprehensive threat exposure and risk management service. Pairing this with recently enhanced external risk management (ERM) solutions will allow for proactive management of both internal and external vulnerabilities.