With cyberthreats growing and security getting more complex, Check Point Software is doubling down on its Asia-Pacific (APAC) expansion to stay ahead.
At this year’s CPX 2025 APAC conference in Bangkok, the company announced several initiatives, including the establishment of a new APAC research and development (R&D) hub. The facility, housed within Check Point’s 42,700-square-foot office in Bengaluru, India, is set to become operational in the coming weeks.
Frontier Enterprise spoke with Itai Greenberg, Chief Strategy Officer at Check Point Software, to discuss the company’s latest expansion as part of its broader AI strategy, recent acquisitions, and future business prospects.
How does CheckPoint’s new APAC R&D hub in Bengaluru tie to the company’s overall business strategy?
We already have several hundreds of employees in India today, and our presence there is quite significant. Some of them are developers, and we currently have three — possibly four — large offices across the country. We’re continuing to expand our investment in India, more specifically, in R&D, as part of our strategy to secure hybrid mesh environments and AI-driven security.
India has a strong talent pool, and we see a significant opportunity to leverage this expertise, bringing in top talent to be part of our success.
What about Check Point’s acquisition of Cyberint last year? What gaps does that acquisition fill?
At Check Point, we secure everything which is inside your network — your cloud, your SaaS, your users (wherever they are), as well as your branch offices and data centres. However, hackers operate outside of these environments — on the dark web, social media, and the broader internet.
Cyberint gives visibility to these external threats. It enables us to monitor companies being targeted, detect impersonation attempts on websites and social media, and track malicious activities on the dark web that could impact organisations. By understanding this broader threat landscape, we can provide customers with significantly greater security insights and protection.
Can you elaborate what you meant earlier by securing the hybrid mesh?
Think of the hybrid mesh as a pyramid. At the base, you have the foundation: a world that is becoming hyperconnected. Organisations are moving to the cloud, adopting SaaS applications and large language models (LLMs). Users are working across different devices, including IoT and OT, creating highly complex environments. When all these elements are interconnected, the result is an extremely intricate infrastructure — this is the foundation of the pyramid.
In the middle layer, companies must decide on the right architecture to secure and connect everything. There are different approaches, but the hybrid mesh is the most agile and optimal architecture for achieving both security and connectivity in the most effective way.
At the top of the pyramid, you need a platform to manage this architecture — that’s where the Check Point Infinity platform comes in. It provides the necessary framework to manage hybrid mesh security efficiently.
With most enterprises implementing a hybrid multi-cloud environment, are there ways to simplify the ensuing complexity?
When you have both a data centre and cloud deployments, traffic between them will continue to grow. Every year, traffic will double, and more applications will be hosted in the cloud. These applications will need to communicate not only with those in the data centre but also with applications across multiple clouds.
This is why having scalable security is very important. You don’t want to replace your security solution every year or find yourself waking up in the middle of the night to deal with migrations and replacements.
A scalable architecture provides peace of mind, allowing you to accommodate your company’s growth and how everything is connected — especially with AI — while also protecting your investment. Therefore, being able to keep this architecture long-term without having to rethink it every year is critical.
What else are most customers struggling with at the moment, security-wise?
Customers are grappling with two main challenges. First, technology is evolving faster than ever. New technologies emerge every few months, and employees are eager to adopt them to stay innovative, move quickly, and be creative. Organisations, in turn, are asking, “How can we secure this increasingly complex environment?” — a challenge that continues to grow as we speak.
The second challenge comes from AI-driven threats. Hackers are using AI to launch more sophisticated attacks at a greater scale. At the same time, AI introduces new attack vectors, and many organisations lack the personnel to address them. Even if they want to hire, the necessary skills and expertise are scarce.
To tackle these challenges, companies need a few key things. First, they require solutions that are simple to deploy and platforms that are easy to manage. They also need partners that do more than just generate alerts; solutions must actively block attacks and resolve issues. Finally, organisations need companies that can provide skilled professionals to handle the job when they don’t have the resources to do it themselves.
What is Check Point’s business thrust beyond 2025?
Check Point has a clear strategy built around three key areas:
First, we aim to be the best at securing the hybrid mesh, as well as SASE, cloud environments, network security, APIs, browser-based threats, and employees — wherever they are.
Second, we are focused on securing AI. For every new advancement in AI, we want to be there, ensuring customers have the best possible security.
Third, we are committed to delivering the right services to customers who lack the necessary personnel to manage their security needs.
We are approaching all of these through a connected platform — an open-garden model where we connect with other security vendors, and they connect with us.