STOCK TITAN

Check Point Embarks on a Mission to Transform Network Security Management with its Agentic Network Security Orchestration Platform, to Replace Decades of Rule-Based Complexity

Rhea-AI Impact
(Neutral)
Rhea-AI Sentiment
(Neutral)
Tags

Check Point (NASDAQ: CHKP) launched its Agentic Network Security Orchestration Platform, an autonomous agent-based architecture that executes network security operations across hybrid enterprise environments with limited human intervention. The platform aims to shift from rule-based management to intent-based, exposure-driven, unified orchestration.

Core features include a proprietary Network Knowledge Graph and four capabilities: Intent-to-Policy, Zero Trust and policy tightening, autonomous troubleshooting, and continuous compliance. Check Point also signed a definitive agreement to acquire the Deepchecks team and intellectual property to strengthen evaluation and monitoring of agents. Early capabilities are available now, with broader preview in H2 2026.

Loading...
Loading translation...

AI-generated analysis. Not financial advice.

Positive

  • Launch of Agentic Network Security Orchestration platform for autonomous operations
  • Proprietary Network Knowledge Graph modeling live customer environments in real time
  • Four core capabilities: Intent-to-Policy, Zero Trust tightening, troubleshooting, compliance
  • Agent skills built on 30 years of expertise protecting over 100,000 organizations
  • Definitive agreement to acquire Deepchecks team and intellectual property
  • Playblocks Agents early availability and broader multi-vendor preview planned for H2 2026

Negative

  • None.

Key Figures

Change request duration: two to four weeks Core capabilities: 4 capabilities Operational expertise: more than 30 years +2 more
5 metrics
Change request duration two to four weeks Time for a single network change request under legacy processes
Core capabilities 4 capabilities Intent-to-Policy, Zero Trust and Policy Tightening, Autonomous Troubleshooting, Continuous Compliance
Operational expertise more than 30 years Operational experience Check Point cites for fine-tuning agent skills
Customer base over 100,000 organisations Organisations whose environments inform the platform’s agent skills
Playblocks preview timing H2 2026 Planned broader customer preview for Playblocks Agents

Market Reality Check

Price: $127.28 Vol: Volume 1,619,252 is below...
normal vol
$127.28 Last Close
Volume Volume 1,619,252 is below the 20-day average of 2,112,289 (relative volume 0.77x), suggesting no outsized trading response. normal
Technical Price at $127.28 is well below the 200-day MA of $175.11 and 45.56% below the 52-week high, despite being 13.41% above the 52-week low.

Peers on Argus

CHKP gained 2.62% while several infrastructure/software peers also traded higher...

CHKP gained 2.62% while several infrastructure/software peers also traded higher (e.g., GDDY +5.64%, GEN +4.91%, IOT +4.52%). However, the momentum scanner did not flag a coordinated sector move, pointing to a more stock-specific reaction.

Historical Context

5 past events · Latest: May 11 (Positive)
Pattern 5 events
Date Event Sentiment Move Catalyst
May 11 Share repurchase expansion Positive +0.4% Expanded share repurchase authorization by $2.0B, signaling continued capital returns.
Apr 30 GovRAMP authorization Positive -19.6% GovRAMP authorization for government platform extending FedRAMP reach to more agencies.
Apr 30 Q1 2026 earnings Positive -19.6% Q1 2026 results with growing subscriptions, strong cash flow, and higher non-GAAP EPS.
Apr 23 Technology award Positive -5.5% Frost & Sullivan innovation recognition for prevention-first WAF and API security.
Apr 22 AI integration news Positive +0.2% Plan to integrate AI Defense Plane with Google Cloud’s Gemini Enterprise Agent Platform.
Pattern Detected

Positive strategic and recognition news has often seen weak or negative next-day price reactions for CHKP in recent months.

Recent Company History

Over the last month, Check Point reported solid Q1 2026 results with revenue of $668M and non-GAAP EPS of $2.50, yet the stock fell around key earnings and GovRAMP authorization news on April 30, 2026. Earlier, it received a Frost & Sullivan technology innovation award and announced an AI Defense Plane integration with Google Cloud, with limited positive price follow-through. On May 11, 2026, a $2.0B buyback expansion produced only a small gain. Today’s AI-driven orchestration launch and acquisition roadmap fits this pattern of substantial product and platform updates against a mixed trading backdrop.

Market Pulse Summary

This announcement details Check Point’s shift toward agentic, intent-based network security with a n...
Analysis

This announcement details Check Point’s shift toward agentic, intent-based network security with a new orchestration platform and the acquisition of Deepchecks’ team and IP. It builds on prior AI-focused initiatives and government certifications, extending an emphasis on automation, Zero Trust, and continuous compliance with frameworks like DORA and PCI-DSS. Investors may track customer adoption, expansion of Playblocks Agents in H2 2026, and how these capabilities interact with broader product and earnings trends.

Key Terms

zero trust, micro-segmentation, firewall, ai agents, +2 more
6 terms
zero trust technical
"The result is predictable: Zero Trust projects stall, policy tightening never completes..."
Zero trust is a security approach that assumes no one, whether inside or outside an organization, should be automatically trusted. Instead, every access request is carefully verified before being granted, much like checking ID at every door rather than trusting someone just because they are known. For investors, it emphasizes the importance of protecting digital assets and data from potential breaches, reducing overall risk.
micro-segmentation technical
"critical security initiatives like Zero Trust and micro-segmentation languish in administrative density..."
Micro-segmentation is the practice of dividing a customer base into many narrowly defined groups using detailed data so companies can tailor products, pricing and marketing to each small group. Think of it like sorting mail into dozens of tiny, targeted boxes rather than a few large piles; for investors, this can mean higher sales efficiency, better customer retention and clearer growth signals — but also greater reliance on data quality and exposure to privacy or regulatory risks.
firewall technical
"an approach that has remained largely unchanged since the early days of the firewall era."
A firewall is a digital barrier that controls incoming and outgoing traffic between a company's internal computer systems and the wider internet, blocking unauthorized access and filtering potentially harmful data. Investors care because a strong firewall lowers the risk of costly data breaches, operational shutdowns, regulatory fines and reputational harm—like locked doors and a bouncer protecting a building's assets and customer trust, which helps preserve a company's value and future earnings.
ai agents technical
"rapid proliferation of AI agents across infrastructure have created environments..."
AI agents are computer programs designed to perform tasks or make decisions automatically, often by learning from data and adapting to new information. They act like virtual assistants or robots that can handle complex activities without human intervention, which can help businesses and individuals save time and improve efficiency. For investors, AI agents matter because they can enhance decision-making and automate processes that influence markets and financial outcomes.
dora regulatory
"Continuous Compliance maps every rule and configuration change to DORA, PCI-DSS, and NIST..."
The EU Digital Operational Resilience Act (DORA) is a law that requires banks, asset managers, insurers and other financial firms to strengthen how they prevent, detect and report problems with information technology and third‑party service providers. It matters to investors because it raises standards for cybersecurity and incident disclosure, which can change a firm’s costs, reduce unexpected outages or losses, and make operational risks easier to compare—like forcing buildings to meet safety codes so occupants and insurers can better judge risk.
pci-dss regulatory
"Continuous Compliance maps every rule and configuration change to DORA, PCI-DSS, and NIST..."
A global set of security standards companies that handle credit or debit card payments must follow to keep customers’ card information safe, created and maintained by the major card brands. Think of it like required locks, alarms and procedures for a store’s digital cash register; compliance helps reduce the risk of costly data breaches, fines and loss of customer trust, so it directly affects operating costs, liability and investor confidence.

AI-generated analysis. Not financial advice.

As enterprise networks approach the limits of human-driven management, Check Point moves the industry from rules to intent, from fixed controls to dynamic prevention, and from fragmented consoles to unified orchestration

REDWOOD CITY, Calif., May 19, 2026 /PRNewswire/ -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader in cyber security solutions, today launched its Agentic Network Security Orchestration Platform, a purpose-built autonomous agent architecture that executes network security operations across enterprise environments, without requiring constant human intervention. The launch continues the company's mission to fundamentally transform the way enterprise network security is managed, an approach that has remained largely unchanged since the early days of the firewall era.

Enterprise networks have grown beyond human capacity to manage. Hybrid cloud adoption, M&A-driven fragmentation, the explosion of connected devices, and the rapid proliferation of AI agents across infrastructure have created environments that no human team was designed to secure at this scale. A single change request can take two to four weeks to work through analysis, security review, and policy dependencies - only to break something else and restart the cycle. Segmentation projects sit on the board for years and never ship. Policies drift because workloads move faster than any team can follow. The result is predictable: Zero Trust projects stall, policy tightening never completes, and organisations are left exposed. Check Point's platform addresses this by beginning a transformation across three dimensions that have defined and constrained network security management for decades: moving from thousands of static rules to intent-based policy, from fixed threat prevention profiles to dynamic exposure-based controls, and from fragmented vendor consoles to a single orchestration layer across the entire network. Security teams set the business intent. The agents handle everything below it.

"For the first time, security teams can operate entirely at the level of business intent," said Jonathan Zanger, Chief Technology Officer at Check Point Software Technologies. "With Agentic Network Security Orchestration, teams define what needs to be protected and what the policy should achieve. Everything below that, the rule creation, the policy tightening, the virtual patching, is handed to AI agents to execute autonomously, within predefined guardrails and under continuous human oversight. We are turning projects that used to take months into days of auditable action."

"Enterprise network security has reached an inflection point. Layering agentic AI on top of modern hybrid environments creates complexity that outpaces the capabilities of what human teams can manage manually. The consequence is that critical security initiatives like Zero Trust and micro-segmentation languish in administrative density and stall before they deliver value. Agentic approaches like Check Point's ground autonomous execution in a live understanding of the actual network environment, representing a meaningful architectural shift in how organizations' can structurally close that gap." Frank Dickson, Group Vice President, Security and Trust, IDC.

At the center of the platform is a proprietary Network Knowledge Graph, a live, relational model of the customer's actual environment, continuously updated with topology, traffic flows, asset dependencies, and real-time configuration data. This is what separates Check Point's agents from generic AI applied to security problems. Rather than reasoning over static training data, agents reason over the customer's actual network as it exists right now, grounding every decision in the customer's specific reality.

The platform's semantic intelligence layer goes further, interpreting not just the syntax of existing firewall policies but the business intent behind them, including rules created years or decades ago. Once that intent is understood, agents act on it autonomously across four core capabilities:

  • Intent-to-Policy translates natural language business requirements into hardened, risk-validated firewall rules across multi-vendor environments.
  • Zero Trust and Policy Tightening continuously analyses active traffic to identify shadow access and over-permissive configurations, autonomously applying validated tightening recommendations without risking connectivity breaks.
  • Autonomous Troubleshooting conducts multi-step reasoning across topology, policy history, and logs to diagnose failures autonomously, reducing mean time to resolution from hours to minutes.
  • Continuous Compliance maps every rule and configuration change to DORA, PCI-DSS, and NIST in real time, replacing annual audit fire drills with continuous automated enforcement.

Security teams retain authority at the intent level, approving high-impact changes before execution, with full visibility into every agent's action through a complete execution trace. Underlying the platform are agent skills fine-tuned on more than 30 years of operational expertise protecting over 100,000 organisations, spanning the edge cases and configuration complexity that generic models have never encountered.

Accelerating the Roadmap: The Acquisition of Deepchecks's Team and Intellectual Property 

As part of the commitment to deliver on the Agentic Network Security Orchestration roadmap, Check Point has signed a definitive agreement to acquire the team and intellectual property of Deepchecks, a production-grade platform that unifies evaluation, observability, testing, and monitoring, giving teams the visibility and control needed to trust agents in production. The team is comprised of LLM experts, graduates of the prestigious Talpiot technological excellence program. Deepchecks' talent and intellectual property will significantly accelerate the execution of the Agentic Network Security Orchestration roadmap.

"Any multi-agent system must include a robust evaluation layer that enables continuous measurement, tuning, and improvement over time," explained Ofir Korzenyak, VP AI Technologies. "Deepchecks' team brings cutting-edge capabilities precisely in this area, strengthening our ability to deliver agents that continuously improve and can be fine-tuned to customers' specific needs."

Availability
Check Point's Agentic Security Management capabilities are available today - Policy Auditor prevents policy drift, Policy Insights drives zero-trust tightening, and AI Assist accelerates daily admin tasks. Playblocks Agents is available through our Early Availability program, with a broader customer preview introducing more agents, skills, and multi-vendor support launching in H2 2026. For more information and to request access, visit.

Follow Check Point on LinkedIn, X (formerly Twitter), Facebook, YouTube and our blog.

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a global cyber security leader protecting more than 100,000 organizations worldwide. Its mission is to secure enterprises' AI transformation. With a prevention-first approach and an open ecosystem architecture, Check Point helps organizations block advanced threats, prioritize exposures, and automate security operations across complex digital environments. The unified architecture simplifies protection across hybrid networks, multi-cloud environments, digital workspaces, and AI systems. Structured around four strategic pillars, Hybrid Mesh Network Security, Workspace Security, Exposure Management, and AI Security, Check Point delivers consistent protection and visibility across multivendor environments, enabling organizations to reduce risk, improve efficiency, and accelerate innovation without increasing complexity.

Legal Notice Regarding Forward-Looking Statements

This press release contains forward-looking statements. Forward-looking statements generally relate to future events or our future financial or operating performance. Forward-looking statements in this press release include, but are not limited to, statements related to our expectations regarding our products and solutions, our expectations regarding future growth, the expansion of Check Point's industry leadership, the enhancement of shareholder value and the delivery of an industry-leading cyber security platform to customers worldwide. Our expectations and beliefs regarding these matters may not materialize, and actual results or events in the future are subject to risks and uncertainties that could cause actual results or events to differ materially from those projected. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Annual Report on Form 20-F filed with the Securities and Exchange Commission on March 31, 2026. The forward-looking statements in this press release are based on information available to Check Point as of the date hereof, and Check Point disclaims any obligation to update any forward-looking statements, except as required by law.

Cision View original content to download multimedia:https://www.prnewswire.com/news-releases/check-point-embarks-on-a-mission-to-transform-network-security-management-with-its-agentic-network-security-orchestration-platform-to-replace-decades-of-rule-based-complexity-302776183.html

SOURCE Check Point Software Technologies

FAQ

What did Check Point (CHKP) announce on May 19, 2026 about its Agentic Network Security Orchestration Platform?

Check Point announced its Agentic Network Security Orchestration Platform, an agent-based system for automating network security operations. According to Check Point, it moves management from static rules to intent-based policies, dynamic exposure controls, and a single orchestration layer across hybrid enterprise networks.

How does Check Point’s Agentic Network Security Orchestration Platform work for enterprise networks?

The platform uses autonomous agents guided by business intent to execute security tasks. According to Check Point, a proprietary Network Knowledge Graph models live topology, traffic, and dependencies so agents can handle policy creation, tightening, troubleshooting, and compliance across multi-vendor environments.

What are the key capabilities of Check Point’s Agentic Network Security Orchestration Platform for CHKP investors?

The platform provides four core capabilities: Intent-to-Policy, Zero Trust and policy tightening, autonomous troubleshooting, and continuous compliance. According to Check Point, these functions translate business needs into firewall rules, reduce over-permissive access, speed failure diagnosis, and align changes with frameworks like DORA, PCI-DSS, and NIST.

What is the role of the Network Knowledge Graph in Check Point’s new CHKP orchestration platform?

The Network Knowledge Graph is a live relational model of each customer’s environment. According to Check Point, it continuously updates topology, flows, dependencies, and configurations, allowing agents to reason over the actual network state instead of static training data when making security decisions.

How does the Deepchecks acquisition support Check Point’s Agentic Network Security Orchestration roadmap?

Check Point signed a definitive agreement to acquire Deepchecks’ team and intellectual property. According to Check Point, Deepchecks adds production-grade evaluation, observability, testing, and monitoring capabilities, helping measure and tune agents so they improve over time and can be adjusted to customer needs.

When will Check Point’s Agentic Security Management and Playblocks Agents be available to CHKP customers?

Agentic Security Management capabilities like Policy Auditor, Policy Insights, and AI Assist are available today. According to Check Point, Playblocks Agents are in an Early Availability program, with a broader customer preview adding more agents, skills, and multi-vendor support planned for H2 2026.

How could Check Point’s Agentic Network Security Orchestration impact Zero Trust and segmentation projects?

The platform is designed to help progress stalled Zero Trust and segmentation efforts by automating policy work. According to Check Point, agents continuously analyze traffic, tighten over-permissive access, and maintain compliance, aiming to shorten timelines for initiatives that often take months or years.