Check Point, under Nadav Zafrir, is clearly making a deliberate shift toward securing modern enterprise environments reshaped by generative and autonomous AI systems. The company has framed that strategy around four pillars: Hybrid Mesh Network Security, Workspace Security, Exposure Management, and AI Security. What stands out is that this is not just messaging. Check Point backed it with acquisitions, spending nearly $340 million to pull Lakera, Cyata, Cyclops, and Rotate into the Infinity platform as part of what it is building as a unified AI Defense Plane.

The Infinity Portal depicts a new organizational structure
The Infinity Portal depicts a new organizational structure

Lakera

Lakera is one of the clearest examples of where Check Point is heading with AI Security. Acquired in late 2025 for $190 million, Lakera gives Check Point a purpose-built way to secure AI systems at runtime. That matters because traditional security tools were not built to address threats such as prompt injection, model manipulation, or sensitive data leakage from large language models. Lakera brings real-time protection and continuous red teaming to that problem space. Its adversarial engine, trained on tens of millions of attack patterns, enables Check Point to apply guardrails to AI workloads with very low latency and without causing major performance issues. In practical terms, this gives organizations a way to secure AI applications while they are running, rather than treating AI risk as a theoretical problem.

Cyata

Cyata addresses a different but equally important issue: AI agents. Securing the model is only part of the problem. Once organizations begin deploying agents that can take actions, call tools, move data, and make decisions with some degree of autonomy, identity and governance become a major concern. That is where Cyata fits. Acquired in early 2026, Cyata is focused on what can best be described as agentic identity. These non-human actors do not fit neatly into traditional IAM models because they are dynamic, can change behavior quickly and often do not leave the same clean audit trail that human users do. Cyata provides Check Point with a control plane for discovering agents, monitoring their behavior, assessing risk, and enforcing least-privilege access in real time. That is important because without that layer, AI agents can become one of the biggest blind spots in an enterprise security architecture.

Cyclops

Cyclops strengthens the Exposure Management side of the strategy. Check Point acquired it for an estimated $85 million, and the value there is not just more visibility for the sake of visibility. Cyclops is designed to pull together data from more than 150 third-party tools and systems across cloud, on-premises, IoT, and SaaS environments, then normalize and correlate that information into something operationally useful. That gives security teams a better picture of their true asset inventory, including shadow IT and disconnected exposure points that would otherwise be easy to miss. What makes everything more interesting is that it is not just acting like a giant data bucket since Cyclops is used to prioritize exposures based on actual business impact, and it includes a generative AI-based search layer so administrative teams can query their environments more naturally. This is shifting the conversation from endless alert volume to meaningful remediation.

Rotate

Rotate fits into the Workspace Security pillar and gives Check Point a stronger position in the MSP space. MSPs are in a tough spot because they are expected to secure fragmented environments across identities, endpoints, email, and data, often with too many disconnected tools and not enough operational margin. Rotate was built specifically for the MSP environment. The Rotate platform gives MSPs a centralized, multi-tenant way to manage those discrete domains together. Giving small and mid-sized businesses that increasingly depend on MSPs for security outcomes, but those, in turn,  MSPs need a way to deliver those outcomes without building out a full SOC around every unique customer and that customer's workflow. By bringing Rotate into the Infinity platform, Check Point is not just adding another product; Rotate's tech is improving its ability to serve a channel that needs simpler operations and stronger consolidation and still remain flexible in unique environments.

Conclusion

The ties that bind all of these acquisitions look less like isolated purchases and more like parts of a larger platform move. Check Point has a history of building around a protection-first model, and these additions support that direction in different ways. Lakera helps protect AI workloads at runtime. Cyata adds governance and control over autonomous AI agents. Cyclops improves continuous exposure understanding and prioritization. Rotate strengthens multi-tenant workspace security operations for MSPs. Taken together, this is Check Point extending the Infinity platform into something more unified, more operational, and better aligned with how enterprise risk is changing. The broader point is this: as organizations scale AI adoption, Check Point is trying to make sure security keeps pace in a way that is enforced directly in the environment, not bolted on afterward.

Technologies