Check Point Software Technologies Ltd. has launched its Agentic Network Security Orchestration Platform, an autonomous security architecture designed to execute enterprise network security operations with minimal human intervention.
The platform marks a significant shift in how large organisations manage cybersecurity, moving away from traditional rule-based firewall administration towards AI-driven, intent-based security orchestration.
Modern enterprise environments have become highly complex due to hybrid cloud adoption, fragmented infrastructure from mergers and acquisitions, and the rapid expansion of connected devices and AI agents.
“For the first time, security teams can operate entirely at the level of business intent. With Agentic Network Security Orchestration, teams define what needs to be protected and what the policy should achieve. Everything below that, the rule creation, the policy tightening, the virtual patching, is handed to AI agents to execute autonomously, within predefined guardrails and under continuous human oversight,” said Jonathan Zanger, Chief Technology Officer, Check Point Software Technologies.
What you need to know
Check Point’s new platform is designed to address inefficiencies by automating large portions of network security operations.
At the core of the platform is a shift from static firewall rules to intent-based security policy management.
Instead of manually configuring thousands of rules, security teams define business-level objectives, while autonomous agents interpret and execute the underlying technical configurations.
The system also introduces dynamic exposure-based controls and unifies fragmented security consoles into a single orchestration layer across enterprise networks.
The company says this approach allows security operations to be executed faster, more consistently, and with fewer human errors.
Inside the platform: Network Knowledge Graph and semantic intelligence
At the centre of the system is a Network Knowledge Graph, a continuously updated model of an organisation’s live infrastructure.
The graph maps topology, traffic flows, asset dependencies, and configuration changes in real time, allowing AI agents to make decisions based on the actual state of the network rather than static datasets.
The platform also includes a semantic intelligence layer capable of interpreting historical firewall rules and translating them into underlying business intent.
This enables the system to modernise legacy policies while maintaining operational continuity.
“Agentic approaches like Check Point’s ground autonomous execution in a live understanding of the actual network environment, representing a meaningful architectural shift in how organizations’ can structurally close that gap,” says Frank Dickson, Group Vice President, Security and Trust, IDC.
Four core autonomous security functions
Check Point’s platform operates across four primary capabilities:
- Intent-to-Policy translation – Converts business requirements into validated firewall rules across multi-vendor environments
- Zero Trust policy tightening – Identifies over-permissive access and applies corrective measures autonomously
- Autonomous troubleshooting – Diagnoses network failures using multi-step reasoning across logs, topology, and policy history
- Continuous compliance enforcement – Maps configurations to standards such as DORA, PCI-DSS, and NIST in real time
Security teams retain oversight, with high-impact changes requiring human approval and full audit trails provided for all automated actions.
Built on decades of enterprise security experience
Check Point said the system is trained on more than 30 years of operational cybersecurity experience, covering over 100,000 organisations globally.
This historical dataset enables the platform to address real-world edge cases and configuration complexities that generic AI models may not have encountered.
As part of its roadmap, Check Point has also signed a definitive agreement to acquire the team and intellectual property of Deepchecks.
Deepchecks specialises in evaluation, observability, and monitoring tools for AI systems, designed to ensure reliability and trust in production environments.
The integration of its team, composed of LLM specialists and graduates of Israel’s Talpiot programme, is expected to accelerate the development of Check Point’s agentic security capabilities.
Talking Points
It is impressive that Check Point’s Agentic Network Security Orchestration Platform is shifting enterprise cybersecurity from manual configuration to autonomous execution, addressing one of the most persistent bottlenecks in modern security operations.
This single capability positions the platform as a significant step forward in managing today’s highly complex hybrid environments, where traditional rule-based firewall management is increasingly too slow and fragmented to keep up.
At Techparley, we see how agentic AI systems like this are beginning to redefine enterprise cybersecurity by moving security teams away from repetitive operational tasks towards higher-level strategic control.
The introduction of intent-based policy management means organisations can now define what they want to protect, while AI agents translate that intent into enforceable security actions across the entire network.
As this platform evolves, we see an opportunity for organisations to rethink their entire security operating model, moving towards continuous, AI-driven enforcement rather than periodic, manual interventions.
With the right balance of autonomy and human oversight, this could mark a structural shift in how global enterprises approach cybersecurity resilience at scale.
——————-
Bookmark Techparley.com for the most insightful technology news from the African continent.
Follow us on Twitter @Techparleynews, on Facebook at Techparley Africa, on LinkedIn at Techparley Africa, or on Instagram at Techparleynews.

