CHKP Check Point Software Technologies Ltd.

Check Point Enables Email Security Telemetry to Flow into CrowdStrike Falcon Next-Gen SIEM

Check Point Enables Email Security Telemetry to Flow into CrowdStrike Falcon Next-Gen SIEM

REDWOOD CITY, Calif., March 17, 2026 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP) today announced a new integration that enables email security telemetry from Check Point Email Security to flow into .

The integration allows security teams to ingest and correlate email-based activity with downstream identity and endpoint signals during investigations, helping connect activity from inbox to endpoint within a single workflow.

“Email remains a primary entry point for credential theft and account takeover,” said Jonathan Gold Shalev, Head of Product Management for Email Security at Check Point Software Technologies. “By making telemetry from our Email & Collaboration Security product available within the CrowdStrike Falcon platform, we’re extending visibility across the attack chain and supporting more efficient investigations as part of our Open Garden strategy.”

The new connector enhances Check Point’s existing integrations across its broader security portfolio, including Check Point Hybrid Mesh, Exposure Management and Workspace solutions. It enables telemetry from these products to flow directly into the CrowdStrike Falcon platform, unifying these insights with other security signals.

Availability

The Check Point Email Security connector for CrowdStrike Falcon Next-Gen SIEM is available today.

For more information, visit .

Follow Check Point on , , , and our .

About Check Point Software Technologies Ltd. 

Check Point Software Technologies Ltd. () is a global cyber security leader protecting more than 100,000 organizations worldwide. Its mission is to secure enterprises’ AI transformation. With a prevention-first approach and an open ecosystem architecture, Check Point helps organizations block advanced threats, prioritize exposures, and automate security operations across complex digital environments. The unified architecture simplifies protection across hybrid networks, multi-cloud environments, digital workspaces, and AI systems. Structured around four strategic pillars, Hybrid Mesh Network Security, Workspace Security, Exposure Management, and AI Security, Check Point delivers consistent protection and visibility across multivendor environments, enabling organizations to reduce risk, improve efficiency, and accelerate innovation without increasing complexity.





Legal Notice Regarding Forward-Looking Statements

This press release contains forward-looking statements. Forward-looking statements generally relate to future events or our future financial or operating performance. Forward-looking statements in this press release include, but are not limited to, statements related to our expectations regarding our products and solutions and Lakera’s products and solutions, our ability to leverage Lakera’s capabilities and integrate them into Check Point, our ability to deliver end-to-end AI security stack, our foundation of the new Check Point’s Global Center of Excellence for AI Security, and the consummation of the acquisition. Our expectations and beliefs regarding these matters may not materialize, and actual results or events in the future are subject to risks and uncertainties that could cause actual results or events to differ materially from those projected. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Annual Report on Form 20-F filed with the Securities and Exchange Commission on March 17, 2025. The forward-looking statements in this press release are based on information available to Check Point as of the date hereof, and Check Point disclaims any obligation to update any forward-looking statements, except as required by law.

MEDIA CONTACT:                                       

Emilie Beneitez Lefebvre  


Check Point Software Technologies       

                        
INVESTOR CONTACT:

Kip E. Meintzer

Check Point Software Technologies        





EN
17/03/2026

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Check Point Software Technologies Ltd.

 PRESS RELEASE

Check Point Launches AI Defense Plane to Secure the Agentic Enterprise...

Check Point Launches AI Defense Plane to Secure the Agentic Enterprise at Scale A unified AI security control plane delivering end-to-end protection across employee AI use, AI applications, and agentic systems REDWOOD CITY, Calif., March 23, 2026 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader in cyber security solutions, today announced the , a unified AI security control plane designed to help enterprises govern how AI is connected, deployed, and operated across the business. As AI systems move from assistants to autonomous actors that access data, invoke tools, and t...

 PRESS RELEASE

Check Point Releases AI Factory Security Blueprint to Safeguard AI Inf...

Check Point Releases AI Factory Security Blueprint to Safeguard AI Infrastructure from GPU Servers to LLM Prompts As enterprises and neo-clouds invest billions in private AI infrastructure, Check Point delivers the industry's most comprehensive security architecture for AI data centers REDWOOD CITY, Calif., March 23, 2026 (GLOBE NEWSWIRE) --  (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released the — a comprehensive, vendor-tested reference architecture for securing private AI infrastructure from the hardware layer to the application layer. Leveraging...

 PRESS RELEASE

Check Point Enables Email Security Telemetry to Flow into CrowdStrike ...

Check Point Enables Email Security Telemetry to Flow into CrowdStrike Falcon Next-Gen SIEM REDWOOD CITY, Calif., March 17, 2026 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP) today announced a new integration that enables email security telemetry from Check Point Email Security to flow into . The integration allows security teams to ingest and correlate email-based activity with downstream identity and endpoint signals during investigations, helping connect activity from inbox to endpoint within a single workflow. “Email remains a primary entry point for credential theft and account takeover,” sai...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch