Key Takeaways
- Enterprise networks have outgrown human‑driven management due to hybrid cloud, M&A fragmentation, device proliferation, and AI agents.
- Check Point’s Agentic Network Security Orchestration Platform replaces static rule‑based controls with intent‑based, autonomous AI agents.
- A live Network Knowledge Graph grounds every decision in the customer’s actual topology, traffic, and configuration data.
- Four core capabilities—Intent‑to‑Policy, Zero Trust & Policy Tightening, Autonomous Troubleshooting, and Continuous Compliance—execute security tasks without constant human intervention.
- Human teams retain authority at the intent level, approving high‑impact changes while gaining full visibility through execution traces.
- The acquisition of Deepchecks adds evaluation, observability, and tuning expertise to ensure agents improve continuously in production.
- Core capabilities are available now via Policy Auditor, Policy Insights, and AI Assist; a broader preview of Playblocks Agents launches in H2 2026.
Introduction
Check Point Software Technologies Ltd. unveiled its Agentic Network Security Orchestration Platform on May 19, 2026, marking a decisive shift from decades‑old, rule‑centric firewall management to an intent‑driven, autonomous approach. The platform is designed to alleviate the growing burden on security teams as enterprise networks expand beyond human capacity to monitor, configure, and protect. By allowing organizations to articulate business intent and delegating the low‑level execution to AI agents, Check Point aims to accelerate critical initiatives such as Zero Trust and micro‑segmentation that have historically stalled in administrative complexity.
Challenges in Enterprise Network Security
Modern enterprise environments contend with hybrid cloud deployments, frequent mergers and acquisitions, an explosion of connected devices, and the rapid spread of AI agents across infrastructure. These factors create a scale and dynamism that manual processes cannot keep pace with; a single change request often takes two to four weeks to navigate analysis, security review, and policy dependencies, only to disrupt other services and restart the cycle. Segmentation projects linger for years, policies drift as workloads move faster than teams can update them, and Zero Trust efforts stall under administrative overload. The result is persistent exposure despite significant investment in security tools.
Check Point’s Agentic Network Security Orchestration Platform
At its core, the platform replaces thousands of static firewall rules with intent‑based policy orchestration. Security leaders define what needs protection and what outcomes the policy should achieve—expressed in natural language or business‑level objectives. Below that layer, a swarm of AI agents autonomously handles rule creation, policy tightening, virtual patching, and other operational tasks, operating within predefined guardrails and under continuous human oversight. This transformation turns projects that once required months of effort into auditable actions completed in days.
How It Works: Core Capabilities
The platform delivers four interlocking capabilities that together cover the full lifecycle of network security management:
- Intent‑to‑Policy translates business‑level requirements into hardened, risk‑validated firewall rules across multi‑vendor environments, eliminating the manual mapping from intent to syntax.
- Zero Trust and Policy Tightening continuously analyses live traffic to uncover shadow access and over‑permissive configurations, then applies validated tightening recommendations autonomously without breaking connectivity.
- Autonomous Troubleshooting performs multi‑step reasoning using topology, policy history, and log data to diagnose failures, reducing mean time to resolution from hours to minutes.
- Continuous Compliance maps every rule and configuration change to frameworks such as DORA, PCI‑DSS, and NIST in real time, replacing periodic audit fire drills with ongoing automated enforcement.
Each capability is powered by agents that reason over the customer’s actual network state rather than static training data.
The Role of the Network Knowledge Graph
Central to the platform’s effectiveness is a proprietary Network Knowledge Graph—a live, relational model of the customer’s environment that is constantly updated with topology, traffic flows, asset dependencies, and real‑time configuration data. Unlike generic AI models that rely on historical or synthetic datasets, the Knowledge Graph grounds every agent decision in the precise, current reality of the specific network. This contextual awareness enables the agents to distinguish between legitimate variations and genuine threats, ensuring that automated actions are both accurate and safe.
Human Oversight and Governance
While agents execute the bulk of operational work, security teams retain ultimate authority at the intent level. High‑impact changes require explicit approval before execution, and every agent action is logged with a complete execution trace for audit and review. This governance model provides the transparency needed for compliance and builds trust in autonomous systems, allowing teams to focus on strategic decisions rather than routine rule‑maintenance.
Accelerating Roadmap: Deepchecks Acquisition
To strengthen the platform’s reliability and continuous improvement, Check Point has acquired the team and intellectual property of Deepchecks, a production‑grade solution specializing in evaluation, observability, testing, and monitoring of AI systems. Deepchecks’ expertise in measuring agent performance, tuning models, and providing visibility into agent behavior will be integrated into the Agentic Network Security Orchestration roadmap. As noted by Ofir Korzenyak, VP AI Technologies, a robust evaluation layer is essential for any multi‑agent system to evolve safely and effectively in production environments.
Availability and Early Access
Check Point’s Agentic Security Management capabilities are already accessible through existing offerings: Policy Auditor prevents policy drift, Policy Insights drives Zero Trust tightening, and AI Assist accelerates daily administrative tasks. The Playblocks Agents suite, which embodies the full autonomous agent architecture, is available via an Early Availability program, with a broader customer preview—including additional agents, skills, and multi‑vendor support—scheduled for launch in the second half of 2026. Interested organizations can request access through Check Point’s website.
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) protects more than 100,000 organizations worldwide, delivering a prevention‑first, open‑ecosystem approach to cyber security. Its unified architecture spans Hybrid Mesh Network Security, Workspace Security, Exposure Management, and AI Security, enabling consistent protection and visibility across hybrid, multi‑cloud, digital workspace, and AI environments. By reducing risk, improving efficiency, and accelerating innovation without added complexity, Check Point helps enterprises secure their AI transformation.
Conclusion
The launch of Check Point’s Agentic Network Security Orchestration Platform signals a pivotal moment for enterprise cyber security. By shifting from static, human‑intensive rule management to intent‑driven, autonomous AI agents anchored in a live Network Knowledge Graph, the solution addresses the scalability challenges that have long hampered Zero Trust, segmentation, and compliance efforts. With human oversight preserved at the strategic level and the Deepchecks acquisition bolstering continuous agent evaluation, Check Point offers a pragmatic path toward faster, more reliable, and auditable network security operations—turning months‑long projects into days of actionable outcomes.

