Skip to main content

Check Point Releases AI Factory Security Blueprint to Safeguard AI Infrastructure from GPU Servers to LLM Prompts

As enterprises and neo-clouds invest billions in private AI infrastructure, Check Point delivers the industry’s most comprehensive security architecture for AI data centers

REDWOOD CITY, Calif., March 23, 2026 (GLOBE NEWSWIRE)Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released the AI Factory Security Architecture Blueprint — a comprehensive, vendor-tested reference architecture for securing private AI infrastructure from the hardware layer to the application layer. Leveraging Check Point’s industry-leading firewall and AI security technologies, and building on NVIDIA BlueField data processing capabilities, the blueprint delivers security-by-design across every layer of the AI factory and data center.

“AI infrastructure has become one of the most valuable and vulnerable assets in the enterprise,” said Nataly Kremer, Chief Product Officer at Check Point. “The AI Factory Security Blueprint is how we help organizations protect those investments — not as an afterthought, but from the ground up, through every layer of the stack.”

The AI data center has become the most strategically valuable, and most exposed, piece of enterprise infrastructure. Organizations building private AI environments to protect intellectual property, meet sovereignty requirements, or reduce public cloud costs are accumulating GPU clusters, training pipelines, inference workloads, and proprietary models that represent substantial investments. And they are doing so faster than security architecture has been able to keep pace.

Unlike traditional data centers, AI computing environments combine high-performance GPU clusters, distributed training pipelines, large-scale data lakes, and real-time inference APIs — creating attack surfaces that conventional security tools were not designed to address. Threats range from training data poisoning and model theft to lateral movement between Kubernetes namespaces, prompt injection against inference APIs, and supply chain compromise through open-source dependencies.

The Check Point AI Factory Security Blueprint delivers layered protection at four levels:

  • Perimeter Layer: Check Point Maestro Hyperscale Firewall provides Zero Trust Network Access (ZTNA), virtual security group segmentation, and scalable policy enforcement at the entry point to the AI fabric, handling north-south traffic from external users, internet sites, and enterprise networks
  • Application and LLM Layer: Check Point AI Agent Security defends inference APIs and LLM endpoints against prompt injection, data exfiltration, adversarial queries, and API abuse, protection that traditional web application firewalls are not equipped to provide. Check Point AI Agent Security is integrated into Check Point Firewalls across cloud, virtual and appliance form factors, Check Point WAF, and Check Point AI Factory Firewall.
  • AI Infrastructure Layer: In a tightly integrated collaboration with NVIDIA, Check Point embeds its firewall and threat prevention directly into NVIDIA BlueField data processing units (DPUs) via the NVIDIA DOCA software platform, delivering hardware-accelerated, inline security at the infrastructure level. This provides high-performance AI prompt defense and inspection of ingress and egress traffic without consuming CPU/GPU cycles, protecting NVIDIA compute servers, segmenting tenants, and enabling runtime threat detection through DOCA Argus on BlueField.
  • Workload and Container Layer: Check Point’s integration with 3rd party microsegmentation solutions enables micro-segmentation and east-west traffic control within Kubernetes clusters, preventing lateral movement between inference namespaces and isolating compromised containers before they can propagate.

The blueprint is aligned with CISA’s principle that AI must be Secure by Design. This means security embedded from inception — in the fabric, in the hardware, in the orchestration layer — rather than layered on top of systems already in production. Check Point’s architecture enforces Zero Trust at every interaction: every user, API call, and service request is authenticated, authorized, and continuously validated.

The blueprint also maps directly to AI governance frameworks including the NIST AI Risk Management Framework and Gartner AI TRiSM, providing the traceability, auditability, and policy enforcement required to meet emerging regulations including the EU AI Act, GDPR, HIPAA, PCI-DSS, and ISO 42001.

Learn more: AI Data Center & AI Factory Security Blueprint | Check Point Software

Follow Check Point on LinkedInX (formerly Twitter), FacebookYouTube and our blog.

About Check Point Software Technologies Ltd.  

Check Point Software Technologies Ltd. (www.checkpoint.com) is a global cyber security leader protecting more than 100,000 organizations worldwide. Its mission is to secure enterprises’ AI transformation. With a prevention-first approach and an open ecosystem architecture, Check Point helps organizations block advanced threats, prioritize exposures, and automate security operations across complex digital environments. The unified architecture simplifies protection across hybrid networks, multi-cloud environments, digital workspaces, and AI systems. Structured around four strategic pillars, Hybrid Mesh Network Security, Workspace Security, Exposure Management, and AI Security, Check Point delivers consistent protection and visibility across multivendor environments, enabling organizations to reduce risk, improve efficiency, and accelerate innovation without increasing complexity.

MEDIA CONTACT:
Liz Wu
Check Point Software Technologies
press@us.checkpoint.com
INVESTOR CONTACT:
Kip E. Meintzer
Check Point Software Technologies
ir@us.checkpoint.com

Disclaimer & Cookie Notice

Welcome to GOLDEA services for Professionals

Before you continue, please confirm the following:

Professional advisers only

I am a professional adviser and would like to visit the GOLDEA CAPITAL for Professionals website.

Important Notice for Investors:

The services and products offered by Goldalea Capital Ltd. are intended exclusively for professional market participants as defined by applicable laws and regulations. This typically includes institutional investors, qualified investors, and high-net-worth individuals who have sufficient knowledge, experience, resources, and independence to assess the risks of trading on their own.

No Investment Advice:

The information, analyses, and market data provided are for general information purposes only and do not constitute individual investment advice. They should not be construed as a basis for investment decisions and do not take into account the specific investment objectives, financial situation, or individual needs of any recipient.

High Risks:

Trading in financial instruments is associated with significant risks and may result in the complete loss of the invested capital. Goldalea Capital Ltd. accepts no liability for losses incurred as a result of the use of the information provided or the execution of transactions.

Sole Responsibility:

The decision to invest or not to invest is solely the responsibility of the investor. Investors should obtain comprehensive information about the risks involved before making any investment decision and, if necessary, seek independent advice.

No Guarantees:

Goldalea Capital Ltd. makes no warranties or representations as to the accuracy, completeness, or timeliness of the information provided. Markets are subject to constant change, and past performance is not a reliable indicator of future results.

Regional Restrictions:

The services offered by Goldalea Capital Ltd. may not be available to all persons or in all countries. It is the responsibility of the investor to ensure that they are authorized to use the services offered.

Please note: This disclaimer is for general information purposes only and does not replace individual legal or tax advice.