
TechNadu interacted with Harish Kumar G S, Head of Sales, for India and South Asia at Check Point Software Technologies, and received in-depth information about AI vulnerabilities, its advantages, and the need for regular security updates for its own safety.
Users are deceived with more convincing AI-generated phishing emails, and deepfake content that are disturbingly difficult to distinguish and are distributed on social media, projecting to be from someone it is not.
Innovation and collaboration are key to a robust cybersecurity infrastructure. Kumar addressed the role of AI as a defender of security, and how Check Point is aggressively expanding its AI-driven solutions.
He shed light on how Check Point has been diligently working towards innovative cybersecurity solutions and has collaborated with NVIDIA and Microsoft for improved threat detection.
He reiterated the need for robust cybersecurity measures to protect vulnerable sectors like healthcare and education, the requirement for a security overhaul in India, and GenAI’s capabilities in detecting vast datasets that are instrumental in faster threat detection.
Read on to learn everything that Kumar detailed, including the 3Cs of Optimum Security, ThreatCloud AI, and the diminishing line between cybersecurity and cybercrime owing to state-sponsored attacks.
1. Please tell us about the making of Check Point. How did it come into being, and what are its future plans?
Check Point Software, founded by CEO Gil Shwed in 1993, pioneered cyber security with the introduction of the first stateful inspection firewall in 1994. For 32 years, our mission has been to make the internet safe for life and business. We provide a comprehensive security solution across network, cloud, access, endpoints, IoT, management, and services, guided by a prevention-first approach, gold standard management, consolidated architecture, and the largest partner ecosystem.
Check Point’s “3Cs of Optimum Security” advocate for consolidation, comprehensive solutions, and collaboration. Consolidation streamlines security operations, providing real-time visibility and management, while comprehensive solutions protect the entire attack surface from networks to endpoints. Collaboration ensures that different security solutions within an organization work together to provide company-wide protection.
Check Point is dedicated to securing a hyperconnected world in the era of AI by delivering robust, real security powered by AI without unnecessary complexity.
Check Point’s Infinity platform is powered by ThreatCloud AI, which makes 2 billion security decisions daily, our solutions leverage AI, big data, and real-time threat intelligence to safeguard organizations against the most advanced cyberattacks. Infinity’s real security platform for AI and powered by AI, hybrid mesh architecture, unified management delivers the best threat prevention for on-premise, cloud and the workspace with Real Time Collaborative Threat Intelligence across Check Point and 3rd party products.
Looking ahead, Check Point is focused on accelerating growth and securing the hybrid mesh network, a crucial architecture for the future. With evolving leadership, we remain committed to innovation and aggressive expansion, especially in AI-driven cyber security solutions.
2. Could you provide an overview of the cyber security landscape in India and worldwide as we stand today? What are the primary threats organizations are facing?
The cyber security landscape in India and globally is evolving rapidly, with organizations facing an unprecedented surge in attacks. India, in particular, has become a prime target, experiencing an average of 3,284 attacks per week, nearly double the global average (1,843), according to Check Point’s Threat Intelligence Report.
Sectors like healthcare (8,614 attacks per week), education/research (7,983), and government/military (4,731) are among the most impacted. The rise of electronic health records (EHRs), telemedicine, and IoT devices has expanded the attack surface, leaving organizations vulnerable to sophisticated cyber threats.
Among the most pressing threats today are ransomware, phishing, and advanced persistent threats (APTs), which are evolving rapidly with AI and automation. Ransomware attacks have become more targeted, often leveraging cyber insurance details to demand higher ransoms.
Phishing attacks are now powered by AI-generated emails and deepfake content, making them harder to detect. Additionally, state-sponsored cyber threats have intensified, with groups like APT36 using cloud-based platforms to carry out espionage activities.
The biggest concern is AI-driven cybercrime, where attackers use machine learning to enhance social engineering tactics, create realistic deepfake scams, and exploit zero-day vulnerabilities in supply chains. With the rise of geopolitical tensions, state-sponsored attacks are also increasing, blurring the lines between cybercrime and cyber warfare.
3. There's a growing concern about how generative AI is being leveraged by cyber attackers. Can you elaborate on how this technology is enabling more sophisticated attacks, and what countermeasures are being developed?
The rise of AI in cyber security is a double-edged sword, where we have AI for cyber security but we also require cyber security for AI.
While AI strengthens defenses and enhances security frameworks, it also provides cybercriminals with advanced tools to execute highly sophisticated attacks. Generative AI has automated phishing campaigns, making them more convincing and difficult to detect.
It has also enabled the creation of hyper-realistic deepfakes and voice clones at minimal cost—such as during India’s elections, where deepfake technology was reportedly used to influence voters for as little as 8 INR (less than 0.10 USD). Additionally, attackers can now analyze social media data and exploit system vulnerabilities with unprecedented precision, enabling large-scale, targeted cyberattacks.
At the same time, GenAI is proving to be a valuable asset in cyber security. It enhances threat detection by rapidly analyzing vast datasets and automating responses, significantly reducing the time needed to identify and contain breaches.
However, as cybercriminals continue to leverage AI for sophisticated malware and phishing tactics, organizations must stay proactive. Deploying AI-driven threat intelligence tools, conducting frequent security audits, and educating employees about AI-powered scams are essential steps in mitigating these risks.
Since 2014, we have actively embedded AI into our security solutions, consolidating data to strengthen threat intelligence. At the core of our AI strategy is Check Point’s Threat Cloud AI, which powers over 40 AI engines and makes 2 billion security decisions every day.
This underpins the AI-powered Infinity Platform, strengthened through partnerships with NVIDIA and Microsoft.
4. What initiatives/technologies are used by Check Point to ensure prevention is more accurate?
At the core is Check Point’s Threat Cloud AI, powering over 40 AI engines to make 2 billion security decisions daily. The ’For AI and Powered by AI’ Infinity Platform, strengthened through collaborations with NVIDIA and Microsoft, enhances proactive threat detection.
In 2024, Check Point launched the Infinity AI Copilot, automating 90% of routine security tasks to help security teams focus on strategic threats. Additionally, Check Point Harmony, integrated with Infinity, uses contextual AI to tailor security policies based on user behavior, application risk, and device posture, reducing high-risk activities.
Beyond AI, Check Point invests in advanced cyber security solutions such as Secure Access Service Edge (SASE), reinforced by its acquisition of Perimeter 81. Recognizing the growing threat landscape, the company has enhanced email security, achieving industry-leading catch rates against rising email and collaboration threats.
Check Point also continues to innovate in firewall technology with solutions like Check Point Quantum Maestro, designed for high-speed and efficient protection. In cloud security, Check Point addresses DevSecOps demands with solutions from SPECTRAL, catering to India’s expanding developer community. These strategic investments ensure a comprehensive, end-to-end security approach.
5. Looking towards 2025, what emerging trends in cyber security do you anticipate will impact businesses the most? Are there specific threats or attack vectors you predict will rise in prominence by 2025? How should organizations prepare for these?
In 2025, Indian businesses will face increasingly sophisticated cyber threats, with ransomware and AI-driven attacks leading the charge. According to Cyberint (a Check Point Company)’s annual Ransomware Report 2024, India was one of the top 10 countries targeted by ransomware, with 99 known cases in 2024.
Ransomware attacks are expected to become faster and more precise, leveraging AI for rapid propagation. Phishing, the primary entry point for such attacks, will evolve with AI-generated emails and deepfake impersonations, making scams harder to detect.
Additionally, generative AI will fuel large-scale frauds, including voice cloning and "digital arrest" scams, which already cost Indians over ₹120 crore in early 2024. The improper use of AI tools by employees could further expose sensitive data, while emerging quantum computing technologies may undermine traditional encryption systems, posing severe risks to industries like finance and healthcare.
To mitigate these threats, organizations must embrace proactive AI-driven security, such as AI-powered Security Operations Centres (SOCs) for real-time threat detection. A Zero Trust security model, alongside rigorous employee training on phishing and deepfake risks, will be essential.
Companies must also prioritize securing IoT devices, implementing quantum-safe encryption, and ensuring compliance with evolving regulatory frameworks. By embedding cyber security into their overall IT and risk management strategies, businesses can build resilience against an increasingly complex and AI-powered threat landscape.
6. India is often highlighted for its tech talent. However, there's talk of a cyber security skill gap. What is your perspective on this issue, and what steps is Check Point taking to address it?
India is facing a significant cyber security skills gap, ranking second globally in workforce shortages. As of 2024, about 4.8 million cyber security jobs remain unfilled—a 19% increase from 2023—underscoring the growing skills gap amid a stagnant workforce.
While the demand for cyber security professionals has surged over the past 5-6 years, the rapid evolution of cyber threats calls for a workforce that can anticipate and counter emerging challenges, making the gap even more critical.
At Check Point, we recognize this pressing challenge and have taken decisive steps to bridge the gap. In 2021, we launched the Check Point Secure Academy—a global initiative offering free, high-quality cyber security education through partnerships with higher learning institutions and nonprofit organizations.
Since then, the program has engaged over 20,000 students, who have collectively spent more than 30,000 hours on self-paced content via a network of over 190 academic partners worldwide. In 2024, we further strengthened our commitment by introducing a special program under Secure Academy, providing content and services valued at up to $60,000.
We also emphasize the importance of upskilling existing professionals and making training more accessible for newcomers to build a resilient digital future.
7. DeepSeek has garnered differing reactions from researchers. What security measures do you suggest keeping in mind the current condition of the China-based AI model?
When it comes to securing AI technologies like DeepSeek, it's crucial to address multiple layers of risk. First, safeguarding data centers against existing threats is essential, but AI models introduce additional concerns, such as data poisoning. If this goes unchecked, it can cause AI systems to make flawed decisions, and detecting such attacks in real time is challenging.
Another significant risk is data disclosure. Users often treat AI models as trusted entities and share sensitive information, unaware that their data is being processed and potentially analyzed globally.
Unlike traditional platforms, AI models can digest and use data to pinpoint potential attack vectors. To mitigate this, it's critical to control who has access to the data and ensure AI applications are designed to carry out their intended functions without vulnerabilities, like accidental data leaks from support chatbots.
Solutions like Check Point’s GenAI Protect enable businesses to securely adopt GenAI tools like ChatGPT, ensuring data loss prevention (DLP) and real-time monitoring of sensitive data usage. This capability sets us apart from competitors by addressing the specific challenges posed by GenAI, such as data leakage, intellectual property theft, and compliance risks, which are not fully addressed by traditional security tools. These security measures are vital as we navigate this rapidly evolving landscape.
As AI-driven cyber threats escalate, Check Point is embedding AI across its security framework to deliver prevention-first protection. The Check Point Infinity AI Bundle introduces cutting-edge AI-powered capabilities, such as autonomous security operations, AI-driven threat prevention, and automated incident response. By leveraging real-time collaborative threat intelligence, Check Point ensures businesses stay ahead of evolving threats while maintaining robust security in AI environments.
8. When there are so many innovations happening across the world in devices and connectivity like IoT and others, what remains constant in terms of cyber hygiene? What steps must be taken by everyone to keep their data safe from threats?
While we cannot halt progress, we must address cyber security continuously, especially in areas like AI application, open-source tools, and cloud infrastructure. Every action, from employee profiling to tool selection, involves checks and balances to maintain security.
No system is foolproof, but by staying proactive and aware, we can manage risks and safeguard data.