Check Point launches open, vendor-neutral MDR services

Issue 4 and 5 2025 Information Security, News & Events, Products & Solutions

Check Point Software Technologies has announced the launch of Check Point MDR 360° and MXDR 360°, a new suite of managed detection and response (MDR) service packages. These offerings simplify security operations, reduce response time, and enhance visibility across endpoint, identity, cloud, and network environments.

Part of the Infinity Global Services portfolio, Check Point MDR 360° and MXDR 360° reflect the company’s commitment to delivering open garden, vendor-neutral cybersecurity services tailored to the needs of modern enterprises. As organisations face rising threats, compliance pressures, and a shortage of skilled talent, the services provide 24/7 protection and expert-led incident response through a fully managed SOC. With built-in identity protection, deep integrations, and enterprise-grade data capabilities, they help secure infrastructure and close critical security gaps across complex environments.

“With security teams under pressure, Check Point MDR 360° and MXDR 360° are designed to reduce operational burden with real-time, outcome-driven detection and response that is both flexible and vendor-agnostic,” said Eitan Lugassi, VP Infinity Global Services at Check Point Software Technologies.

“Check Point is unique in terms of our seamless integration of AI, threat intelligence, and identity protection; enabling faster, high-confidence decisions and stronger response actions by our 24/7 SOC and expert IT teams providing proactive services and crisis containment expertise when it matters most. With identity-focused threat detection and an open integration model, we are helping organisations cut through complexity and scale protection across hybrid infrastructures.”

As attackers increasingly target users, identity protection has become essential. Check Point delivers complete visibility, real-time monitoring, and misconfiguration detection across Microsoft AD, Entra ID, Okta, and other SSO platforms. This enables early detection of credential abuse, lateral movement, and privilege escalation.

The new services are designed for interoperability, supporting a broad range of third-party tools across cloud, endpoint, identity, and SaaS environments. This open garden approach allows organisations to optimise existing investments without sacrificing control or visibility. New integrations with partners like Amazon, Microsoft, and Wiz, as well as other industry security organisations, further enhance response workflows. For example, this enables the transformation of Wiz exposure alerts into prioritised incidents for faster investigation.

Key capabilities include:

• Vendor-neutral integrations: Broad support across cloud, endpoint, firewall, and SaaS tools.

• Built-in identity threat detection: Native support for Microsoft AD, Entra ID, and Okta, included as a core service.

• Cost-effective SIEM & data lake (MXDR tier): Delivers enterprise-grade data management and compliance support, while optimising cost through a co-managed approach, using SIEM for high-value security analytics and data lake for cost-efficient data retention, threat hunting, and investigations.

• Proactive and reactive incident response: Includes 100+ expert-led IR hours annually, spanning crisis management, tabletop exercises, planning, and runbooks meant to help organisations prepare for, respond to, and recover from cyber incidents, with flexible hours leveraged for compromise assessments, root cause analysis, and other tailored support to strengthen cyber resilience.

• 24/7 threat detection and response: Unified detection, investigation, and response across the whole attack surface driven by alerts to proactively identify threats and escalate to IR when an active attacker is confirmed, enabling faster, higher confidence verdicts and actions across the threat lifecycle, unlike Incident Response, which focuses on crisis management during an active breach.

Check Point MDR and MXDR 360° are available via three subscription tiers. The MDR tier provides core detection and response using endpoint agents and APIs. MDR 360° adds identity-layer protection, expanded integrations, and access to Infinity XDR/XPR for AI-driven incident enrichment and threat intelligence. MXDR 360° offers a comprehensive solution, featuring managed SIEM and a data lake, to enhance compliance and co-managed SOC operations.

Check Point Infinity Global Services provides end-to-end managed security solutions used by over 5000 organisations worldwide. From proactive assessments and threat intelligence to professional services and SOC-as-a-service, the services help customers strengthen their security posture, reduce risk, and drive long-term resilience, supported by real-time AI-driven threat intelligence and a global team of experts.

Part of the Infinity Global Services portfolio, MDR 360° and MXDR 360° reflect Check Point’s commitment to delivering open garden, vendor-agnostic cybersecurity services tailored to modern enterprise needs. In today’s world of growing cyberthreats, compliance demands, and talent shortages, the new services boost security by providing 24/7 protection and expert incident response through a fully managed SOC. They include enriched integrations, identity threat detection, and data lakes, protecting the data plane and infrastructure, while adding a crucial new layer focused on identity threat detection.

“With security teams stretched thin, MDR 360° and MXDR 360° are designed to ease the load by delivering real-time, outcome-driven detection and response services that are both flexible and open,” said Lugassi. “With native identity threat and attack detection and over 160 integrations, we are helping organisations streamline complexity and scale their cybersecurity strategy faster.”

As attackers increasingly target people over systems, identity protection has become essential. Check Point provides full visibility, real-time monitoring, and misconfiguration detection across platforms such as Microsoft AD, Entra ID, Okta, and other SSO tools. This enables early detection of credential-based attacks, lateral movement, and privilege abuse, helping organisations stay one step ahead.

Built for cross-platform functionality, the solution integrates with over 160 third-party tools across cloud, endpoint, identity, and SaaS environments. This open approach enables organisations to maximise existing investments without sacrificing control or visibility.

“Organisations are not just looking for alerts - they want actionable intelligence and strategic partnership,” said Lugassi. “Our mix of AI-driven detection and human expertise helps organisations respond faster and build long-term resilience.”

Find out more at www.checkpoint.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.