Check Point launches open, vendor-neutral MDR services

Issue 4 and 5 2025 Information Security, News & Events, Products & Solutions

Check Point Software Technologies has announced the launch of Check Point MDR 360° and MXDR 360°, a new suite of managed detection and response (MDR) service packages. These offerings simplify security operations, reduce response time, and enhance visibility across endpoint, identity, cloud, and network environments.

Part of the Infinity Global Services portfolio, Check Point MDR 360° and MXDR 360° reflect the company’s commitment to delivering open garden, vendor-neutral cybersecurity services tailored to the needs of modern enterprises. As organisations face rising threats, compliance pressures, and a shortage of skilled talent, the services provide 24/7 protection and expert-led incident response through a fully managed SOC. With built-in identity protection, deep integrations, and enterprise-grade data capabilities, they help secure infrastructure and close critical security gaps across complex environments.

“With security teams under pressure, Check Point MDR 360° and MXDR 360° are designed to reduce operational burden with real-time, outcome-driven detection and response that is both flexible and vendor-agnostic,” said Eitan Lugassi, VP Infinity Global Services at Check Point Software Technologies.

“Check Point is unique in terms of our seamless integration of AI, threat intelligence, and identity protection; enabling faster, high-confidence decisions and stronger response actions by our 24/7 SOC and expert IT teams providing proactive services and crisis containment expertise when it matters most. With identity-focused threat detection and an open integration model, we are helping organisations cut through complexity and scale protection across hybrid infrastructures.”

As attackers increasingly target users, identity protection has become essential. Check Point delivers complete visibility, real-time monitoring, and misconfiguration detection across Microsoft AD, Entra ID, Okta, and other SSO platforms. This enables early detection of credential abuse, lateral movement, and privilege escalation.

The new services are designed for interoperability, supporting a broad range of third-party tools across cloud, endpoint, identity, and SaaS environments. This open garden approach allows organisations to optimise existing investments without sacrificing control or visibility. New integrations with partners like Amazon, Microsoft, and Wiz, as well as other industry security organisations, further enhance response workflows. For example, this enables the transformation of Wiz exposure alerts into prioritised incidents for faster investigation.

Key capabilities include:

• Vendor-neutral integrations: Broad support across cloud, endpoint, firewall, and SaaS tools.

• Built-in identity threat detection: Native support for Microsoft AD, Entra ID, and Okta, included as a core service.

• Cost-effective SIEM & data lake (MXDR tier): Delivers enterprise-grade data management and compliance support, while optimising cost through a co-managed approach, using SIEM for high-value security analytics and data lake for cost-efficient data retention, threat hunting, and investigations.

• Proactive and reactive incident response: Includes 100+ expert-led IR hours annually, spanning crisis management, tabletop exercises, planning, and runbooks meant to help organisations prepare for, respond to, and recover from cyber incidents, with flexible hours leveraged for compromise assessments, root cause analysis, and other tailored support to strengthen cyber resilience.

• 24/7 threat detection and response: Unified detection, investigation, and response across the whole attack surface driven by alerts to proactively identify threats and escalate to IR when an active attacker is confirmed, enabling faster, higher confidence verdicts and actions across the threat lifecycle, unlike Incident Response, which focuses on crisis management during an active breach.

Check Point MDR and MXDR 360° are available via three subscription tiers. The MDR tier provides core detection and response using endpoint agents and APIs. MDR 360° adds identity-layer protection, expanded integrations, and access to Infinity XDR/XPR for AI-driven incident enrichment and threat intelligence. MXDR 360° offers a comprehensive solution, featuring managed SIEM and a data lake, to enhance compliance and co-managed SOC operations.

Check Point Infinity Global Services provides end-to-end managed security solutions used by over 5000 organisations worldwide. From proactive assessments and threat intelligence to professional services and SOC-as-a-service, the services help customers strengthen their security posture, reduce risk, and drive long-term resilience, supported by real-time AI-driven threat intelligence and a global team of experts.

Part of the Infinity Global Services portfolio, MDR 360° and MXDR 360° reflect Check Point’s commitment to delivering open garden, vendor-agnostic cybersecurity services tailored to modern enterprise needs. In today’s world of growing cyberthreats, compliance demands, and talent shortages, the new services boost security by providing 24/7 protection and expert incident response through a fully managed SOC. They include enriched integrations, identity threat detection, and data lakes, protecting the data plane and infrastructure, while adding a crucial new layer focused on identity threat detection.

“With security teams stretched thin, MDR 360° and MXDR 360° are designed to ease the load by delivering real-time, outcome-driven detection and response services that are both flexible and open,” said Lugassi. “With native identity threat and attack detection and over 160 integrations, we are helping organisations streamline complexity and scale their cybersecurity strategy faster.”

As attackers increasingly target people over systems, identity protection has become essential. Check Point provides full visibility, real-time monitoring, and misconfiguration detection across platforms such as Microsoft AD, Entra ID, Okta, and other SSO tools. This enables early detection of credential-based attacks, lateral movement, and privilege abuse, helping organisations stay one step ahead.

Built for cross-platform functionality, the solution integrates with over 160 third-party tools across cloud, endpoint, identity, and SaaS environments. This open approach enables organisations to maximise existing investments without sacrificing control or visibility.

“Organisations are not just looking for alerts - they want actionable intelligence and strategic partnership,” said Lugassi. “Our mix of AI-driven detection and human expertise helps organisations respond faster and build long-term resilience.”

Find out more at www.checkpoint.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.