Check Point customers to gain access to Azure OpenAI service under new Microsoft partnership
Check Point’s Infinity AI Copilot will leverage Microsoft’s Azure OpenAI Service and suite of large language models


Cyber security provider Check Point has announced a new partnership with Microsoft to enhance its Infinity AI Copilot offering with the Azure OpenAI service.
Check Point’s Infinity AI Copilot service leverages automation to deliver security administration improvements, as well as faster incident mitigation and response.
By automating both common and complex security tasks using AI, the solution helps to lighten workloads for security teams while tackling the most sophisticated cyber attacks.
Thanks to the new collaboration, Infinity AI Copilot will now benefit from the Redmond giant’s advanced large language models (LLMs) which will allow the solution to more effectively address a wide range of security challenges.
"Our collaboration with Microsoft Azure OpenAI Service represents a significant leap forward in our mission to offer the most advanced AI-driven security solutions," said Eyal Manor, Check Point’s vice president of product management.
"By combining Microsoft’s AI expertise and tools with our deep understanding of cyber security across networks, clouds and devices, we are setting new benchmarks for what organizations can achieve in their battle against expanding cyber threats with limited IT resources."
Check Point eyes advanced AI capabilities
With the addition of Azure OpenAI service, Check Point said Infinity AI Copilot customers will be able to leverage advanced AI capabilities to drive down the time required to complete security tasks – such as event analysis, troubleshooting, and policy changes - by up to 90%.
ChannelPro Newsletter
Stay up to date with the latest Channel industry news and analysis with our twice-weekly newsletter
The solution also promises improved incident response that covers large scale threat hunting, operational analysis, remediation, and incident solution, while offering unified, cloud-delivered security across the entire Check Point Infinity Platform.
Additionally, Check Point will work to protect the LLMs from critical vulnerabilities such as prompt injection, bypassing of security controls, harmful speech, and hallucinations.
The firm said it has even developed its own prompt engineering that utilizes retrieval augmented generation (RAG) best practice, which Infinity AI Copilot will leverage to ramp up its reliability and accuracy with facts checked from Check Point sources – including its CheckMates community forum, as well as its own product documentation and internal databases.
RELATED WEBINAR
Commenting on the partnership, Anat Gil, partners lead for Microsoft South-East Europe, said the move underlines the companies’ shared commitment to enhance cyber security using AI technology.
“By integrating Microsoft Azure OpenAI Service with Check Point Infinity AI Copilot, we are not only advancing the capabilities of AI in protecting digital environments but also empowering organizations to navigate the digital landscape securely and confidently, greatly enhancing the effectiveness of their current security personnel," Gil said.
Dan is a freelance writer and regular contributor to ChannelPro, covering the latest news stories across the IT, technology, and channel landscapes. Topics regularly cover cloud technologies, cyber security, software and operating system guides, and the latest mergers and acquisitions.
A journalism graduate from Leeds Beckett University, he combines a passion for the written word with a keen interest in the latest technology and its influence in an increasingly connected world.
He started writing for ChannelPro back in 2016, focusing on a mixture of news and technology guides, before becoming a regular contributor to ITPro. Elsewhere, he has previously written news and features across a range of other topics, including sport, music, and general news.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
So long, Defender VPN: Microsoft is scrapping the free-to-use privacy tool over low uptake
News Defender VPN, Microsoft's free virtual private network, is set for the scrapheap, so you might want to think about alternative services.
By Nicole Kobie Published
-
Hackers are on a huge Microsoft 365 password spraying spree – here’s what you need to know
News A botnet made up of 130,000 compromised devices has been conducting a huge password spraying campaign targeting Microsoft 365 accounts.
By Solomon Klappholz Published
-
Everything you need to know about the Microsoft Power Pages vulnerability
News A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.
By Solomon Klappholz Published
-
Microsoft is increasing payouts for its Copilot bug bounty program
News Microsoft has expanded the bug bounty program for its Copilot lineup, boosting payouts and adding coverage of WhatsApp and Telegram tools.
By Nicole Kobie Published
-
Hackers are using this new phishing technique to bypass MFA
News Microsoft has warned that a threat group known as Storm-2372 has altered its tactics using a specific ‘device code phishing’ technique to bypass MFA and steal access tokens.
By Solomon Klappholz Published
-
A new phishing campaign is exploiting Microsoft’s legacy ADFS identity solution to steal credentials and bypass MFA
News Researchers at Abnormal Security have warned of a new phishing campaign targeting Microsoft's Active Directory Federation Services (ADFS) secure access system.
By Solomon Klappholz Published
-
Hackers are using Microsoft Teams to conduct “email bombing” attacks
News Experts told ITPro that tactics like this are on the rise, and employees must be trained effectively
By George Fitzmaurice Published
-
Microsoft files suit against threat actors abusing AI services
News Cyber criminals are accused of using stolen credentials for an illegal hacking as a service operation
By Solomon Klappholz Published