
Check Point to Acquire Veriti, Redefining Threat Exposure Management in Complex Multi-Vendor Environments

We’re excited to share that Check Point is acquiring Veriti, the first to introduce preemptive exposure management which automatically remediates threat exposures and prevents threat across complex multi-vendor estates.
In the era of hyperconnectivity and AI, reactive security is too slow
AI has brought cyber security to a tipping point, enabling the launch of attacks at scale. At the same time, enterprises are hyperconnected, with assets spread across clouds, datacenters, and endpoints — vastly expanding their attack surface. Traditional reactive security, based on detection and response, is too slow. Veriti continuously identifies, prioritizes, and remediates risk across your multi-vendor environment through automated patching and collaborative threat intelligence — all without disrupting business.
Veriti – A Pioneer in Preemptive Exposure Management
Founded in 2021, Veriti pioneered the Preemptive Exposure Management (PEM) category, enabling proactive risk discovery and mitigation across fragmented security tools. By continuously analyzing logs, threat indicators, and vulnerabilities throughout the environment, Veriti delivers real-time protection propagation across 70 security vendors.
Automated Exposure Remediation – How it Works
Built with a fully API-based architecture, Veriti seamlessly integrates into organizations’ existing security infrastructure without agents or disruption, supporting the broadest security ecosystem in the market.
Veriti remediates risk in two key ways:
- Automated, cross-vendor virtual patching: Veriti instantly applies risk-free, non-disruptive protections across dozens of third-party tools — based on vulnerabilities identified by platforms like CrowdStrike, Tenable, and Rapid7 — dramatically reducing patching time from weeks to minutes
- Real-time threat intelligence enforcement: Veriti verifies threat indicators from any connected tool and automatically orchestrates protection across firewalls, endpoints, WAFs, and cloud platforms, enabling fast, coordinated, multi-vendor threat prevention
Veriti analyzes each customer’s environment, including network topology, digital, assets, exposures, configurations, licenses and existing protections, and applies the right controls safely, and without operational impact.
Leveraging Insights from Your Current Security Infrastructure
In the same way that navigation apps harness the countless insights of multiple different vehicles driving on the road in real time, Veriti ingests the countless threat signals already available in the security products you’ve deployed. But instead of operating in a siloed- product-specific manner, it leverages those insights across dozens of vendors to vastly reduce your attack surface.
For example, Veriti leverages our partner Wiz‘s cloud threat insights — such as exposed, unpatched cloud servers or applications — and enables automatic, safe virtual patching of those assets through Check Point gateways (e.g. CloudGuard Network) and other vendors’ gateways.
Real World Use Cases – Automated Threat Exposure Management
Here are a few examples demonstrating how automated threat exposure management works:
Example 1 – Virtual Patching: Wiz has identified a CVE in your Microsoft cloud environment, and applied the relevant IPS signature. Veriti will identify all other affected cloud hosts in order verify how to apply protections for that same vulnerability, and may simultaneously use any number of security products to that end, including Check Point CloudGuard Network, Palo Alto, Fortinet etc.
Example 2 – Virtual Patching on an Unsupporting Security Product: If an IPS signature has not yet been added to a specific product, e.g. a 3rd party firewall or WAF, Veriti can still instantly generate an IPS signature for that 3rd party product, so that it can start protecting against that known vulnerability immediately. (Just think of the 100s and 1000s of digital assets that can be instantly protected, even while remaining unpatched.)
Example 3 – Threat Intel Propagation with IoCs: Your EDR has recently logged a blocked ransomware attack. The IP address or domain of that attack and any other relevant threat intel (IoCs) such as the ransomware executable’s SHA-256 hash will be instantly shared with the relevant security controls to provide effective coverage against that attack, e.g firewall, cloud firewall, other vendor’s EDRs in your organization.
Example 4 –Threat Intel Propagation with no IoCs: Your organization logs are showing that you’re experiencing an intrusion with lateral movement happening now, from one PC (host) to another. Veriti will turn on the relevant protection on your EDR, after ensuring it’s non-disruptive.
How Veriti Stands Out from the Rest
Veriti stands apart with its unmatched ability to not only detect but safely remediate vulnerabilities without disrupting business operations or generating false positives. Its API-based approach eliminates the need for agent installation. And as one of the few platforms supporting the full security stack, Veriti offers both on-premises and SaaS deployment options, to meet varied enterprise needs.
Full Lifecycle Threat Exposure and Risk Management
Following the closure of the transaction, Veriti’s capabilities will be integrated into the Check Point Infinity Platform as part of our Threat Exposure and Risk Management offering. Combined with the recently added External Risk Management solution (formerly Cyberint), Veriti enhances Check Point’s ability to deliver complete risk lifecycle coverage — proactively managing both internal and external exposures across the entire attack surface.