-
No Data

資料處理中, 請稍候...
Loading...
Security teams today need to move faster, prove compliance, and investigate issues across increasingly complex environments – all while working with limited resources.
To help address these challenges, we are thrilled to introduce a suite of model context protocol (MCP) servers for Check Point APIs – a new way to securely connect AI models to your security infrastructure using natural language.
These servers transform Check Point’s robust APIs into specialized interfaces that can be seamlessly integrated with any AI ecosystem, enabling administrators to query their Check Point infrastructure using natural language.
MCP servers provide access to Check Point’s APIs using familiar large language model tools. This allows these tools to perform real-time, natural-language queries without writing custom scripts or handling raw API responses.
MCP servers can be used as tools on platforms like Claude Desktop or can be integrated into your internal copilots and automation frameworks.
For example, a user could ask in Claude Desktop:
“Is my security policy compliant with PCI-DSS?”
and get a structured report, based on real policy data, detailing which controls are met and where action is needed:
Watch the demo video below to see some of these capabilities in action.
Check Point’s MCP servers are now available as an open-source release, publicly accessible on GitHub. This open release promotes transparency and invites feedback from the security and AI communities as we continue shaping the future of this capability.
To explore this new capability:
We’re eager to hear your feedback and real-world use cases.
This release marks the beginning of a new chapter in how security teams interact with their infrastructure.
By bridging powerful AI models and trusted security data – we’re enabling a more intuitive, efficient approach to operations and compliance.
As we continue to expand our MCP server offerings, we’ll be adding support for additional Check Point products and capabilities, further enhancing the value of your security investments.
Stay tuned for more updates, and we look forward to your feedback as you begin integrating these new capabilities into your security operations.