This document must be read in full before accessing the certification exam. By acknowledging below you confirm you have read, understood, and agree to comply with all terms stated herein.
| Document Status | Confidential and proprietary material of Check Point Software Technologies Ltd. |
| Permitted Audience | Internal Check Point personnel and expressly authorized, certified, or designated business partner program members. |
| Permitted Use | Approved internal enablement, training, certification preparation, and explicitly authorized business activities only. |
| Restrictions | Any review, copy, disclosure, distribution, forwarding, or transfer without prior written approval from Check Point is prohibited. |
| Consequences | Unauthorized use may result in revocation of access, removal from applicable programs, and termination or suspension of business engagement, subject to applicable agreements and policies. |
| NDA Expectation | By accessing this material, the recipient is expected to comply with all applicable confidentiality, non-disclosure, partner, employment, and information security obligations. |
As of 2026, Check Point has updated its product naming and the way its offerings are positioned across the platform. The new structure is organized around the pillars Hybrid Mesh Network Security, Workspace Security, AI Security, and Exposure Management, while legacy sub-brand references such as Quantum, Harmony, CloudGuard, and Infinity are being phased out.
As a result, some course materials and/or exam questions may still include terminology from the previous naming structure. The mapping tables in this document should be used as the reference for the current 2026 naming convention.
Network, firewall, SASE, cloud network, WAF, SD-WAN, and security management
Email, endpoint, mobile, browser, and XDR solutions
AI user security, AI runtime protection, AI agent security, and AI red teaming
Threat intelligence, attack surface management, vulnerability detection & remediation
| Legacy Name | New 2026 Name | Notes |
|---|---|---|
| Quantum (9200, 29200) | Check Point Firewall – 29000 | Datacenter Firewall |
| Quantum (9200, 29200) | Check Point Firewall – 9200 | Perimeter Firewall |
| Quantum (9200, 29200) | Check Point Firewall – 3950 | Branch Firewall |
| Quantum Maestro | Check Point Maestro Hyperscale Firewall | Hyperscale firewall naming |
| Quantum Spark | Check Point Spark Firewall | SMB / branch line naming |
| Smart-1 Management | Check Point Smart-1 | Management Appliance & Software |
| Smart-1 Management | Check Point Smart-1 Cloud Security Management | Cloud-based management |
| CloudGuard Network | Check Point Cloud Firewall | Cloud network security |
| CloudGuard WAF | Check Point WAF | Web application firewall |
| Quantum SD-WAN | Check Point SD-WAN | Naming retained under Check Point |
| Harmony SASE | Check Point SASE Private Access | SASE component |
| Harmony SASE | Check Point SASE Internet Access | SASE component |
| Harmony SASE | Check Point Enterprise Secure Browser | Browser component under SASE transition |
| Harmony SaaS | Check Point SaaS Protect | SaaS security |
| AI Cloud Protect | Check Point AI Factory Firewall | AI infrastructure protection |
| Quantum Rugged | Check Point Rugged Firewall | Ruggedized firewall naming |
| Legacy Name | New 2026 Name | Notes |
|---|---|---|
| Harmony Email and Collaboration | Check Point Email Security | Email and collaboration security |
| Harmony Endpoint | Check Point Endpoint Security | Endpoint protection |
| Harmony Browse | Check Point Browser Security | Browser protection |
| Harmony Mobile | Check Point Mobile Security | Mobile protection |
| Infinity XDR/XPR | Check Point XDR | Detection and response |
| Legacy Name | New 2026 Name | Notes |
|---|---|---|
| Infinity Gen AI Protect | Check Point AI Workforce Security | AI user security / discovery and DLP |
| Lakera Guard | Check Point AI Agent Security | AI agent protection |
| Lakera Red | Check Point AI Red Teaming | AI assessment and testing |
| Legacy / Previous Reference | New 2026 Name | Notes |
|---|---|---|
| NEW | Check Point Threat Intelligence | Dark web monitoring, brand protection, attack surface management |
| ThreatCloud AI | ThreatCloud AI | Name remains unchanged |
| N/A | Check Point Vulnerability Detection & Prioritization | Exposure management component |
| N/A | Check Point Safe Remediation | Exposure management component |
| Legacy Name | New 2026 Name | Notes |
|---|---|---|
| Infinity Portal | Check Point Portal | Platform portal naming update |
| Infinity Global Services | Check Point Services | Services naming simplification |
| Infinity Playblocks | Check Point Playblocks | Automation / orchestration naming |
| Infinity Events | Check Point Events | Events naming simplification |
| ThreatCloud AI | ThreatCloud AI | No naming change |
| Infinity ELA | Check Point Platform Agreement | Commercial / agreement terminology |
| Guidance Note | When legacy terms appear in courseware, lab guides, slides, or certification exams, they should be interpreted according to the 2026 product naming structure shown in this document. During the transition period, both legacy and updated names may appear. |
| Authorized Use Reminder | This document and all related training content remain subject to Check Point confidentiality and authorized-use requirements at all times. |
Please confirm that you meet ALL of the following requirements:
By proceeding to the exam, you agree to the following terms:
All materials, presentations, lab guides, configurations, and documentation shared during this SASE certification program are proprietary and confidential. You agree not to share, reproduce, distribute, or publish any materials without prior written consent from Check Point Software Technologies Ltd.
Access to this exam and all related course content is granted solely for the purpose of internal enablement and certification preparation. Any use beyond this scope — including commercial reuse, redistribution, or training of third parties outside approved partner programs — is strictly prohibited.
You agree to complete this exam individually without assistance from other persons, unauthorized AI tools, or reference materials not explicitly permitted. Violation of exam integrity may result in immediate disqualification and revocation of certification.
You acknowledge that Check Point has updated its product naming as of 2026 and that materials in this program may reference both legacy and current names. You confirm you have reviewed the naming mapping tables provided in this pre-exam notice.
Any breach of this agreement may result in revocation of access, removal from applicable partner or employee programs, and suspension or termination of business engagement with Check Point Software Technologies Ltd. and its authorized partners, subject to applicable legal agreements and policies.
↓ Please scroll to the bottom of the agreement to continue
© 2026 Check Point Software Technologies Ltd. — All rights reserved. | Confidential & Proprietary
33 targeted questions covering Integrations, Identity, Administration, Private Access, Connectivity, and Internet Access — same Practice & Exam interface as the Certification Quiz.
All materials and questions in this workshop are proprietary and confidential. You agree not to share or distribute any content without prior written consent from Check Point Software Technologies Ltd.
Access is granted solely for internal enablement and certification preparation. Any use beyond this scope is strictly prohibited.
You agree to complete this workshop test individually without unauthorized assistance.
You acknowledge that Check Point updated its product naming as of 2026 and that materials may reference both legacy and current names.
© 2026 Check Point Software Technologies Ltd. — All rights reserved.