Step 1 of 2 — Authorization
⚠ Confidential
📋 Required Reading — Please Read Before Proceeding

Confidentiality, Ownership &
2026 Naming Update Notice

This document must be read in full before accessing the certification exam. By acknowledging below you confirm you have read, understood, and agree to comply with all terms stated herein.

Please review all sections below, then scroll to the bottom to acknowledge and enter the exam.
1
Confidentiality, NDA & Authorized Use Notice
Document StatusConfidential and proprietary material of Check Point Software Technologies Ltd.
Permitted AudienceInternal Check Point personnel and expressly authorized, certified, or designated business partner program members.
Permitted UseApproved internal enablement, training, certification preparation, and explicitly authorized business activities only.
RestrictionsAny review, copy, disclosure, distribution, forwarding, or transfer without prior written approval from Check Point is prohibited.
ConsequencesUnauthorized use may result in revocation of access, removal from applicable programs, and termination or suspension of business engagement, subject to applicable agreements and policies.
NDA ExpectationBy accessing this material, the recipient is expected to comply with all applicable confidentiality, non-disclosure, partner, employment, and information security obligations.
2
Product Naming Update Disclaimer

As of 2026, Check Point has updated its product naming and the way its offerings are positioned across the platform. The new structure is organized around the pillars Hybrid Mesh Network Security, Workspace Security, AI Security, and Exposure Management, while legacy sub-brand references such as Quantum, Harmony, CloudGuard, and Infinity are being phased out.

As a result, some course materials and/or exam questions may still include terminology from the previous naming structure. The mapping tables in this document should be used as the reference for the current 2026 naming convention.

3
Solution Pillars Overview
🌐

Hybrid Mesh Network Security

Network, firewall, SASE, cloud network, WAF, SD-WAN, and security management

🖥️

Workspace Security

Email, endpoint, mobile, browser, and XDR solutions

🤖

AI Security

AI user security, AI runtime protection, AI agent security, and AI red teaming

📊

Exposure Management

Threat intelligence, attack surface management, vulnerability detection & remediation

4
Naming Mapping — Hybrid Mesh Network Security
Legacy NameNew 2026 NameNotes
Quantum (9200, 29200)Check Point Firewall – 29000Datacenter Firewall
Quantum (9200, 29200)Check Point Firewall – 9200Perimeter Firewall
Quantum (9200, 29200)Check Point Firewall – 3950Branch Firewall
Quantum MaestroCheck Point Maestro Hyperscale FirewallHyperscale firewall naming
Quantum SparkCheck Point Spark FirewallSMB / branch line naming
Smart-1 ManagementCheck Point Smart-1Management Appliance & Software
Smart-1 ManagementCheck Point Smart-1 Cloud Security ManagementCloud-based management
CloudGuard NetworkCheck Point Cloud FirewallCloud network security
CloudGuard WAFCheck Point WAFWeb application firewall
Quantum SD-WANCheck Point SD-WANNaming retained under Check Point
Harmony SASECheck Point SASE Private AccessSASE component
Harmony SASECheck Point SASE Internet AccessSASE component
Harmony SASECheck Point Enterprise Secure BrowserBrowser component under SASE transition
Harmony SaaSCheck Point SaaS ProtectSaaS security
AI Cloud ProtectCheck Point AI Factory FirewallAI infrastructure protection
Quantum RuggedCheck Point Rugged FirewallRuggedized firewall naming
5
Naming Mapping — Workspace Security
Legacy NameNew 2026 NameNotes
Harmony Email and CollaborationCheck Point Email SecurityEmail and collaboration security
Harmony EndpointCheck Point Endpoint SecurityEndpoint protection
Harmony BrowseCheck Point Browser SecurityBrowser protection
Harmony MobileCheck Point Mobile SecurityMobile protection
Infinity XDR/XPRCheck Point XDRDetection and response
6
Naming Mapping — AI Security
Legacy NameNew 2026 NameNotes
Infinity Gen AI ProtectCheck Point AI Workforce SecurityAI user security / discovery and DLP
Lakera GuardCheck Point AI Agent SecurityAI agent protection
Lakera RedCheck Point AI Red TeamingAI assessment and testing
7
Naming Mapping — Exposure Management
Legacy / Previous ReferenceNew 2026 NameNotes
NEWCheck Point Threat IntelligenceDark web monitoring, brand protection, attack surface management
ThreatCloud AIThreatCloud AIName remains unchanged
N/ACheck Point Vulnerability Detection & PrioritizationExposure management component
N/ACheck Point Safe RemediationExposure management component
8
Additional Infinity Naming Removals
Legacy NameNew 2026 NameNotes
Infinity PortalCheck Point PortalPlatform portal naming update
Infinity Global ServicesCheck Point ServicesServices naming simplification
Infinity PlayblocksCheck Point PlayblocksAutomation / orchestration naming
Infinity EventsCheck Point EventsEvents naming simplification
ThreatCloud AIThreatCloud AINo naming change
Infinity ELACheck Point Platform AgreementCommercial / agreement terminology
9
Recommended Usage Note for Course & Exam Materials
Guidance Note When legacy terms appear in courseware, lab guides, slides, or certification exams, they should be interpreted according to the 2026 product naming structure shown in this document. During the transition period, both legacy and updated names may appear.
Authorized Use Reminder This document and all related training content remain subject to Check Point confidentiality and authorized-use requirements at all times.
Technical Requirements

Please confirm that you meet ALL of the following requirements:

!
Non-Disclosure & Participation Agreement

Non-Disclosure & Participation Agreement

By proceeding to the exam, you agree to the following terms:

1. Confidentiality of Workshop Materials

All materials, presentations, lab guides, configurations, and documentation shared during this SASE certification program are proprietary and confidential. You agree not to share, reproduce, distribute, or publish any materials without prior written consent from Check Point Software Technologies Ltd.

2. Authorized Use Only

Access to this exam and all related course content is granted solely for the purpose of internal enablement and certification preparation. Any use beyond this scope — including commercial reuse, redistribution, or training of third parties outside approved partner programs — is strictly prohibited.

3. Exam Integrity

You agree to complete this exam individually without assistance from other persons, unauthorized AI tools, or reference materials not explicitly permitted. Violation of exam integrity may result in immediate disqualification and revocation of certification.

4. 2026 Naming Convention Acknowledgment

You acknowledge that Check Point has updated its product naming as of 2026 and that materials in this program may reference both legacy and current names. You confirm you have reviewed the naming mapping tables provided in this pre-exam notice.

5. Consequences of Breach

Any breach of this agreement may result in revocation of access, removal from applicable partner or employee programs, and suspension or termination of business engagement with Check Point Software Technologies Ltd. and its authorized partners, subject to applicable legal agreements and policies.

↓ Please scroll to the bottom of the agreement to continue

© 2026 Check Point Software Technologies Ltd. — All rights reserved.  |  Confidential & Proprietary

Workshop · 33 Questions

Hybrid Mesh-SASE
Workshop Test

33 targeted questions covering Integrations, Identity, Administration, Private Access, Connectivity, and Internet Access — same Practice & Exam interface as the Certification Quiz.

33
Questions
6
Topics
~20
Minutes
Topics Covered
Architecture Identity & SSO Administration Private Access / ZTNA Internet Access Connectivity & IPsec Integrations
Participation Agreement

1. Confidentiality of Workshop Materials

All materials and questions in this workshop are proprietary and confidential. You agree not to share or distribute any content without prior written consent from Check Point Software Technologies Ltd.

2. Authorized Use Only

Access is granted solely for internal enablement and certification preparation. Any use beyond this scope is strictly prohibited.

3. Test Integrity

You agree to complete this workshop test individually without unauthorized assistance.

4. 2026 Naming Convention

You acknowledge that Check Point updated its product naming as of 2026 and that materials may reference both legacy and current names.

© 2026 Check Point Software Technologies Ltd. — All rights reserved.