Trust Point – Your Trust Center for Cybersecurity Transparency

Welcome to Check Point’s Trust Point. This page provides information about our security, privacy, and compliance approach, including key policies, data protection materials, and transparency resources.

Trust Point

Learn more about our commitment to security, privacy, and compliance. Let’s explore the ways we safeguard your data and comply with international standards, ensuring transparency and trust in all of our interactions.

Privacy & Data Protection

Protecting personal data is an important part of how Check Point operates.
This section provides access to privacy-related information and resources that reflect our approach to data protection, accountability, and compliance with applicable privacy requirements.

Below are useful links to privacy related documentation:


Data Subject Requests

Complete our data subject request form if you wish to exercise your rights under applicable privacy laws.

Compliance & Certifications

Check Point products meet the requirements of internationally recognized security standards, certification requirements and independent industry testing.

Learn More About Certifications

Security, Privacy, and Compliance Policy Overview

Security, privacy, and compliance are fundamental to how Check Point operates.
Our approach is guided by a comprehensive set of policies and practices that help protect data, secure our systems and services, manage risk, support business continuity, and promote responsible use of technology.
Through the resources linked in this section, customers and partners can learn more about selected policy-related information that reflects how we manage security risks, handle personal data, and maintain operational resilience across our environment.

Learn More

Secure Use of AI

At Check Point, we are committed to the ethical, transparent, and secure use of AI in our products and services. Our Responsible AI document outlines the principles and steps we take to ensure responsible development and deployment.

Additional Resources

  • Environmental, Social, and Governance (ESG)
    Our environmental, social, and governance strategy reinforces our mission to build a secure and sustainable future for all.
    Learn More
  • ThreatWiki
    The ThreatWiki is an easy-to-use tool that allows you to search and filter malware in Check Point’s database.
    Learn More
  • Cyber Hub
    Check Point’s Cyber Hub features the latest insights, updates, and trends in cybersecurity.
    Learn More

Contact Privacy

If you have any questions or concerns about Check Point’s handling of your personal data, or about any aspect of this Trust Point, please contact us by email at privacy_inquiries@checkpoint.com or by using the following contact information:

Check Point Software Technologies Ltd.
Tel Aviv
5 Shlomo Kaplan Street
Tel Aviv 6789159, Israel
Attention: Legal Counsel and Chief Information Security Officer

map3 eu hq

Check Point Software Technologies GmbH
Oskar-Messter-Str. 13,
85737,
Ismaning, Germany
Attention: Legal Counsel and Chief Information Security Officer

map3 eu hq

Check Point Software Technologies Inc.
100 Oracle Parkway, Suite 800
Redwood City
CA 94065
Attention: Legal Counsel and Chief Information Security Officer