Trust Point – Your Trust Center for Cybersecurity Transparency
Welcome to Check Point’s Trust Point. This page provides information about our security, privacy, and compliance approach, including key policies, data protection materials, and transparency resources.
Trust Point
Learn more about our commitment to security, privacy, and compliance. Let’s explore the ways we safeguard your data and comply with international standards, ensuring transparency and trust in all of our interactions.
Privacy & Data Protection
Protecting personal data is an important part of how Check Point operates.
This section provides access to privacy-related information and resources that reflect our approach to data protection, accountability, and compliance with applicable privacy requirements.
Below are useful links to privacy related documentation:
Data Subject Requests
Complete our data subject request form if you wish to exercise your rights under applicable privacy laws.
Product Privacy Data Sheets
Transparency is a core part of our privacy approach.
The Privacy Data Sheets below explain, on a per-product basis, what personal data is processed and how it is used to deliver our services.
Compliance & Certifications
Check Point products meet the requirements of internationally recognized security standards, certification requirements and independent industry testing.
- Check Point Hardware Certification
Learn More About Hardware Certifications - GAiA and Secure Platform Hardware
Compatibility List
Learn More About Hardware Compatibility
Security, Privacy, and Compliance Policy Overview
Security, privacy, and compliance are fundamental to how Check Point operates.
Our approach is guided by a comprehensive set of policies and practices that help protect data, secure our systems and services, manage risk, support business continuity, and promote responsible use of technology.
Through the resources linked in this section, customers and partners can learn more about selected policy-related information that reflects how we manage security risks, handle personal data, and maintain operational resilience across our environment.
Secure Use of AI
At Check Point, we are committed to the ethical, transparent, and secure use of AI in our products and services. Our Responsible AI document outlines the principles and steps we take to ensure responsible development and deployment.
- Responsible AI
Learn More - AI Frequently Asked Questions
Learn More
Additional Resources
- Environmental, Social, and Governance (ESG)
Our environmental, social, and governance strategy reinforces our mission to build a secure and sustainable future for all.
Learn More - ThreatWiki
The ThreatWiki is an easy-to-use tool that allows you to search and filter malware in Check Point’s database.
Learn More
- Cyber Hub
Check Point’s Cyber Hub features the latest insights, updates, and trends in cybersecurity.
Learn More
Contact Privacy
If you have any questions or concerns about Check Point’s handling of your personal data, or about any aspect of this Trust Point, please contact us by email at privacy_inquiries@checkpoint.com or by using the following contact information:

Check Point Software Technologies Ltd.
Tel Aviv
5 Shlomo Kaplan Street
Tel Aviv 6789159, Israel
Attention: Legal Counsel and Chief Information Security Officer

Check Point Software Technologies GmbH
Oskar-Messter-Str. 13,
85737,
Ismaning, Germany
Attention: Legal Counsel and Chief Information Security Officer

Check Point Software Technologies Inc.
100 Oracle Parkway, Suite 800
Redwood City
CA 94065
Attention: Legal Counsel and Chief Information Security Officer
