About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd.

(www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

Orca Tech as a Distributor for Check Point

As a Security & Analytics focused Value Add Distributor, Orca Tech is well credentialed to support our existing and future partners to develop & drive their Cyber Security business with Check Point. Orca’s sales, technical presales & marketing team have many years of Check Point experience with up-to-date certifications that can be leveraged by our partners to assist them across the entire Check portfolio.

Whether you are a long-term experienced partner or new and looking to leverage Check Point’s ever expanding security portfolio to provide a comprehensive solution for your valued customers, the Orca Check Point team are here to assist you.



  • Quantum-Horizontal
    Secure the Network

    Protect your enterprise network from the most sophisticated cyber-attacks with the highest caliber of security, real-time prevention and the world’s highest performance security gateways.

  • CloudGuard-Horizontal
    Secure the Cloud

    Secure the Cloud with a unified cloud native security platform, automating security posture at scale, preventing advanced threats and giving you visibility and control over any workload across any cloud.

  • Harmony-Horizontal-Dark-Background
    Secure users & Access

    Protect remote users’ devices and access. Wherever you connect from, whatever you connect to and however you connect – your devices, your privacy and your organisational data must be secure and protected from any cyber threat.

  • InfinityVision-Horizontal
    Unified Solution

    Achieve gold standard unified security management. Ensure 100% breach prevention and manage your entire security estate with a unified policy, from a single point across networks, clouds, Mobile, Endpoint and workloads. Expose, investigate and shut down attacks faster, with 99.9% precision with SOC and XDR capabilities used by Check Point Research and are now available for you.

Cyber Proof Your Enterprise with a Security CheckUp. Let’s get started

Check Point Infinity

A Consolidated Cyber Security Architecture

The first consolidated security architecture across networks, cloud, mobile and IoT, providing the highest level of threat prevention against both known and unknown cyber-threats.
  • 005-support-e1621572644232


    Protection across the entire IT infrastructure: networks, cloud, endpoints, and mobile

  • 003-computer-1-e1621572859535

    Threat Prevention

    64 different threat prevention engines blocking against known and unknown threats, powered by threat intelligence.

  • cog


    Unified security management; Full automation and seamless integration


Reduce TCO and Increase Protection with a Consolidated Security Architecture

Organizations frequently implement multiple cyber security solutions in pursuit of better protections. As a result, they are frequently left with a patchwork security architecture that results in a high TCO.

By adopting a consolidated security approach with Check Point Infinity architecture, businesses realize preemptive protection against advanced fifth-generation attacks, while achieving a


Increase in Operational Efficiency


Reduction in security costs

Tools and Support to help you do business

  • Check Point Engage – Partner Sales Enablement App

    Check Point differentiates its Partners through activities that enable growth through an innovative app called Check Point Engage. This app motivates your sales teams to execute on proven activities which fuel top and bottom line growth and new customer acquisition with best in class reporting metrics.

    The new app will recognize your reps and your organization through activities performed. Activities can be customer meetings, security check-ups, cloud/mobile demonstrations, sales activities, account planning and training. Each activity will grant points to be collected and based on accumulated points and thresholds, personal and partner status will be determined.

    Download the App

  • Check Point Software’s 2022 Security Report:
    Global Cyber Pandemic’s Magnitude Revealed

    The 2022 Cyber Security Report gives a detailed overview of the cyber threat landscape and recommendations on how to prevent the next cyber pandemic. These findings are based on data drawn from Check Point Software’s ThreatCloud Intelligence between January and December 2021, highlighting the key tactics cyber-criminals are using to attack businesses.

    Apply for your report today

  • The Cyber Pandemic is here. A Security Checkup ensures you have maximum protection. Register for an immediate analysis.

    99% of all organizations are not protected against cyber attacks.

    Cyber security problems seldom jump out at you the way normal IT issues do. This is because cyber attackers purpose-build cyber threats to avoid detection.

    The best way to troubleshoot cyber security is with a no-cost Security CheckUp from Check Point. Our experts will analyze your network and collect comprehensive data on active threats to your complete environment including networks, endpoints and mobile devices. At the end of the analysis period, you will receive a comprehensive report.

         Book your Security CheckUp today

Looking for more information? Log into the partner portal


Check Point products provide end-to-end security from the enterprise, to the cloud, to your mobile workers’ personal devices

  • 001-add-to-favorites-1


    For retailers, security breaches can erode customer confidence, impact the bottom line and incur regulatory penalties. Check Point protects retailers from cyberattacks such as malware, remote threats and data theft, while maintaining reliable connectivity for secure financial transactions from the PoS to the data center..

  • 002-payment-1

    Financial Services

    Financial services firms have adopted cloud and endpoint technology to allow seamless interactions through networks and amongst customers and employees devices. Without proper security measurements in place, financial services risk being impacted by cyber attacks. In fact, financial services industry is recognized as the most-breached sector, with threats existing outside the organization and internally through employee devices. Incorporate a threat prevention strategy to secure sensitive data and transactions with Check Point’s consolidated security architecture..

  • 004-bank-1


    Check Point offers next-generation advanced capabilities that exceed the Cyber IT Agenda of Government through 25 years of prevention experience. Our comprehensive security platform provides critical building blocks to achieve the highest levels of federal cyber security hygiene and TCO. With evolving cyber threats facing the public sector, agencies can depend on Check Point to meet their federal security needs.

  • 008-online-1

    Healthcare Security

    An integrated healthcare security solution keeping patients safe, medical information protected, and healthcare services online with threat prevention.

  • 012-computer-1-1

    Industrial Control Systems (ICS) Security

    Protecting ICS (Industrial Control Systems) poses unique challenges. Service uptime, data integrity, compliance and public safety require organizations take steps to safeguard these critical assets.

  • 011-customer-service-1

    Service Provider

    Managed Services are a significant revenue stream for Service Providers, and Security comes at the top of the list. Check Point, the leader in Cybersecurity, delivers a full set of Security Services which cover all customer sizes and all use cases, and are designed specifically for Service Providers.

  • 009-certificate-1


    Protecting learners, shielding schools, and empowering communities Digital technology is changing the education industry. The internet is bringing a wealth of information and knowledge to classrooms and streamlining district office operations. However, the same technology is also opening the doors to cyberattacks directed at schools. SandBlast for Education prevents the cyber abuses affecting students..

Customers stories