Ray Jimenez, Vice President Sales – LATAM & US South, Check Point Software Technologies
In an interview with Invest:, Ray Jimenez, vice president of sales for Latin America and the U.S. South at Check Point Software Technologies, discussed how the company stands out by prioritizing prevention over detection and offering a comprehensive security platform. Jimenez also talked about the role AI is playing in both enhancing defenses and creating new challenges.
What have been the most significant milestones and achievements for Check Point over the past 12 months?
We are proud to say that Check Point Software has been named as one of the World’s Best Employers by Forbes for the fifth year in a row. With over 6,500 employees around the world, Check Point is once again recognized as a leading cyber security employer by Forbes and was recently recognized as one of the World’s Best Companies by TIME, highlighting our strong workplace culture and commitment to ESG
These accolades are important to us as we operate in the cyber security industry, a constantly evolving and dynamic field. For every three steps we take, the bad guys take two or two and a half steps right behind us. This demands continuous innovation and investment in people.
For example, in 3Q24, Check Point Research spotted a 75% Surge in Cyber Attacks Worldwide, with organizations facing an average of 1,876 cyber-attacks per week. The top three attacked industries were education and research, government and military, and healthcare. These sectors hold valuable and often sensitive data, making them prime targets. They also tend to invest less in technology compared to industries like finance, creating vulnerabilities.
Latin America saw the highest increase in cyberattacks, with a 72% surge year-over-year in Q3. This region is one of the most adaptive to mobile technology, and that openness sometimes becomes a vulnerability. On the other hand, North America accounted for 57% of publicly extorted ransomware attack victims, showing that even in highly educated regions like the United States, cybercriminals continue to thrive.
How has Checkpoint adapted its solutions to address these escalating threats?
I will start by explaining what differentiates us from the competition. There are many strong competitors in the market, but we believe we stand out because we are a platform company, not a point solution provider. Cybersecurity is multifaceted as the attacks come from different angles, at different times, in different forms. By being a platform company, we offer protection across the board: in the cloud, on-premise, and on mobile devices, regardless of where you are. That gives us a distinctive advantage.
Another key aspect is our focus on prevention rather than detection. No one is 100% secure, not even us. However, third-party statistics show that we capture more attacks than our competitors, often before they happen. Prevention is a cornerstone of our strategy. When attacks do occur, we respond faster than others, which is also validated by third-party tests.
Our security approach is based on three key principles: collaboration, comprehensiveness, and consolidation. First, collaboration ensures protection whether you are at home, in a coffee shop, or at your corporate headquarters. Second, comprehensiveness means we address multiple threats, from malware to phishing and ransomware. Finally, consolidation is crucial for operational efficiency. We provide a single, unified interface that helps administrators manage multiple attack vectors, making their jobs easier.
As businesses struggle to prioritize preventive security measures, what are some best practices for closing this prevention gap?
Education is the first step. Businesses must educate their users on cybersecurity risks, such as not clicking on unknown links or responding to emails from strangers. Sophisticated attacks today can even mimic your own voice, so the dangers are real and increasing.
Second, testing your solutions is critical. Ensure your technology is integrated and able to respond quickly to any breach. No one is 100% protected, but you need to be able to detect threats quickly and act on them. Backup plans are also essential, especially in case of ransomware attacks. We always encourage our customers to test and integrate their solutions to ensure they communicate with one another — this is where the importance of our three C’s, including consolidation and collaboration, comes into play.
How do you view the opportunities and challenges that AI brings to the cybersecurity landscape?
AI is both a tremendous opportunity and a significant challenge. It is a powerful tool that can help us solve problems faster and become more efficient. However, it also opens new doors for cybercriminals. Just as AI can be used to improve customer service or solve medical issues, the bad guys can use it for identity theft or damaging someone’s reputation.
We have been using AI for over 15 years. It is at the core of our technology, helping us stay ahead of attackers by thinking like them and reacting faster. However, we must be aware that AI is a double-edged sword. While it can address complex challenges, it can also be used for malicious purposes. So, we see it as a Pandora’s Box, with both risks and hope inside. The key is to harness its benefits while mitigating the risks.
How important is threat intelligence sharing between industries, and what are some of the challenges in fostering that collaboration?
Collaboration is key. What used to be about protecting the perimeter — your corporate headquarters, your desk, your laptop — has now expanded. It is about protecting “us” because we work and communicate from any location, not just the corporation. We do not just communicate via a laptop anymore. We do it via an iPad or an iPhone, so it is essential that your technology and architecture take this into account. The perimeter is now “us,” not a physical building. We have to ensure the same level of protection across mobile phones, laptops, iPads, public terminals, private homes, and corporate headquarters.
Consolidation plays a key role here. We take data points from all these devices like mobile phones, iPads, laptops, and corporate computers, and make sure they are treated equally. The protection is as strong as if you were in your corporate headquarters, but now the perimeter is each one of us individually.
What kind of cyberattacks do you deal with?
We have a saying in this industry: “There are two types of customers: those who have been attacked and those who do not know they have been attacked.” Many customers are either aware and react quickly, or they prepare, but this issue is here to stay. As innovation progresses, we will be able to respond even faster than we are now.
What is the state of the talent pool in the cybersecurity industry?
There is a huge talent shortage in the cybersecurity industry. We need to address it. Miami is an opportunity for us because many high-tech firms are coming to South Florida, but they are struggling to find good engineers, account managers, and operations folks. Our development is done primarily out of Israel, so we do not face a shortage of developers.
To help address this issue, we have an offering called “Secure Academy.” Secure Academy supports students at higher education institutions and nonprofits worldwide by providing vital cybersecurity skills and learning resources. We partner with universities to educate students on cybersecurity. Some students may want to pursue careers in this field, and we want to expand this program globally, including K-12 classrooms, to help people understand how this works and how to stay safe.
How will the transition in leadership as a new CEO joins in December 2024 impact your team?
We have a new CEO joining us in December. Our founder has been leading the company for over 30 years and wants to take on a more strategic role. The new CEO is a well-known industry expert, located in Tel Aviv, and we look forward to his leadership. It is an exciting time for us at Check Point. Our founder has done incredible things, and the company has grown into a significant player. We are looking forward to this new chapter.










