Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Expertise
Ecosystem

Select a tab

What's popular

Vermeer

Welcome to the Vermeer community page on the WWT Digital Platform. This private community site is created to improve collaboration and discussion between our organizations to drive business outcomes. Within this community, you will find links to articles, events, videos, workshops, and a broad collection of digital labs to support experimentation, education, and exploration.
Public Community
NAT

Complete guide to Check Point Network Address Translation

A comprehensive guide to Check Point Network Address Translation (NAT), covering concepts, configuration, automatic and manual NAT, static and hide NAT, ARP, NAT tables, and best practices. Designed as a definitive learning resource with practical examples, troubleshooting tips, and advanced scenarios for real-world deployments.
Blog
•Oct 9, 2025

Seeing the Firewall Clearly: Policy Insights That Actually Matter

Firewall policies grow quickly and rarely shrink, leaving rulebases cluttered, risky, and audit-heavy. Check Point Policy Insights turns policy and traffic data into continuous, actionable intelligence. It identifies unused, overlapping, and overly permissive rules, supports framework-aligned audits, and enables fast, governed cleanup directly in SmartConsole—automating work that once took days and proving why Check Point management stands out.
Blog
•Feb 6, 2026

Why Check Point's Lakera acquisition is more than just AI

Lakera, founded in 2021, enhances AI security by detecting anomalies and adversarial attacks. Acquired by Check Point, its technology strengthens AI-driven threat prevention. Through innovative tools like Gandalf, Lakera leverages human creativity to improve AI resilience. This integration promises advanced, adaptive security, transforming Check Point's approach to AI-based threat detection.
Blog
•Oct 10, 2025

Check Point NGFW Foundations Lab

The Check Point Foundations Lab is a training environment configured with a basic security policy that allows outbound internal traffic while permitting all other traffic freely. It provides a platform to practice building refined policies, applying NAT, restricting access, and monitoring traffic, offering hands-on experience with Check Point NGFW features in a controlled setting.
Foundations Lab
93 launches

What's new

Partner POV | Securing Your AI Transformation: Check Point Helps Security Teams in AI-First World

AI's rapid evolution challenges security teams to adapt. Check Point advocates rethinking security for the AI era, emphasizing foundational strength, secure AI adoption, and AI-driven automation. Strategic acquisitions enhance visibility, AI governance, and workspace security, ensuring comprehensive protection across networks, workspaces, and AI systems. Embrace AI safely with Check Point's innovative approach.
Partner Contribution
•Feb 24, 2026

Stop Stacking Boxes. Start Designing Security.

Back-to-back firewalls were effective 15-20 years ago, but in today's encrypted, identity-driven and rapidly evolving threat landscape, they add cost and complexity without meaningful protection. Modern security replaces duplicated perimeters with platform-integrated NGFW enforcement, segmentation and coordinated prevention—delivering stronger, measurable defense through intelligent design rather than stacked legacy controls.
Blog
•Feb 17, 2026

Seeing the Firewall Clearly: Policy Insights That Actually Matter

Firewall policies grow quickly and rarely shrink, leaving rulebases cluttered, risky, and audit-heavy. Check Point Policy Insights turns policy and traffic data into continuous, actionable intelligence. It identifies unused, overlapping, and overly permissive rules, supports framework-aligned audits, and enables fast, governed cleanup directly in SmartConsole—automating work that once took days and proving why Check Point management stands out.
Blog
•Feb 6, 2026

Celebrating Check Point's 2025 Americas Partner Award Winners

These awards celebrate not just results, but leadership, trust and the relentless pursuit of excellence
News
•Jan 30, 2026

Check Point updates Quantum firewall to secure AI use

The R82.10 release introduces 20 new features across network, identity and AI security. It focuses on hybrid environments that span data centres, branch offices and multiple public clouds.
News
•Dec 9, 2025

Securing the AI Surge with Check Point's GenAI Protect

This blog explores how GenAI has surged into daily workflows, often without visibility or guardrails, and why organizations must secure this adoption without slowing productivity. It explains the risks of shadow AI, the value of Check Point's GenAI Protect and how WWT's AI Proving Ground accelerates safe, multivendor GenAI deployment across modern enterprise environments.
Blog
•Nov 20, 2025

WWT and Checkpoint - Email Harmony, Security and Measuring Outcomes

Please join WWT as we host our valued partner, Checkpoint. Harmony Email & Collaboration is the leading email security solution in the industry today. So much so that WWT selected Harmony Email to secure our own O365 environment. With multiple awards and recognition as the leader in email security, it's no wonder why over 45,000 customers chose HEC to be their email security provider. Technical & Non-Technical Stakeholders are welcome and will benefit from this session! Come learn from SMEs how Checkpoint HEC integrates with workplace collaboration suites like Office 365, Teams, G Suite, Slack, and Dropbox from the inside via APIs. Watch Checkpoint's AI learn communication patterns of users and their roles to understand common interactions and look for anomalous behavior and potential threats keeping users and organizations secure.
Experience
•Nov 19, 2025 • 1pm

Partner POV | Hexstrike-AI: When LLMs Meet Zero-Day Exploitation

Hexstrike-AI, a revolutionary AI-powered security framework, is rapidly repurposed by threat actors to exploit zero-day vulnerabilities, reducing attack time from days to minutes. This marks a pivotal shift in cyber operations, urging defenders to adopt adaptive AI-driven defenses and shorten patch cycles to counteract this emerging threat.
Partner Contribution
•Nov 13, 2025

Check Point's Virtual Patching and the Evolution of Application Security

This blog discusses the Log4j crisis and highlights how Check Point's AI-driven WAAP protected customers through virtual patching. It explains the shift from WAF to WAAP, highlighting fast deployment, adaptive prevention and simple evaluation, which proves that real security comes from automation and proactive protection, rather than waiting for patches.
Blog
•Nov 12, 2025

Check Point and the Post-Quantum Transition

Quantum computing's rise threatens classical cryptography, prompting urgent shifts to post-quantum cryptography (PQC). Check Point leads this transition with quantum-ready solutions, ensuring secure communications through hybrid key exchanges and cryptographic agility. As PQC standards evolve, Check Point's architecture promises seamless adaptation, safeguarding digital infrastructures against future quantum threats.
Blog
•Oct 29, 2025

Check Point Redefines AI Security for Enterprises with AI Cloud Protect Powered by NVIDIA BlueField

Point is currently piloting AI Cloud Protect with financial services customers and strategic partners such as World Wide Technology.
News
•Oct 28, 2025

Check Point NGFW Foundations Lab

The Check Point Foundations Lab is a training environment configured with a basic security policy that allows outbound internal traffic while permitting all other traffic freely. It provides a platform to practice building refined policies, applying NAT, restricting access, and monitoring traffic, offering hands-on experience with Check Point NGFW features in a controlled setting.
Foundations Lab
•93 launches

Why Check Point's Lakera acquisition is more than just AI

Lakera, founded in 2021, enhances AI security by detecting anomalies and adversarial attacks. Acquired by Check Point, its technology strengthens AI-driven threat prevention. Through innovative tools like Gandalf, Lakera leverages human creativity to improve AI resilience. This integration promises advanced, adaptive security, transforming Check Point's approach to AI-based threat detection.
Blog
•Oct 10, 2025
NAT

Complete guide to Check Point Network Address Translation

A comprehensive guide to Check Point Network Address Translation (NAT), covering concepts, configuration, automatic and manual NAT, static and hide NAT, ARP, NAT tables, and best practices. Designed as a definitive learning resource with practical examples, troubleshooting tips, and advanced scenarios for real-world deployments.
Blog
•Oct 9, 2025

Partner POV | Check Point and Nutanix Advance Cloud Network Security

As hybrid cloud environments expand, Check Point CloudGuard Network Security's integration with Nutanix Cloud Infrastructure 7.3 enhances security through seamless service insertion and firewall chaining. This collaboration simplifies zero trust architecture, micro-segmentation, and compliance, offering dynamic, scalable protection without added complexity, empowering organizations to secure their networks efficiently.
Partner Contribution
•Oct 9, 2025

Partner POV | From VPN to SASE: Enabling Hybrid Work Beyond Legacy Access

In a world of hybrid work, traditional VPNs falter under modern demands. Check Point's SASE solution offers secure, high-performance connectivity, enabling seamless remote access and robust threat prevention. Embrace a hybrid security stack that combines cloud and on-premise strengths, ensuring agility and protection wherever your team operates.
Partner Contribution
•Sep 10, 2025

Partner POV | DMV-Themed Phishing Campaign Targeting U.S. Citizens

In May 2025, a sophisticated phishing campaign targeted U.S. citizens by impersonating state DMVs through SMS and fake websites, harvesting personal data. Analysis links the attack to a China-based threat actor. The campaign's scale and impact highlight the urgent need for public awareness and robust cybersecurity measures.
Partner Contribution
•Aug 7, 2025

Veriti and Check Point: Redefining Threat Exposure Management

An overview of Veriti, recently acquired by Check Point, which brings continuous threat exposure management into the security stack. Veriti provides real-time visibility across security tools, identifies misconfigurations and unmitigated threats, and recommends actionable steps to reduce attack surface risk without disrupting operations. This will cover how Veriti aligns with Check Point's prevention-first approach and how it can enhance an organization's overall security posture.
Blog
•Jul 15, 2025

Evolving Virtual Security: Comparing Check Point VSX and VSNext

Check Point VSX is a legacy virtualization platform for running multiple firewall instances on shared hardware. VSNext replaces it with a modern, modular architecture designed for automation, performance, and scalability. Unlike VSX, which relies on manual provisioning and legacy routing models, VSNext uses API-driven configuration, supports dynamic routing, and simplifies management and troubleshooting. It offers better tenant isolation, faster policy installation, and improved integration with cloud and container environments. VSNext is not backward compatible but is clearly the future of Check Point's virtual security strategy.
Blog
•Jul 15, 2025

Partner POV | The AI Arms Race: When Attackers Leverage Cutting-Edge Tech

AI's dual role in cybersecurity is reshaping the landscape, with criminals leveraging advanced AI models for sophisticated attacks. From AI-enhanced phishing to deepfakes, these tools create highly personalized, convincing threats. As AI evolves, its potential for misuse grows, challenging organizations to stay ahead in this escalating cyber arms race.
Partner Contribution
•Jul 11, 2025

Check Point

Experience the industry leading comprehensive, consolidated, and collaborative cyber security platform that is AI-Powered and Cloud-Delivered. Check Point's Infinity platform autonomously predicts and prevents attacks across networks, clouds, endpoints and devices.

55 Followers

At a glance

30Total
15Articles
12Blogs
1Community
1Event
1Lab
What's related
  • Security
  • AI Security
  • Blog
  • Check Point NGFWs
  • Cloud
  • Cloud Security
  • Network Security
  • Cybersecurity Risk & Strategy
  • Endpoint Security
  • Data Security
  • Hybrid Cloud
  • SASE
  • Zero Trust
  • AI & Data
  • ATC
  • Application & API Security
  • Applied AI
  • Awards & Recognitions
  • Cloud AI
  • Cloud-Native Platforms

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies