Overview
Explore
Expertise
Ecosystem
Select a tab
About Check Point & WWT
As Check Point Software Technologies' largest and most strategic partner worldwide, WWT plays a pivotal role in our mission to create a safer cyber-world. With a collaborative presence in over 88 countries, our partnership delivers advanced technologies and innovative solutions, safeguarding businesses across diverse environments against evolving cyber threats.
WWT and Checkpoint - Email Harmony, Security and Measuring Outcomes
Please join WWT as we host our valued partner, Checkpoint. Harmony Email & Collaboration is the leading email security solution in the industry today. So much so that WWT selected Harmony Email to secure our own O365 environment. With multiple awards and recognition as the leader in email security, it's no wonder why over 45,000 customers chose HEC to be their email security provider.
Technical & Non-Technical Stakeholders are welcome and will benefit from this session!
Come learn from SMEs how Checkpoint HEC integrates with workplace collaboration suites like Office 365, Teams, G Suite, Slack, and Dropbox
from the inside via APIs.
Watch Checkpoint's AI learn communication patterns of users and their roles to understand common interactions and look for anomalous behavior and potential threats keeping users and organizations secure.
Experience
•Nov 5, 2025 • 1pm
Check Point NGFW Foundations Lab
The Check Point Foundations Lab is a training environment configured with a basic security policy that allows outbound internal traffic while permitting all other traffic freely. It provides a platform to practice building refined policies, applying NAT, restricting access, and monitoring traffic, offering hands-on experience with Check Point NGFW features in a controlled setting.
Foundations Lab
10 launches
Why Check Point's Lakera acquisition is more than just AI
Lakera, founded in 2021, enhances AI security by detecting anomalies and adversarial attacks. Acquired by Check Point, its technology strengthens AI-driven threat prevention. Through innovative tools like Gandalf, Lakera leverages human creativity to improve AI resilience. This integration promises advanced, adaptive security, transforming Check Point's approach to AI-based threat detection.
Blog
•Oct 10, 2025
Complete guide to Check Point Network Address Translation
A comprehensive guide to Check Point Network Address Translation (NAT), covering concepts, configuration, automatic and manual NAT, static and hide NAT, ARP, NAT tables, and best practices. Designed as a definitive learning resource with practical examples, troubleshooting tips, and advanced scenarios for real-world deployments.
Blog
•Oct 9, 2025
Partner POV | Check Point and Nutanix Advance Cloud Network Security
As hybrid cloud environments expand, Check Point CloudGuard Network Security's integration with Nutanix Cloud Infrastructure 7.3 enhances security through seamless service insertion and firewall chaining. This collaboration simplifies zero trust architecture, micro-segmentation, and compliance, offering dynamic, scalable protection without added complexity, empowering organizations to secure their networks efficiently.
Partner Contribution
•Oct 9, 2025
Check Point in the ATC
Check Point NGFW Foundations Lab
The Check Point Foundations Lab is a training environment configured with a basic security policy that allows outbound internal traffic while permitting all other traffic freely. It provides a platform to practice building refined policies, applying NAT, restricting access, and monitoring traffic, offering hands-on experience with Check Point NGFW features in a controlled setting.
Foundations Lab
•10 launches
Run-time Cloud Posture Assessment
The speed at which cloud environments change creates challenges for security teams tasked with ensuring a certain level of posture and compliance. Even making decisions about what steps to take next becomes problematic without a handle on what your current state looks like. WWT's Run-time Cloud Posture Assessment is crucial for security teams to get an understanding of the net effect of architecture decisions and security tool deployments in your cloud environments.
Assessment
Virtual Chief Information Security Officer (vCISO)
Virtual Chief Information Security Officer (vCISO) offerings are a great way to develop and mature the security posture of your company. There are a variety of reasons that organizations seek WWT Security Consultants to assist in their environment. For large enterprises, a vCISO can help bridge the gap between an outgoing CISO and the hiring of a new one. The vCISO will be able to assist with the interview and onboarding process, while also providing knowledge transfer that would not be available otherwise. For small to medium sized business, a vCISO is able to provide guidance to security teams and executive leadership for solidifying the security program and identifying areas for improvement – without breaking the bank.
Assessment
Start your journey today
Reach out to learn more about our Check Point capabilities, speak with an expert or take advantage of what we have in our labs.
Contact us