Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Expertise
Ecosystem

Select a tab

About Check Point & WWT

As Check Point Software Technologies' largest and most strategic partner worldwide, WWT plays a pivotal role in our mission to create a safer cyber-world. With a collaborative presence in over 88 countries, our partnership delivers advanced technologies and innovative solutions, safeguarding businesses across diverse environments against evolving cyber threats.

WWT and Checkpoint - Email Harmony, Security and Measuring Outcomes

Please join WWT as we host our valued partner, Checkpoint. Harmony Email & Collaboration is the leading email security solution in the industry today. So much so that WWT selected Harmony Email to secure our own O365 environment. With multiple awards and recognition as the leader in email security, it's no wonder why over 45,000 customers chose HEC to be their email security provider. Technical & Non-Technical Stakeholders are welcome and will benefit from this session! Come learn from SMEs how Checkpoint HEC integrates with workplace collaboration suites like Office 365, Teams, G Suite, Slack, and Dropbox from the inside via APIs. Watch Checkpoint's AI learn communication patterns of users and their roles to understand common interactions and look for anomalous behavior and potential threats keeping users and organizations secure.
Experience
•Nov 5, 2025 • 1pm

Check Point NGFW Foundations Lab

The Check Point Foundations Lab is a training environment configured with a basic security policy that allows outbound internal traffic while permitting all other traffic freely. It provides a platform to practice building refined policies, applying NAT, restricting access, and monitoring traffic, offering hands-on experience with Check Point NGFW features in a controlled setting.
Foundations Lab
10 launches

Why Check Point's Lakera acquisition is more than just AI

Lakera, founded in 2021, enhances AI security by detecting anomalies and adversarial attacks. Acquired by Check Point, its technology strengthens AI-driven threat prevention. Through innovative tools like Gandalf, Lakera leverages human creativity to improve AI resilience. This integration promises advanced, adaptive security, transforming Check Point's approach to AI-based threat detection.
Blog
•Oct 10, 2025
NAT

Complete guide to Check Point Network Address Translation

A comprehensive guide to Check Point Network Address Translation (NAT), covering concepts, configuration, automatic and manual NAT, static and hide NAT, ARP, NAT tables, and best practices. Designed as a definitive learning resource with practical examples, troubleshooting tips, and advanced scenarios for real-world deployments.
Blog
•Oct 9, 2025

Partner POV | Check Point and Nutanix Advance Cloud Network Security

As hybrid cloud environments expand, Check Point CloudGuard Network Security's integration with Nutanix Cloud Infrastructure 7.3 enhances security through seamless service insertion and firewall chaining. This collaboration simplifies zero trust architecture, micro-segmentation, and compliance, offering dynamic, scalable protection without added complexity, empowering organizations to secure their networks efficiently.
Partner Contribution
•Oct 9, 2025

Check Point in the ATC

Check Point NGFW Foundations Lab

The Check Point Foundations Lab is a training environment configured with a basic security policy that allows outbound internal traffic while permitting all other traffic freely. It provides a platform to practice building refined policies, applying NAT, restricting access, and monitoring traffic, offering hands-on experience with Check Point NGFW features in a controlled setting.
Foundations Lab
•10 launches

Run-time Cloud Posture Assessment

The speed at which cloud environments change creates challenges for security teams tasked with ensuring a certain level of posture and compliance. Even making decisions about what steps to take next becomes problematic without a handle on what your current state looks like. WWT's Run-time Cloud Posture Assessment is crucial for security teams to get an understanding of the net effect of architecture decisions and security tool deployments in your cloud environments.
Assessment

Virtual Chief Information Security Officer (vCISO)

Virtual Chief Information Security Officer (vCISO) offerings are a great way to develop and mature the security posture of your company. There are a variety of reasons that organizations seek WWT Security Consultants to assist in their environment. For large enterprises, a vCISO can help bridge the gap between an outgoing CISO and the hiring of a new one. The vCISO will be able to assist with the interview and onboarding process, while also providing knowledge transfer that would not be available otherwise. For small to medium sized business, a vCISO is able to provide guidance to security teams and executive leadership for solidifying the security program and identifying areas for improvement – without breaking the bank.
Assessment

Start your journey today

Reach out to learn more about our Check Point capabilities, speak with an expert or take advantage of what we have in our labs.

Contact us

Check Point

Experience the industry leading comprehensive, consolidated, and collaborative cyber security platform that is AI-Powered and Cloud-Delivered. Check Point's Infinity platform autonomously predicts and prevents attacks across networks, clouds, endpoints and devices.

50 Followers

At a glance

31Total
17Articles
7Blogs
2Videos
1Assessment
1Briefing
1Community
1Event
1Lab
What's related
  • Security
  • Cloud
  • Cloud Security
  • AI Security
  • Blog
  • Check Point NGFWs
  • Network Security
  • SASE
  • Endpoint Security
  • Zero Trust
  • Security Operations
  • AI & Data
  • ATC
  • Application & API Security
  • Applied AI
  • Cloud-Native Platforms
  • Cyber Range
  • Cybersecurity Risk & Strategy
  • Data Security
  • ESG at WWT

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies