Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Expertise
Ecosystem

Select a tab

18 results found

Partner POV | Check Point and Nutanix Advance Cloud Network Security

As hybrid cloud environments expand, Check Point CloudGuard Network Security's integration with Nutanix Cloud Infrastructure 7.3 enhances security through seamless service insertion and firewall chaining. This collaboration simplifies zero trust architecture, micro-segmentation, and compliance, offering dynamic, scalable protection without added complexity, empowering organizations to secure their networks efficiently.
Partner Contribution
•Oct 9, 2025

What Is NGFW? A Primer on the Third Generation of Firewalls

Learn about the competitive difference NGFW has over traditional firewalls, types of organizations that benefit most from NGFS and competitive vendors in the space.
Article
•Jun 3, 2023

Partner POV | Check Point and Pax8 Partnership Provides Powerful New Security Offerings for MSPs

MSPs face a transformative era as cloud adoption and hybrid work rise. Check Point's partnership with Pax8 empowers MSPs with AI-driven, unified security solutions via the Pax8 Marketplace. This collaboration simplifies operations, enhances protection, and accelerates growth, marking a pivotal shift in delivering enterprise-grade cyber security with increased efficiency and profitability.
Partner Contribution
•Jul 3, 2025

Partner POV | Hexstrike-AI: When LLMs Meet Zero-Day Exploitation

Hexstrike-AI, a revolutionary AI-powered security framework, is rapidly repurposed by threat actors to exploit zero-day vulnerabilities, reducing attack time from days to minutes. This marks a pivotal shift in cyber operations, urging defenders to adopt adaptive AI-driven defenses and shorten patch cycles to counteract this emerging threat.
Partner Contribution
•Nov 13, 2025

Partner POV | Women Leading Digital Revolution and Cyber Security's Next Frontier

The cybersecurity industry faces a gender gap, but companies like Check Point are working to address it by promoting women in leadership, offering mentorship, and creating more inclusive opportunities to attract and retain female talent.
Partner Contribution
•Feb 17, 2025

Partner POV | Zero Trust Security in Action: Meet the New CheckPoint CloudGuard

Zero Trust is an important security measure used to protect against credential-based attacks and reduce the risk of security breaches. Learn more about Check Point's CloudGuard as a central component of a Zero Trust security strategy, offering features such as Cloud Identity and Entitlement Management (CIEM) and Code Security.
Partner Contribution
•Dec 15, 2023

My Favorite Next-Generation Firewall Security Features

A review of the features that differentiate today's hottest NGFW solutions.
Article
•Jun 3, 2023

Partner POV | The AI Arms Race: When Attackers Leverage Cutting-Edge Tech

AI's dual role in cybersecurity is reshaping the landscape, with criminals leveraging advanced AI models for sophisticated attacks. From AI-enhanced phishing to deepfakes, these tools create highly personalized, convincing threats. As AI evolves, its potential for misuse grows, challenging organizations to stay ahead in this escalating cyber arms race.
Partner Contribution
•Jul 11, 2025

Partner POV | The Future of Cybersecurity in the Age of Generative AI

Insights and projections from recent ESG research.
Partner Contribution
•Apr 12, 2024

Partner POV | From VPN to SASE: Enabling Hybrid Work Beyond Legacy Access

In a world of hybrid work, traditional VPNs falter under modern demands. Check Point's SASE solution offers secure, high-performance connectivity, enabling seamless remote access and robust threat prevention. Embrace a hybrid security stack that combines cloud and on-premise strengths, ensuring agility and protection wherever your team operates.
Partner Contribution
•Sep 10, 2025

Partner POV | DMV-Themed Phishing Campaign Targeting U.S. Citizens

In May 2025, a sophisticated phishing campaign targeted U.S. citizens by impersonating state DMVs through SMS and fake websites, harvesting personal data. Analysis links the attack to a China-based threat actor. The campaign's scale and impact highlight the urgent need for public awareness and robust cybersecurity measures.
Partner Contribution
•Aug 7, 2025

Partner POV | From Phish to Phish Phishing: How Email Scams Got Smart

As AI technology advances, both attackers and defenders will engage in an ongoing arms race, with AI-powered security solutions and advanced threat detection becoming crucial. The future of phishing is uncertain but will undoubtedly be more challenging.
Partner Contribution
•Aug 20, 2024

Check Point

Experience the industry leading comprehensive, consolidated, and collaborative cyber security platform that is AI-Powered and Cloud-Delivered. Check Point's Infinity platform autonomously predicts and prevents attacks across networks, clouds, endpoints and devices.

51 Followers

At a glance

34Total
18Articles
9Blogs
2Videos
1Assessment
1Briefing
1Community
1Event
1Lab
What's related
  • Security
  • Cloud
  • Cloud Security
  • AI Security
  • Blog
  • Network Security
  • Check Point NGFWs
  • SASE
  • Endpoint Security
  • Zero Trust
  • Cybersecurity Risk & Strategy
  • Security Operations
  • AI & Data
  • ATC
  • Application & API Security
  • Applied AI
  • Cloud AI
  • Cloud-Native Platforms
  • Cyber Range
  • Data Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies