Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Expertise
Ecosystem

Select a tab

9 results found

Why Check Point's Lakera acquisition is more than just AI

Lakera, founded in 2021, enhances AI security by detecting anomalies and adversarial attacks. Acquired by Check Point, its technology strengthens AI-driven threat prevention. Through innovative tools like Gandalf, Lakera leverages human creativity to improve AI resilience. This integration promises advanced, adaptive security, transforming Check Point's approach to AI-based threat detection.
Blog
•Oct 10, 2025

Check Point and the Post-Quantum Transition

Quantum computing's rise threatens classical cryptography, prompting urgent shifts to post-quantum cryptography (PQC). Check Point leads this transition with quantum-ready solutions, ensuring secure communications through hybrid key exchanges and cryptographic agility. As PQC standards evolve, Check Point's architecture promises seamless adaptation, safeguarding digital infrastructures against future quantum threats.
Blog
•Oct 29, 2025
NAT

Complete guide to Check Point Network Address Translation

A comprehensive guide to Check Point Network Address Translation (NAT), covering concepts, configuration, automatic and manual NAT, static and hide NAT, ARP, NAT tables, and best practices. Designed as a definitive learning resource with practical examples, troubleshooting tips, and advanced scenarios for real-world deployments.
Blog
•Oct 9, 2025

Bridging AI and Cybersecurity: What Check Point MCP Servers Mean for Enterprise Security

Check Point's new MCP Server enables secure, structured integration between AI tools and Check Point's security infrastructure by exposing firewall policies, objects, and logs through a standardized Model Context Protocol interface. This allows large language models like Claude or GPT to query security environments using natural language, dramatically accelerating tasks such as policy analysis, compliance checks, and incident enrichment without requiring scripts or direct API calls. Deployed on-premises for full control and visibility, the MCP Server empowers security teams to automate workflows while maintaining strong governance and auditability.
Blog
•Jul 1, 2025

Veriti and Check Point: Redefining Threat Exposure Management

An overview of Veriti, recently acquired by Check Point, which brings continuous threat exposure management into the security stack. Veriti provides real-time visibility across security tools, identifies misconfigurations and unmitigated threats, and recommends actionable steps to reduce attack surface risk without disrupting operations. This will cover how Veriti aligns with Check Point's prevention-first approach and how it can enhance an organization's overall security posture.
Blog
•Jul 15, 2025

Evolving Virtual Security: Comparing Check Point VSX and VSNext

Check Point VSX is a legacy virtualization platform for running multiple firewall instances on shared hardware. VSNext replaces it with a modern, modular architecture designed for automation, performance, and scalability. Unlike VSX, which relies on manual provisioning and legacy routing models, VSNext uses API-driven configuration, supports dynamic routing, and simplifies management and troubleshooting. It offers better tenant isolation, faster policy installation, and improved integration with cloud and container environments. VSNext is not backward compatible but is clearly the future of Check Point's virtual security strategy.
Blog
•Jul 15, 2025

The State of Data Loss Prevention

Data Loss Prevention has regained prominence in recent years due to large scale breaches and increasingly stringent regulatory requirements. Vendors with varying tech heritages have been lining up to employ new technologies and techniques against this seemingly never-ending problem.
Blog
•Mar 31, 2025

Check Point's Virtual Patching and the Evolution of Application Security

This blog discusses the Log4j crisis and highlights how Check Point's AI-driven WAAP protected customers through virtual patching. It explains the shift from WAF to WAAP, highlighting fast deployment, adaptive prevention and simple evaluation, which proves that real security comes from automation and proactive protection, rather than waiting for patches.
Blog
•Nov 12, 2025

CNAPP Meets Network Security in New Partnership

Wiz and Check Point are entering a strategic partnership to bridge the gap between cloud network security and CNAPP. This partnership promises efficient risk prioritization and prevention, offering a holistic approach to end-to-end cloud security.
Blog
•Apr 22, 2025

Check Point

Experience the industry leading comprehensive, consolidated, and collaborative cyber security platform that is AI-Powered and Cloud-Delivered. Check Point's Infinity platform autonomously predicts and prevents attacks across networks, clouds, endpoints and devices.

51 Followers

At a glance

34Total
18Articles
9Blogs
2Videos
1Assessment
1Briefing
1Community
1Event
1Lab
What's related
  • Security
  • Cloud
  • Cloud Security
  • AI Security
  • Blog
  • Network Security
  • Check Point NGFWs
  • SASE
  • Endpoint Security
  • Zero Trust
  • Cybersecurity Risk & Strategy
  • Security Operations
  • AI & Data
  • ATC
  • Application & API Security
  • Applied AI
  • Cloud AI
  • Cloud-Native Platforms
  • Cyber Range
  • Data Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies