Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

What's popular

Debunking the Myths of Cisco's Software-Defined Access (SDA)

Cisco Software-Defined Access (SDA) has evolved from a promising concept to a proven enterprise solution. Despite lingering myths, SDA is now a mature, scalable and secure architecture powering thousands of modern campus networks. In this post, we'll debunk common misconceptions and highlight real-world success stories that showcase SDA's true capabilities.
Blog
•Oct 12, 2025

The Battle of AI Networking: Ethernet vs InfiniBand

This article is not an exploration of who does Ethernet better so much as a direct examination of technology itself. Numbers will be reported as an aggregate means between major players in the AI Networking market and contrasted with equivalent InfiniBand performance. The goal is to answer, at an atomic level, one question: eliminating all other variables, is Ethernet good enough?
Blog
•Nov 3, 2024

PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists

Looking to implement external dynamic lists in your Palo Alto NGFW or Prisma Access? This post will answer all your questions about how EDLs work in PAN-OS to dynamically improve your security posture.
Blog
•Oct 10, 2023

Department of War (DoW) Issues Success Memo for WWT's Joint Cyber Hunt Kit (JCHK) Prototype

The recognition from the DoW's Defense Innovation Unit (DIU) marks a meaningful step forward in how Cyber Protection Teams (CPTs) carry out their missions.
Blog
•Dec 3, 2025

Cisco Unified Edge: Powering the Next Generation of Intelligent Infrastructure

Cisco's Unified Edge Platform redefines distributed computing by delivering real-time intelligence and efficiency at data creation points. With energy-efficient design and centralized management via Intersight, it transforms industries from retail to healthcare. Experience the future of edge computing—intelligent, secure and scalable—wherever data is generated.
Blog
•Nov 3, 2025

What's new

Network Documentation

Using NetBox Custom Objects

NetBox's custom objects enable tailored data modeling. As organizations seek comprehensive data integration, custom objects empower deployments by embracing the ability to model unique environments, driving innovation and standardization in infrastructure automation. Explore how custom objects can transform your network management strategy.
Blog
•Dec 4, 2025

Department of War (DoW) Issues Success Memo for WWT's Joint Cyber Hunt Kit (JCHK) Prototype

The recognition from the DoW's Defense Innovation Unit (DIU) marks a meaningful step forward in how Cyber Protection Teams (CPTs) carry out their missions.
Blog
•Dec 3, 2025

Build GenAI Confidence with WWT's AI Prompt Engineering Training Series

As organizations race to unlock the full value of generative AI (GenAI), many discover that technology alone is not enough. WWT's Prompt Engineering Training Series provides a structured, progressive and secure pathway that helps teams accelerate AI tool adoption, improve outcomes and drive measurable business impact.
Blog
•Dec 2, 2025

Ransomware & Breach Trends: 2025 Insights and Strategic Recommendations

In 2025, ransomware attacks accelerated, with encryption occurring within hours, challenging traditional defenses. Organizations face urgent gaps in detection and response, as attackers employ swift tactics and extortion. To combat this, focus on behavioral analytics, robust recovery plans and proactive strategies to enhance cyber resilience and minimize impact.
Blog
•Dec 2, 2025

Zero Trust and Identity: Why A Business Can't Afford to Ignore IAM

Identity isn't just a login—it's the backbone of trust. As cyber threats accelerate, safeguarding people, data and reputation demands more than passwords. This article reveals how Identity and Access Management powers Zero Trust security, with real-world lessons and practical guidance.
Blog
•Dec 1, 2025

Takeaways from Supercomputing Conference 2025

Experts share what stood out at the international event for high-performance computing, networking, storage and analysis.
Blog
•Nov 25, 2025

Microsoft Ignite 2025: Key Takeaways from WWT and Softchoice

Microsoft Ignite 2025 delivered a sweeping vision for the future of enterprise technology, centered on AI agents, cloud-native innovation and secure digital transformation.
Blog
•Nov 25, 2025

WWT and Tanium at Converge 2025: Autonomous IT & Unstoppable Partnership

At Tanium Converge 2025, WWT showcased its strategic partnership with Tanium, emphasizing real-time, AI-driven risk management. Key innovations like Tanium Ask and Jump Gate highlight a shift towards Autonomous IT, enhancing operational efficiency and security. Together, WWT and Tanium empower organizations to transition from reactive to proactive IT management.
Blog
•Nov 24, 2025

The Path Is Clear: Mission-Critical Networks Deserve Segment Routing

The world's most essential networks—power grids, rail systems, public safety—depend on deterministic performance. Yet legacy SONET and MPLS architectures have become barriers to progress. Segment Routing (SR) delivers a modern alternative: simpler, faster and built for automation. This post explores how SR clears the path for modernization without compromising reliability.
Blog
•Nov 24, 2025

Impressions from Ignite 2025 through an EUC Lens

Microsoft Ignite 2025 made clear that AI and cloud innovation are reshaping end-user computing. From Intune's Copilot agents to Windows 365's AI-enabled Cloud PCs and AVD's hybrid flexibility, the event highlighted how enterprises can deliver secure, intelligent and seamless digital workspaces that empower productivity across devices, data centers and disruptions.
Blog
•Nov 24, 2025
Fortinet Xperts 2025 Recap Header Image

Fortinet Xperts 2025

Fortinet XPERTS 2025 delivered the heat, despite the cold outside. Packed with cutting-edge innovation, expert insights and hands-on learning, this year's event proved once again that Fortinet knows how to bring the fire to cybersecurity.
Blog
•Nov 20, 2025

Securing the AI Surge with Check Point's GenAI Protect

This blog explores how GenAI has surged into daily workflows, often without visibility or guardrails, and why organizations must secure this adoption without slowing productivity. It explains the risks of shadow AI, the value of Check Point's GenAI Protect and how WWT's AI Proving Ground accelerates safe, multivendor GenAI deployment across modern enterprise environments.
Blog
•Nov 20, 2025

Software Image Management (SWIM): Fixing the IT Infrastructure Gap

Struggling with slow, manual network updates? Discover how Software Image Management (SWIM) closes the IT infrastructure gap by automating patching, boosting compliance, and eliminating configuration drift so your team can focus on innovation and your business stays competitive.
Blog
•Nov 19, 2025
Fortinet WWT Partner of the Month

Securing the Future: Fortinet as WWT's Partner of the Month

A closer look at the powerful partnership between WWT and Fortinet—and how the Associate Academy experience brings cybersecurity to life for the next generation of technologists.
Blog
•Nov 19, 2025

Accelerating Software Development Velocity with Devin

Devin is an autonomous AI engineer who acts like a trusted kitchen manager, handling the backlog, repetitive prep work and tasks that slow teams down, so human developers can focus on the highest-value engineering "dishes." Instead of just making individuals faster, Devin adds true parallel capacity by taking on delegated work from end to end. It understands codebases, completes tasks independently, and returns finished outputs, such as pull requests. In short, Devin is a new kind of teammate who helps organizations move faster and clear the work they've never had time to tackle.
Blog
•Nov 19, 2025

Cisco's Technology Announcements: Building the AI-Ready and Edge-First Future

Cisco Partner Summit 2025 in San Diego marked more than a celebration of partnerships. It represented a turning point in how Cisco and its ecosystem are defining the next era of AI, edge compute, networking and lifecycle services. The event showcased major technology announcements alongside a sweeping series of awards recognizing partner excellence. Among those honored, World Wide Technology (WWT) stood out for its innovation, customer impact and global execution.
Blog
•Nov 19, 2025

5 Key Takeaways from UBBA Summit and Plugfest 2025

The Utility Broadband Alliance's premier event provided insight into how utilities can modernize operations, take control of their data and build future-ready networks.
Blog
•Nov 19, 2025

The Open-Source Equation: Balancing Cost, Control and Complexity

Open-source virtualization and container platforms promise flexibility and freedom from licensing constraints, but they can also introduce operational overhead and risks that should be weighed carefully. This post provides a balanced view of when open-source makes sense - and when enterprise support still matters.
Blog
•Nov 18, 2025

Zero Trust Principles

Not just a single solution, a zero trust implementation is an integrated approach for continuous validation of authorized users across your entire organization. A zero trust security framework focuses on protecting critical assets through a layered, continuously monitored and adaptable architecture that minimizes risks and containment in case of breaches.
Blog
•Nov 18, 2025

We Gained More Wizdom in 2025

Wiz's inaugural user conference in NYC unveiled new expansions in AI and SaaS security, introducing agentic AI and Attack Surface Management. These innovations aim to enhance context-driven security, addressing emerging threats and prioritizing vulnerabilities. As AI and SaaS platforms evolve, Wiz's proactive approach ensures robust protection against increasingly sophisticated adversaries.
Blog
•Nov 18, 2025

Blog

The WWT Blog features insights, event recaps, news and more from our technology and industry experts.

69 Followers

At a glance

886Total
886Blogs
What's related
  • Security
  • AI & Data
  • Digital
  • Data Center
  • Applied AI
  • Automation
  • Cloud
  • Digital Workspace
  • Software Development
  • Cisco
  • Cybersecurity Risk & Strategy
  • Networking
  • Security Operations
  • AI Proving Ground
  • AI Security
  • Primary Storage
  • GenAI
  • Network Security
  • Microsoft
  • Customer Experience

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies