Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Expertise
Ecosystem

Select a tab

What's new

CrowdStrike Proving Ground Lab

WWT's ATC CrowdStrike Proving Ground Lab exists to showcase the CrowdStrike Falcon platform's web UI and ability to alert on, and prevent, breaches using cloud data and machine learning.
Advanced Configuration Lab
•1485 launches

Beyond Identity Foundations Lab

This lab features Beyond Identity which is an authentication solution that uses device-bound credentials for zero-friction passwordless authentication. Beyond Identity is a cloud-native platform that uses Authenticators downloaded on endpoints which registers a users credentials and collects signals on the endpoint to capture device security posture for authentication.
Foundations Lab
•198 launches

Delivering Modern ZTNA: How Okta and Palo Alto Networks Work Better Together

Okta and Palo Alto Networks synergize to create a robust Zero Trust Network Access (ZTNA) architecture. By integrating identity management and network security, they enable dynamic, policy-driven access across users, applications and devices for continuous validation and enforcement. Discover how these technologies connect to secure modern work environments.
Blog
•Apr 3, 2025

Partner POV | Why Zero Trust Is Critical in a Hybrid World

Google and Okta's partnership strengthens Zero Trust security by integrating Chrome Enterprise with Okta's Device Assurance policies, extending to Android devices and verifying trustworthiness through device signals.
Partner Contribution
•Mar 27, 2025

Partner POV | How Okta Embraces Identity Verification Using Persona

Okta is enhancing security in remote work by integrating Persona's identity verification technology into onboarding and account recovery, reducing fraud and improving efficiency.
Partner Contribution
•Mar 27, 2025

Okta Foundations

This on-demand integration lab is a capability of WWT's Advanced Technology Center (ATC), designed to provide hands-on experience with Okta. The purpose of this lab is to help you develop proficiency in navigating and configuring features within the Okta admin console. In this lab environment, you will gain hands-on experience with essential Okta tasks, including managing users and groups, integrating applications using SAML, and connecting Okta with Active Directory. You will also explore how to configure device assurance policies, ensuring secure access across various devices.
Foundations Lab
•175 launches

Okta Essentials

Okta is one of the leaders in Identity Providers (IdP) and simplifies how users connect to applications and resources. It uses tools such as Single Sign-on (SSO), Multifactor authentication (MFA), passwordless authentication with Okta FastPass, workflows, and more.
Learning Path

End User Computing Nerd vs the Great Firewall of China

Traveling to China for the holidays, I circumvented the Great Firewall of China to stay connected to the West. What worked and what didn't? While personal VPNs failed, using international roaming, VDI and an enterprise browser proved effective. This journey highlighted the challenges and solutions for maintaining internet access to the West in a highly restricted environment.
Blog
•Jan 20, 2025

Importance of Identity Security: The Core of Modern Cybersecurity

As cyber threats become more sophisticated, organizations increasingly realize that securing their digital identities are no longer just an IT priority - it's a critical business necessity. During my attendance at two leading Identity and Access Management (IAM) conferences, (Okta's Oktane and SailPoint's Navigate), it was clear that Identity Security sits at the core of modern security strategies.
Blog
•Jan 2, 2025

Identity and Access Management (IAM)

Identity and Access Management (IAM) is a security framework of policies and procedures that helps organizations manage user identity by using different technologies. At its core, IAM is getting the right people and access to the right resources at the right time. This learning series will cover the fundamentals of IAM with some of the leaders of Identity Providers (IdP), Identity Governance and Administration (IGA), and Privilege Access Security (PAS).
Learning Series

CrowdStrike and Zscaler Private Access Integrated Lab

WWT's ATC CrowdStrike and Zscaler Integrated lab exists to showcase the integration between CrowdStrike's Falcon Platform, Zscaler Private Access and Zscaler Client Connector through relevant use cases.
Advanced Configuration Lab
•211 launches

Zscaler Internet Access, CrowdStrike, and Okta Integration Lab

This lab exists to provide hands-on experience with the integration between ZIA, CrowdStrike Falcon, and Okta through relevant use cases. First, this lab can be used to see how the integration between CrowdStrike Falcon and ZIA can ensure administrators have end-to-end insight into the threat landscape to minimize attack surface and deliver rapid threat detection and response. On top of this, the lab allows users to see how Okta can integrate with both CrowdStrike and Zscaler to strengthen a company's Zero Trust profile, enhance threat detection during authentication and monitor the intersection of security and access management.
Advanced Configuration Lab
•225 launches

Partner POV | How Okta, CrowdStrike, and Zscaler deliver end-to-end Zero Trust

This partnership addresses challenges like digital transformation, distributed workforces, and resource constraints by leveraging AI and specialized expertise to improve security outcomes.
Partner Contribution
•Aug 21, 2024

Partner POV | AI at Work 2024: A view from the C-suite

C-suite executives must prioritize the adoption of robust security practices around AI, with IAM at the forefront, to safeguard against unauthorized access and potential breaches.
Partner Contribution
•Aug 14, 2024

Identity and Access Management Briefing

Join our exclusive 45-minute briefing on Identity and Access Management (IAM), tailored for senior security and business leaders seeking to enhance their organization's IAM capabilities. Gain valuable insights and strategies to effectively address the three greatest challenges encountered in the IAM space.
Briefing

Defending Healthcare Against Cyber Attacks

It's true that all businesses are at risk for cyber attack. However, few industries face the level of threat aimed at healthcare.
Article
•Jun 3, 2023

Zero Trust Briefing

Increased visibility, reducing the attack surface, and rationalizing zero trust theory with technical implementation—these are just a few of the outcomes that a successful zero trust program should provide. Securing the enterprise, both on-premise and in the cloud, is a challenge in today's landscape.
Briefing

Okta

Okta Identity and access management platform is neutral, extensible, easy-to-use, neutral and works with your existing and new applications. We address various identity use cases with our cybersecurity solutions including customer, employees, partners, contractors and vendors to securely access their resources.

42 Followers

At a glance

16Total
5Articles
5Labs
3Blogs
2Briefings
1Learning Path
What's related
  • Security
  • Identity and Access Management
  • ATC
  • Endpoint Security
  • Security Operations
  • Zero Trust
  • Blog
  • Consulting Services
  • Cyber Range
  • Network Security
  • What we do
  • Cloud
  • Cloud Security
  • Cybersecurity Risk & Strategy
  • AI & Data
  • AI Security
  • AI Solutions
  • Digital Workspace
  • End-User Computing
  • Healthcare

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Cookies