Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Expertise
Ecosystem

Select a tab

What's new

Getting Started With Veeam Data Protection

The Veeam Data Protection Fundamentals Learning Path provides an introduction to the Veeam Data Platform. Learn about the three pillars that Veeam builds from and go hands-on with Veeam Backup and Replication. This Learning Path covers the basic concepts and functions of Veeam and provides an overview of data protection fundamentals.
Learning Path

Partner POV | Microsoft 365 Ransomware: Your Comprehensive Guide to Understanding, Prevention, and Recovery

Get a complete understanding for Microsoft 365 ransomware. Learn how M365 attacks occur, preventative measures, and steps to take for prevention and recovery.
Partner Contribution
•Mar 19, 2025

Exploring Veeam Kasten for Kubernetes

This lab introduces Veeam Kasten for Kubernetes, guiding learners through its interface, backup policy creation, and application restoration. Additionally, it explores blueprints and transform sets, equipping users with essential skills for efficient Kubernetes data management.
Foundations Lab
•114 launches

Partner POV | OpenShift Virtualization with Veeam Kasten

Discover how Veeam's partnership with Red Hat combines their hybrid cloud expertise with Veeam Kasten's advanced data protection and mobility solutions to meet the critical needs of modern enterprises.
Partner Contribution
•Nov 5, 2024

Veeam Availability Suite Lab

This lab introduces Veeam Backup & Recovery, focusing on the protection of virtual machines running on VMware. Exercises include initial configuration, manual backup of a VM, and protection of VMs using tags.
Foundations Lab
•168 launches

Partner POV | Why backup should be a part of your cyber resilience plan

Did you know that backups can be a threat vector? Protect your business from the evolving threat of ransomware with a robust cyber-resilience strategy. Embrace zero trust principles and don't let an attack on your backups compromise your business. Secure your data, maintain your reputation, and bounce forward from breaches with confidence.
Video
•1:43
•Jul 17, 2024

Partner POV | Understanding Zero Trust Data Resilience (ZTDR)

Explore key principles and architecture for fortified cybersecurity. Dive into secure data practices with Veeam.
Partner Contribution
•Apr 24, 2024

Veeam Data Platform Update: Take a stand against cyberattacks with radical resilience

The Veeam Data Platform 23H2 Update, including Veeam Backup & Replication™ v12.1 is now generally available.
Video
•7:28
•Jan 26, 2024

Partner POV | What is Cyber Resilience?

This article explores the concept of Cyber Resilience, its framework, common risks, and key measures, emphasizing the importance of a holistic approach to prepare organizations for cyber threats and ensure business continuity.
Partner Contribution
•Oct 28, 2023

Thoughts on Kubernetes Data Protection

Kubernetes was created by Google in 2014 and donated to the Cloud Native Computing Foundation (CNCF) in 2015. It has become the de facto standard for running containers in production at scale.
Blog
•Aug 11, 2023

Veeam 2023 Ransomware Trends Report 2023: How Bad Was the Attack?

Learn what percentage of your data will be affected by ransomware and how much data you could restore in Veeam's trends report.
Video
•4:47
•Jul 17, 2023

What's New in Veeam Backup & Replication

Learn what's new with Veeam's V12 solution.
Video
•3:51
•May 24, 2023

2022 Gartner Enterprise Backup and Recovery Software Solutions Magic Quadrant Review

WWT's global solution and architecture team details what's missing from the 2022 release of Gartner's Magic Quadrant for Enterprise Backup and Recovery Software Solutions.
Blog
•Aug 23, 2022

Veeam

Veeam provides organizations with resiliency through a broad platform that provides data security, data recovery and data freedom for their hybrid cloud.

28 Followers

At a glance

13Total
4Articles
4Videos
2Blogs
2Labs
1Learning Path
What's related
  • Data Center
  • Data Protection & Cyber Recovery
  • Cyber Resilience
  • Security
  • ATC
  • Blog
  • Zero Trust

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Cookies