Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Expertise
Ecosystem

Select a tab

What's popular

Hands-On Lab Workshop: Zscaler Zero Trust – Branch Connector and Airgap

Join our virtual hands-on lab to explore Zscaler's Zero Trust Branch (ZTB) platform, focusing on Branch Connector and Airgap technologies. This session demonstrates how Zscaler's modern approach moves beyond legacy network architectures to enforce least-privilege access and advanced micro-segmentation. You'll see how each endpoint is isolated, dramatically reducing the attack surface and preventing lateral movement—crucial for containing breaches and limiting internal threats. Participants will tour the Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), and Privileged Remote Access (PRA) consoles, and observe how policies and rule sets provide granular control over user and device access for both internal (East-West) and external (North-South) traffic. The lab is read-only, but you'll be able to view all Zscaler modules and their settings in action.
Webinar
•Feb 5, 2026 • 11am

Top Digital Experience Monitoring Solutions for Employee Experience

Our experts have evaluated, tested and deployed eight leading DEM solutions in our Advanced Technology Center to provide insights into key strengths, capabilities and ideal use cases.
Article
•Oct 21, 2025

Why Digital Experience Monitoring is a Strategic Move for IT Leaders

Learn what digital experience monitoring is, how it can improve the employee experience, and what you can do now to get started.
Article
•Jun 27, 2025

Zscaler Zero Trust Branch - Branch Connector and Airgap

In this lab, we will look at how the Zscaler Zero Trust Exchange unifies our ability to deploy a zero trust methodology. First we will take you on a tour of the working consoles that relate to Zscaler Branch Connector and Airgap technologies. We will view all the policies and rule sets that make up the Zscaler Internet Access and Zscaler Private Access giving our organization granular control over user and device access both internally (East-West traffic) and externally (North-South traffic). This is a read only lab and you will be able to try the access set up already and view all the Zscaler modules and their settings.
Advanced Configuration Lab
98 launches

Partner POV | Fighting AI-Driven Malware: Using AI for Effective Defense

Cybercrime continues to escalate—with global costs projected to hit $10.5 trillion annually this year—as attackers use advanced technologies to bypass traditional defenses.
Partner Contribution
•Jun 13, 2025

What's new

Hands-On Lab Workshop: Zscaler Zero Trust – Branch Connector and Airgap

Join our virtual hands-on lab to explore Zscaler's Zero Trust Branch (ZTB) platform, focusing on Branch Connector and Airgap technologies. This session demonstrates how Zscaler's modern approach moves beyond legacy network architectures to enforce least-privilege access and advanced micro-segmentation. You'll see how each endpoint is isolated, dramatically reducing the attack surface and preventing lateral movement—crucial for containing breaches and limiting internal threats. Participants will tour the Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), and Privileged Remote Access (PRA) consoles, and observe how policies and rule sets provide granular control over user and device access for both internal (East-West) and external (North-South) traffic. The lab is read-only, but you'll be able to view all Zscaler modules and their settings in action.
Webinar
•Feb 5, 2026 • 11am

Zscaler Internet Access: Secure Branch SSE (SASE Lab Series)

Secure Access Service Edge (SASE), coined by Gartner in 2019, is a solution that blends networking and security into cloud-scale architecture that optimizes end user performance and improves security for an organization. Zscaler Internet Access (ZIA) is a secure Internet and web gateway cloud-delivered SASE service that sits between the users and the internet. ZIA will inspect every byte of traffic inline across multiple security techniques providing full protection from web and internet threats. The SASE Lab Series will look to explore the capabilities of the solution to provide you with a "rubber meets road" understanding of these technologies and how SASE can be applied in your company.
Foundations Lab
•679 launches

SASE - Zscaler Internet Access (ZIA)

Zscaler ZIA, or Zscaler Internet Access, is a cloud-based security solution that provides secure access to the internet for users and devices within an organization. It offers a comprehensive set of security features that protect against a wide range of threats, including malware, phishing and other cyber attacks. In this learning path, we will explore the Zscaler ZIA architecture as well as the configuration and validation of the many security components that ZIA provides. You will also learn about many administration options of the platform like Authentication, Analytics, Logging capabilities, Traffic forwarding options and many more.
Learning Path

Partner POV | Building Trust Through Identity: Addressing Security Challenges in Modern Healthcare

In healthcare, patients are always the priority. But behind the scenes, the quest to secure sensitive data while empowering clinicians remains a delicate balancing act.
Partner Contribution
•Jan 22, 2026

Partner POV | Securing GenAI for State and Local Governments

It's early February 2025, and a small municipal government is processing an influx of public records requests. The team, overwhelmed and understaffed, begins utilizing ChatGPT to summarize documents, pull relevant data, and expedite responses.
Partner Contribution
•Jan 5, 2026

Partner POV | Ransomware's Impact on the Public Sector in 2025

Ransomware attacks have entered a new phase in 2025—one defined by more target campaigns, extortion, and leverage.
Partner Contribution
•Jan 5, 2026

Partner POV | New in RevealX - Blind Spots to Breakthroughs: Fulfilling the Vision of the Modern SOC

Discover unprecedented network visibility with ExtraHop's latest release, enhancing threat detection and response. By integrating with Zscaler, it offers end-to-end insights into lateral movements and privileged user activities. Empower your SOC teams with deeper analysis and faster triage, ensuring robust security in complex, encrypted environments.
Partner Contribution
•Dec 9, 2025

CrowdStrike and Zscaler Private Access Integrated Lab

WWT's ATC CrowdStrike and Zscaler Integrated lab exists to showcase the integration between CrowdStrike's Falcon Platform, Zscaler Private Access and Zscaler Client Connector through relevant use cases.
Advanced Configuration Lab
•231 launches

Hands-On Lab Workshop: Zscaler Unified Vulnerability Management

Join our interactive lab workshop to explore Zscaler's Unified Vulnerability Management (UVM) and Risk360 modules. This session is designed for security and IT professionals seeking to enhance their organization's asset hygiene, vulnerability management, and cyber risk quantification. You'll gain hands-on experience with Zscaler's Security Fabric, learning how to identify and prioritize vulnerabilities, deduplicate findings, and streamline remediation workflows. The workshop includes practical exercises, expert guidance, and live Q&A to help you master modern vulnerability management strategies.
Webinar
•Nov 20, 2025 • 11am

SASE Architecture: Cisco Viptela SD-WAN With Zscaler (SSE) Lab

Secure Access Service Edge (SASE), coined by Gartner in 2019, is a solution that blends networking and security into cloud scale architecture that optimizes end user performance and improves security for an organization. With the Zscaler and SD-WAN integration, you can rapidly gain access to cloud-delivered security in minutes. This market leading API automation makes it very fast and agile to deploy and manage the network and security environment of hundreds or even thousands of remote sites.
Advanced Configuration Lab
•469 launches

When AI Starts to Act on Its Own, Who's in Control?

As artificial intelligence moves from prediction to action, a new security frontier is taking shape. In this episode, Zscaler's Head of AI Innovation Phil Tee and WWT's VP of Global Cyber Chris Konrad explore the rise of autonomous agents, the evolution of Zero Trust and what it means to secure AI itself. From poisoned prompts to quantum threats, they warn the biggest risk isn't just deploying AI — it's trusting it. A sharp, real-world look at how enterprises can protect their future as machines begin to make decisions of their own.
Video
•0:57
•Nov 5, 2025

Zscaler - Zero Trust Branch (ZTB) and Airgap

Zscaler, the leader in cloud security, brings together several of their technologies in their Zero Trust Exchange to implement, improve, and bolster your zero trust architecture (ZTA) within your organization. Utilizing their Zero Trust Exchange at the core of their technologies, it weave together secure internet access with Zscaler Internet Access (ZIA), private network access using Zscaler Private Access (ZPA) eliminating the need for traditional VPNs, data loss protection (DLP) and cloud access security broker (CASB) incorporated in Zscaler Data Protection, and network segmentation implementing Zscaler Airgap - their agentless micro-segmentation technology, all to reduce your attack surface and combining this all into a single enhanced platform. In this learning path, we are going to focus on our Zero Trust Branch and Airgap technologies and how they can together, improve your ZTA.
Learning Path

Zscaler Zero Trust Branch - Branch Connector and Airgap

In this lab, we will look at how the Zscaler Zero Trust Exchange unifies our ability to deploy a zero trust methodology. First we will take you on a tour of the working consoles that relate to Zscaler Branch Connector and Airgap technologies. We will view all the policies and rule sets that make up the Zscaler Internet Access and Zscaler Private Access giving our organization granular control over user and device access both internally (East-West traffic) and externally (North-South traffic). This is a read only lab and you will be able to try the access set up already and view all the Zscaler modules and their settings.
Advanced Configuration Lab
•98 launches

Zscaler Data Protection (SASE/Endpoint)

The Secure Access Service Edge (SASE), introduced by Gartner in 2019, is a solution integrating networking and security within a cloud-scale architecture, enhancing end-user performance and bolstering security for organizations. Zscaler Internet Access (ZIA) serves as a cloud-delivered SASE service, functioning as a secure Internet and web gateway positioned between users and the Internet. Within ZIA, Zscaler's data protection capabilities offer numerous advantages. These include seamless scalability and global coverage, safeguarding remote workers and branch offices. Utilizing advanced threat intelligence and machine learning, it promptly identifies and addresses breaches. Granular policy controls ensure consistent enforcement of data usage policies, promoting regulatory compliance. Additionally, its integrated security stack simplifies management, enabling IT teams to concentrate on strategic priorities. In essence, ZIA empowers organizations with agile security measures to effectively mitigate risks.
Foundations Lab
•108 launches

Top Digital Experience Monitoring Solutions for Employee Experience

Our experts have evaluated, tested and deployed eight leading DEM solutions in our Advanced Technology Center to provide insights into key strengths, capabilities and ideal use cases.
Article
•Oct 21, 2025

Zscaler Internet Access, CrowdStrike, and Okta Integration Lab

This lab exists to provide hands-on experience with the integration between ZIA, CrowdStrike Falcon, and Okta through relevant use cases. First, this lab can be used to see how the integration between CrowdStrike Falcon and ZIA can ensure administrators have end-to-end insight into the threat landscape to minimize attack surface and deliver rapid threat detection and response. On top of this, the lab allows users to see how Okta can integrate with both CrowdStrike and Zscaler to strengthen a company's Zero Trust profile, enhance threat detection during authentication and monitor the intersection of security and access management.
Advanced Configuration Lab
•281 launches

Partner POV | AI-powered App Segmentation: Unlocking Zero Trust at Scale

Imagine a castle surrounded by strong stone walls and a deep moat designed to keep unwanted visitors out. The drawbridge is tightly guarded, and all of the focus is placed on making sure no one from the outside gets in. But what happens when someone crosses the bridge? Inside the castle walls, it's a free for all. There are no locked doors, no security for treasures, and no checks on where people roam. Similarly, in many IT environments, once a user connects to the network, they often gain broad access to applications and data, with little control over what happens inside.
Partner Contribution
•Aug 29, 2025

Partner POV | Zscaler Cellular is redefining the Future of Secure Mobile Connectivity

As organizations continue to embrace cellular connectivity for IoT devices and mobile endpoints, securing these connections has become a complex problem.
Partner Contribution
•Aug 21, 2025

Zero Trust + AI: Accelerate Innovation With Security Built for the AI Era

AI powers innovation and drives efficiency—but also helps bad actors deliver more relentless and effective attacks. Companies need to rethink how they protect their private and public use of AI and how they defend against AI-powered attacks.
Video
•1:00
•Aug 4, 2025

Zscaler Unified Vulnerability Management & Risk360 - Powered by the Zscaler AI Data Security Fabric

With cyber threats coming from every direction, having your vulnerabilities regularly remediated and risks quantified is a necessary piece of your cyber security puzzle. With Zscaler's Unified Vulnerability Management (Avalor) and Risk360, you can do just that! As part of the tool set of the Zscaler Security Fabric, UVM and Risk360 work together to provide not only visibility into your current state of risk and vulnerabilities but provides a comprehensive approach to improving your overall cyber security posture. In this Learning Path, you will learn how Zscaler's Security Fabric's tools can help your organization to prioritize your vulnerabilities, deduplicate your findings, help visualize your inventory and find potential gaps and finally quantify your security risks.
Learning Path

Zscaler

Zscaler is a secure access service edge (SASE) company providing zero trust security for cloud access.

133 Followers

At a glance

57Total
27Articles
7Blogs
7Labs
7Videos
3Events
3Learning Paths
2Case Studies
1Workshop
What's related
  • Security
  • Zscaler Zero Trust
  • Zscaler SASE
  • SASE
  • Zero Trust
  • Zscaler Data Protection
  • ATC
  • Cloud
  • Cloud Security
  • Network Security
  • Zscaler AI Security
  • Networking
  • AI Security
  • Cyber Range
  • Cybersecurity Risk & Strategy
  • Software Defined WAN (SD-WAN)
  • Zscaler Internet Access
  • Whole-of-state cybersecurity
  • Blog
  • Data Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies