Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore

Select a tab

Validate Cisco Secure Access Across Branch, Remote, and Cloud—Without the Build Time

 

Cisco Secure Access Lab is dedicated to maintaining a complicated environment with Catalyst SD-WAN, SASE, and Cisco Secure Access across a Data Center, Branch, remote, and cloud presence. 

This environment is set aside for Cisco and WWT customer use to help accelerate POC's, test new features, and serve as a proof of concept for Cisco Secure Access.

 

Cisco Secure Access Lab as a Service (LaaS) Environment

Use Cases for Cisco Secure Access LaaS

  • Streamline testing for WWT customers with an already built and available lab environment
  • Test New CSA functionality in an independent testing environment
  • Continue to have direct testing for the latest SSE tests our team develops
  • Test integrations across LAN, WAN, SaaS and Cloud solutions
  • Utilize the environment for further tie-ins from other Cisco products like ISE, NGFW/HFM, or Meraki

How to Request

Having most of the plumbing in place is a great way to cut costs for an ATC engagement, and it also shortens or eliminates the build time all together. Please reach out to Brian Gibbs, Drew Kaiser, or Brian Sak (Cisco) with an opportunity that you would like to see this lab utilized for. We'll scope and approve access for this lab, or tie this into a larger PoC with added requirements as needed by the customer. 

Brian Gibbs
Drew Kaiser

Get hands-on with our on-demand lab

Cisco Secure Access

The Cisco Secure Access lab is your chance to get your hands on Cisco's SSE solution. During this lab, you will look at data loss prevention, unified policy, zero trust, and the benefits of quick udp internet connection. Get started today!
Guided Demonstration Lab
•160 launches

Connect with our Cisco Secure Access LaaS experts

Drew KaiserPrincipal Solutions Architect
Brian GibbsMgr, Practice

Cisco Secure Access Lab as a Service (LaaS)

Cisco Secure Access Lab as a Service (LaaS) is dedicated to maintaining a complicated environment with Catalyst SD-WAN, SASE, and Cisco Secure Access across a data center, branch, remote, and cloud presence.

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies