Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

What's new

Zero Trust Identity: Conditional Access

Module 3 focuses on advanced Zero Trust Identity. It reviews the concept of Conditional Access to enforce "if/then" privilege through stipulations like network location, device compliance, and Identity Governance. Entra Conditional Access provides the core concepts of Assume Breach of core Zero Trust.
Video
•9:21
•Sep 8, 2025

Bringing Zero Trust to Life With Microsoft

Zero Trust is not a product, but a strategic approach to security. Still, viewing these principles through a vendor's solutions — like Microsoft's — makes them much easier to apply. Microsoft's tools map directly to the seven core pillars of modern Zero Trust. Here's how each pillar is addressed with Microsoft technologies that help bring each concept to life.
Blog
•Jul 16, 2025

The Importance of Modernizing Active Directory

In the realm of enterprise IT, Active Directory (AD) has long been the go-to identity platform for managing access, identities and security policies. As the digital landscape evolves, so too do the complexity and demands placed on AD. Modernization is not just about keeping pace with technological advancements, but ensuring the backbone of enterprise IT infrastructure remains robust, flexible and secure.
Blog
•Jul 22, 2024

Active Directory Strategy Accelerator

WWT's Active Directory Strategy Accelerator develops a plan to modernize and mature active directory. Jump in with our experts as we prepare you to mature Active Directory, covering mergers, acquisitions, divestitures, rebranding, security hardening or modernizing to support new identity requirements.
Assessment

Microsoft Active Directory

Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services

At a glance

4Total
2Blogs
1Assessment
1Video
What's related
  • Microsoft
  • Security
  • Blog
  • Identity and Access Management
  • Microsoft Azure
  • Digital Workspace
  • End-User Computing
  • Microsoft Defender Advanced Threat Protection
  • Zero Trust

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies