Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Resources

Select a tab

What's popular

Zscaler Zero Trust Branch - Branch Connector and Airgap

In this lab, we will look at how the Zscaler Zero Trust Exchange unifies our ability to deploy a zero trust methodology. First we will take you on a tour of the working consoles that relate to Zscaler Branch Connector and Airgap technologies. We will view all the policies and rule sets that make up the Zscaler Internet Access and Zscaler Private Access giving our organization granular control over user and device access both internally (East-West traffic) and externally (North-South traffic). This is a read only lab and you will be able to try the access set up already and view all the Zscaler modules and their settings.
Advanced Configuration Lab
•56 launches

When AI Starts to Act on Its Own, Who's in Control?

As artificial intelligence moves from prediction to action, a new security frontier is taking shape. In this episode, Zscaler's Head of AI Innovation Phil Tee and WWT's VP of Global Cyber Chris Konrad explore the rise of autonomous agents, the evolution of Zero Trust and what it means to secure AI itself. From poisoned prompts to quantum threats, they warn the biggest risk isn't just deploying AI — it's trusting it. A sharp, real-world look at how enterprises can protect their future as machines begin to make decisions of their own.
Video
•0:57
Nov 5, 2025

Zscaler - Zero Trust Branch (ZTB) and Airgap

Zscaler, the leader in cloud security, brings together several of their technologies in their Zero Trust Exchange to implement, improve, and bolster your zero trust architecture (ZTA) within your organization. Utilizing their Zero Trust Exchange at the core of their technologies, it weave together secure internet access with Zscaler Internet Access (ZIA), private network access using Zscaler Private Access (ZPA) eliminating the need for traditional VPNs, data loss protection (DLP) and cloud access security broker (CASB) incorporated in Zscaler Data Protection, and network segmentation implementing Zscaler Airgap - their agentless micro-segmentation technology, all to reduce your attack surface and combining this all into a single enhanced platform. In this learning path, we are going to focus on our Zero Trust Branch and Airgap technologies and how they can together, improve your ZTA.
Learning Path

Partner POV | Securing GenAI for State and Local Governments

It's early February 2025, and a small municipal government is processing an influx of public records requests. The team, overwhelmed and understaffed, begins utilizing ChatGPT to summarize documents, pull relevant data, and expedite responses.
Partner Contribution
•Jan 5, 2026

Zscaler Unified Vulnerability Management & Risk360 - Powered by the Zscaler AI Data Security Fabric

With cyber threats coming from every direction, having your vulnerabilities regularly remediated and risks quantified is a necessary piece of your cyber security puzzle. With Zscaler's Unified Vulnerability Management (Avalor) and Risk360, you can do just that! As part of the tool set of the Zscaler Security Fabric, UVM and Risk360 work together to provide not only visibility into your current state of risk and vulnerabilities but provides a comprehensive approach to improving your overall cyber security posture. In this Learning Path, you will learn how Zscaler's Security Fabric's tools can help your organization to prioritize your vulnerabilities, deduplicate your findings, help visualize your inventory and find potential gaps and finally quantify your security risks.
Learning Path

What's new

Partner POV | Building Trust Through Identity: Addressing Security Challenges in Modern Healthcare

In healthcare, patients are always the priority. But behind the scenes, the quest to secure sensitive data while empowering clinicians remains a delicate balancing act.
Partner Contribution
•Jan 22, 2026

Partner POV | Securing GenAI for State and Local Governments

It's early February 2025, and a small municipal government is processing an influx of public records requests. The team, overwhelmed and understaffed, begins utilizing ChatGPT to summarize documents, pull relevant data, and expedite responses.
Partner Contribution
•Jan 5, 2026

Partner POV | Ransomware's Impact on the Public Sector in 2025

Ransomware attacks have entered a new phase in 2025—one defined by more target campaigns, extortion, and leverage.
Partner Contribution
•Jan 5, 2026

When AI Starts to Act on Its Own, Who's in Control?

As artificial intelligence moves from prediction to action, a new security frontier is taking shape. In this episode, Zscaler's Head of AI Innovation Phil Tee and WWT's VP of Global Cyber Chris Konrad explore the rise of autonomous agents, the evolution of Zero Trust and what it means to secure AI itself. From poisoned prompts to quantum threats, they warn the biggest risk isn't just deploying AI — it's trusting it. A sharp, real-world look at how enterprises can protect their future as machines begin to make decisions of their own.
Video
•0:57
•Nov 5, 2025

Zscaler - Zero Trust Branch (ZTB) and Airgap

Zscaler, the leader in cloud security, brings together several of their technologies in their Zero Trust Exchange to implement, improve, and bolster your zero trust architecture (ZTA) within your organization. Utilizing their Zero Trust Exchange at the core of their technologies, it weave together secure internet access with Zscaler Internet Access (ZIA), private network access using Zscaler Private Access (ZPA) eliminating the need for traditional VPNs, data loss protection (DLP) and cloud access security broker (CASB) incorporated in Zscaler Data Protection, and network segmentation implementing Zscaler Airgap - their agentless micro-segmentation technology, all to reduce your attack surface and combining this all into a single enhanced platform. In this learning path, we are going to focus on our Zero Trust Branch and Airgap technologies and how they can together, improve your ZTA.
Learning Path

Zscaler Zero Trust Branch - Branch Connector and Airgap

In this lab, we will look at how the Zscaler Zero Trust Exchange unifies our ability to deploy a zero trust methodology. First we will take you on a tour of the working consoles that relate to Zscaler Branch Connector and Airgap technologies. We will view all the policies and rule sets that make up the Zscaler Internet Access and Zscaler Private Access giving our organization granular control over user and device access both internally (East-West traffic) and externally (North-South traffic). This is a read only lab and you will be able to try the access set up already and view all the Zscaler modules and their settings.
Advanced Configuration Lab
•56 launches

Partner POV | AI-powered App Segmentation: Unlocking Zero Trust at Scale

Imagine a castle surrounded by strong stone walls and a deep moat designed to keep unwanted visitors out. The drawbridge is tightly guarded, and all of the focus is placed on making sure no one from the outside gets in. But what happens when someone crosses the bridge? Inside the castle walls, it's a free for all. There are no locked doors, no security for treasures, and no checks on where people roam. Similarly, in many IT environments, once a user connects to the network, they often gain broad access to applications and data, with little control over what happens inside.
Partner Contribution
•Aug 29, 2025

Zero Trust + AI: Accelerate Innovation With Security Built for the AI Era

AI powers innovation and drives efficiency—but also helps bad actors deliver more relentless and effective attacks. Companies need to rethink how they protect their private and public use of AI and how they defend against AI-powered attacks.
Video
•1:00
•Aug 4, 2025

Zscaler Unified Vulnerability Management & Risk360 - Powered by the Zscaler AI Data Security Fabric

With cyber threats coming from every direction, having your vulnerabilities regularly remediated and risks quantified is a necessary piece of your cyber security puzzle. With Zscaler's Unified Vulnerability Management (Avalor) and Risk360, you can do just that! As part of the tool set of the Zscaler Security Fabric, UVM and Risk360 work together to provide not only visibility into your current state of risk and vulnerabilities but provides a comprehensive approach to improving your overall cyber security posture. In this Learning Path, you will learn how Zscaler's Security Fabric's tools can help your organization to prioritize your vulnerabilities, deduplicate your findings, help visualize your inventory and find potential gaps and finally quantify your security risks.
Learning Path

Zscaler UVM & Risk360 - Powered by the Zscaler AI Data Security Fabric

Zscaler, the leader in cloud security, acquired Avalor in 2024 bringing it's Data Fabric for Security technology to it's already robust tool sets giving their users a comprehensive vulnerability management and remediation platform. In this lab you will learn the basics of the Unified Vulnerability Management module (UVM) giving you a baseline understanding of how to prioritizer your vulnerabilities, improve asset hygiene by identifying coverage and gaps, deduplicating findings, and streamlining remediations (getting it to the right teams). We'll also explore quantifying your cyber risks using Zscaler Risk360 module. Now let's get started!
Foundations Lab
•116 launches

Zenith Live 2025 Unveils Zscaler Agentic AI: Your Digital Kingdom's New Guardians

Zenith Live 2025 unveiled Zscaler's Agentic AI, transforming cybersecurity into a proactive, intelligent defense. With AI heroes like the Rogue, Paladin, Wizard, Cleric and Bard, this strategy combines autonomous systems with human ingenuity to protect digital realms. Which role do you believe is most vital in this AI-driven defense?
Blog
•Jul 8, 2025

Partner POV | Zero Trust is Reshaping Cyber Insurance by Reducing Risk

In an era where ransomware attacks continue to show the shortcomings of perimeter-based defenses, Zero Trust has proven itself as a game-changer for cyber insurance outcomes.
Partner Contribution
•Jul 1, 2025

Bringing Zero Trust to Life: Practical Innovations from Zscaler Zenith Live 2025

Zenith Live 2025 showcased how Zscaler delivers AI-powered tools that transform Zero Trust from strategy into action, offering advanced segmentation and protections to secure cloud, apps and devices while eliminating threats across complex environments
Blog
•Jun 9, 2025

Partner POV | AI-Driven Threat Detection: Revolutionizing Cyber Defense

Cyberthreats have evolved at an unprecedented pace, growing in both complexity and scale. Ransomware, phishing campaigns, and supply chain attacks have become more sophisticated, making traditional security measures feel sluggish and outdated. In today's digital landscape, where businesses operate across hybrid environments, real-time threat detection is no longer a luxury—it's a necessity.
Partner Contribution
•Apr 17, 2025

Partner POV | SASE and Zero Trust: Exploring Enterprise Security Strategies

Organizations worldwide have been eager to embrace remote work and cloud resources alongside their on-premises users and applications. Gartner projects that 74% of organizations will sustain remote or hybrid work permanently. Similarly, IDC reports that at least 80% of organizations will continue to embrace hybrid cloud environments in the long term.
Partner Contribution
•Apr 3, 2025

Zscaler Introduces a Game-changing Solution for Simplifying Zero Trust on LANs

As cyber threats continue to escalate, zero trust architectures that secure the entire attack surface, including Local Area Network (LAN) environments, are essential. With Zscaler's recent integration of Airgap Networks, WWT clients now have access to an agentless, identity-based segmentation solution that streamlines zero trust implementation across LAN environments. This important addition to the Zscaler suite reduces operational burdens, enhances security, and offers organizations a simplified, scalable approach to LAN security.
Article
•Dec 10, 2024

Partner POV | Zero Trust Branch: Say Goodbye to Lateral Threat Movement

Legacy network architectures were designed for a world where your employees were all in offices, and your applications were in data centers. We built and optimized private networks to connect branches and data centers using technologies like MPLS and site-to-site VPNs, and more recently SD-WAN, and secured the perimeter with firewalls — everything inside the network was trusted and everything outside was untrusted.
Partner Contribution
•Nov 25, 2024

Partner POV | SASE vs. Zero Trust: What's the Difference?

The world of cybersecurity, as with seemingly every area of tech, is rife with jargon and acronyms. Knowing the meaning of each is part of the battle, but then comes understanding how they fit together—or don't. In this blog post, we'll unpack two related, but distinct terms: zero trust and SASE.
Partner Contribution
•Nov 22, 2024

Partner POV | Zscaler vs. VPN: A Classic Battle

In a network security showdown, Zscaler Private Access (ZPA) battles legacy VPNs, proving true zero trust principles. Unlike VPNs, ZPA offers direct, secure app access without exposing the network. This article explores why ZPA is the modern, cloud-native solution for secure, efficient connectivity.
Partner Contribution
•Nov 19, 2024

Partner POV | Redefining Cyber Risk Quantification (CRQ) with Zscaler's Risk360

Risk360 is streamlined Cyber Risk Quantification solution that simplifies assessing potential financial losses and adverse impacts from cyber threats. With RIsk360, evaluate the likelihood of cyber incidents, their potential organizational impact, and the effectiveness of existing cybersecurity measures effortlessly. Prioritize investments and make informed decisions to manage and mitigate cyber risks effectively.
Video
•11:34
•Sep 6, 2024

Zscaler Zero Trust Exchange Platform

The Zscaler Zero Trust Exchange™ is a comprehensive, integrated platform that enables zero trust security and network transformation for all users, workloads, IoT/OT, and B2B partners.

3 Followers

At a glance

30Total
18Articles
5Videos
2Blogs
2Labs
2Learning Paths
1Case Study
What's related
  • Security
  • Zscaler
  • Zscaler SASE
  • Zero Trust
  • Zscaler Data Protection
  • SASE
  • Cybersecurity Risk & Strategy
  • Zscaler AI Security
  • AI Security
  • ATC
  • Public Sector
  • Zscaler Public Sector
  • AI & Data
  • Applied AI
  • Blog
  • Cloud
  • Cloud Security
  • Data Security
  • Network Security
  • State and Local Government

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies