Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Partners

Select a tab

What's popular

The AI Factory Revolution: Engineering Away Resource Contention with F5, NVIDIA & WWT

Artificial intelligence (AI) has created unprecedented demand for computing resources, causing strain on existing infrastructure and creating bottlenecks that limit business transformation. AI factories are large-scale infrastructure for organizations looking to harness AI capabilities while managing resource constraints. NVIDIA's AI capabilities, F5's application security and delivery solutions, and WWT's consulting expertise create a powerful solution.
Article
•Apr 11, 2025

Practical API Security: Discover, Defend, and Secure APIs from Code to Runtime

This lab provides a hands-on introduction to API security and visibility using F5 Distributed Cloud Web App and API Protection (XC WAAP). As APIs continue to grow in number and complexity, they have become a primary target for cyberattacks. This lab explores how to discover, document, and secure both known and shadow APIs using the platform's API Discovery, Schema Validation, and Security Dashboards. Participants will learn how to: Send traffic through the F5 HTTPS Load Balancer to trigger API Discovery and the API Crawler Automatically generate and maintain an API inventory, including undocumented shadow APIs Apply OpenAPI Schema Validation to enforce API conformity and detect anomalies Gain deep insights through advanced API Security Dashboards, including threat levels, sensitive data exposure, authentication status, and risk scores Understand the importance of integrating DevSecOps practices by leveraging IaC and GitHub Actions for API protection deployment By the end of this lab, users will gain critical visibility into their API ecosystem, identify vulnerabilities, and take actionable steps to secure both documented and undocumented APIs—helping to bring shadow APIs into the light.
Advanced Configuration Lab
5 launches

How to Secure Your Apps and APIs in the Cloud Without Compromising Speed

WWT + F5 can help you protect your organization while providing greater flexibility, agility, and scalability
Article
•Nov 2, 2023

Deploying and Securing Multi-Cloud and Edge Generative AI Workloads with F5 Distributed Cloud

In the current AI market, the demand for scalable and secure deployments is increasing. Public cloud providers (AWS, Google, and Microsoft) are competing to provide GenAI infrastructure, driving the need for multi-cloud and hybrid cloud deployments. However, distributed deployments come with challenges, including: Complexity in managing multi-cloud environments. Lack of unified visibility across clouds. Inconsistent security and policy enforcement. F5 Distributed Cloud provides a solution by offering a seamless, secure, and portable environment for GenAI workloads across clouds. This lab will guide you through setting up and securing GenAI applications with F5 Distributed Cloud on AWS EKS and GCP GKE.
Advanced Configuration Lab
11 launches

MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown

In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024

What's new

F5 Distributed Cloud WAF on Regional and App Connect Deployment Mode

F5 Distributed Cloud WAF deployed on Regional Edge and App Connect Deployment mode. This deployment model offers an optimal solution for scenarios where backend applications are inaccessible from the internet, lacking a Fully Qualified Domain Name (FQDN) or Public IP. In this case Customer Edge sites can be deployed to connect these "private" customer sites to the XC Global Network via IPSEC tunnels opened from Distributed Cloud Customer Edges to the closes two REs sites. Distributed Cloud WAF is deployed on the Regional Edges, where the services are being advertised to the Internet through anycast IPs. Customer Edges are being deployed on the customer sites and connect to the closest RE and traffic will be inspected by the WAAF security policy. The traffic will then be forwarded across the distributed cloud global network towards an egress Regional Edge and then over an IPSEC tunnel to the Customer edge site where it will be forwarded to the backend applications as pure IP-based traffic.
Advanced Configuration Lab
•19 launches

F5 Distributed Cloud (XC) Application Security with Terraform

In this lab, users will experience F5 Distributed Cloud Web App and API protection (WAAP), where organizations can simplify their path to effective security without sacrificing continued business innovation and customer demand. An API-driven approach to application protection enables improved collaboration between networks, security operations, and developers. This lab will use Terraform to deploy a Web App and API protection solution that protects an existing application
Advanced Configuration Lab
•25 launches

F5 Distributed Cloud WAF on Regional Deployment Mode

This WWT Lab will provide a hand on experience of F5 Distributed Cloud WAF deployed on Regional Edge in deployment mode. This deployment mode is better suited when protecting backend applications which are already public accessible from the internet via FQDN or Public IP. F5 Distributed Cloud WAF is deployed on the Regional Edges, where the services are being advertised to the internet through anycast IPs. The end users will connect to their closest Regional Edge and the traffic will be inspected by the WAF security policy. The traffic will then be forwarded across the XC Global Network towards an egress Regional Edge and then towards the customer site as regular internet traffic. The customer will filter the traffic, only allowing traffic forwarded by the XC platform.
Advanced Configuration Lab
•33 launches

Practical API Security: Discover, Defend, and Secure APIs from Code to Runtime

This lab provides a hands-on introduction to API security and visibility using F5 Distributed Cloud Web App and API Protection (XC WAAP). As APIs continue to grow in number and complexity, they have become a primary target for cyberattacks. This lab explores how to discover, document, and secure both known and shadow APIs using the platform's API Discovery, Schema Validation, and Security Dashboards. Participants will learn how to: Send traffic through the F5 HTTPS Load Balancer to trigger API Discovery and the API Crawler Automatically generate and maintain an API inventory, including undocumented shadow APIs Apply OpenAPI Schema Validation to enforce API conformity and detect anomalies Gain deep insights through advanced API Security Dashboards, including threat levels, sensitive data exposure, authentication status, and risk scores Understand the importance of integrating DevSecOps practices by leveraging IaC and GitHub Actions for API protection deployment By the end of this lab, users will gain critical visibility into their API ecosystem, identify vulnerabilities, and take actionable steps to secure both documented and undocumented APIs—helping to bring shadow APIs into the light.
Advanced Configuration Lab
•5 launches

The AI Factory Revolution: Engineering Away Resource Contention with F5, NVIDIA & WWT

Artificial intelligence (AI) has created unprecedented demand for computing resources, causing strain on existing infrastructure and creating bottlenecks that limit business transformation. AI factories are large-scale infrastructure for organizations looking to harness AI capabilities while managing resource constraints. NVIDIA's AI capabilities, F5's application security and delivery solutions, and WWT's consulting expertise create a powerful solution.
Article
•Apr 11, 2025

Modernizing DoD Infrastructure in the Face of Change

Massive investments in IT infrastructure will be needed for the DoD to effectively leverage AI, advanced cybersecurity measures and cloud adoption — all critical to mission readiness. However, these investments must consider talent shortages, technical debt and other operational challenges. Join WWT experts Chris Morgenstern, DoD Consulting Solutions Architect, and Tim Robinson, DoD Principal Solutions Architect, as they discuss modernizing DoD infrastructure in the face of change.
Video
•1:28
•Mar 18, 2025

Deploying and Securing Multi-Cloud and Edge Generative AI Workloads with F5 Distributed Cloud

In the current AI market, the demand for scalable and secure deployments is increasing. Public cloud providers (AWS, Google, and Microsoft) are competing to provide GenAI infrastructure, driving the need for multi-cloud and hybrid cloud deployments. However, distributed deployments come with challenges, including: Complexity in managing multi-cloud environments. Lack of unified visibility across clouds. Inconsistent security and policy enforcement. F5 Distributed Cloud provides a solution by offering a seamless, secure, and portable environment for GenAI workloads across clouds. This lab will guide you through setting up and securing GenAI applications with F5 Distributed Cloud on AWS EKS and GCP GKE.
Advanced Configuration Lab
•11 launches

Transform Application Delivery for AI Workloads with WWT and F5

The explosion of AI workloads requires more data processing capabilities than organizations have previously prepared for. Deploying cutting-edge AI is typically complex and expensive, which makes efficient and secure operations more important than ever. In this exclusive Partner Spotlight, you'll learn how WWT customers will experience improved data ingestion, GPU utilization, and user experiences, along with enhanced security control.
Webinar
•Mar 6, 2025 • 9am

The Grizzled CyberVet: State of Network Security

Network security has evolved rapidly, with the field now embracing zero trust, AI-driven defenses and integrated platforms. The next five years will see AI, SASE and quantum-resistant cryptography reshape the landscape. Enterprises must consolidate tools, adopt AI automation and prioritize identity-first security to stay ahead of increasingly sophisticated cyber threats. Secure your future now.
Blog
•Feb 18, 2025

The Cyber Window Episode 10: *SPM

In this episode of The Cyber Window, WWT Global Application Security Architect Matt Rose discusses the explosion in Security Posture Management solutions. What they are intended to do and how they relate to each other
Video
•4:29
•Feb 5, 2025

Speeding up Container Security with NVIDIA Blueprint: Accelerated Vulnerability Analysis

In the dynamic world of cybersecurity, the ability to swiftly and accurately analyze vulnerabilities is crucial. Traditional methods, often labor-intensive and time-consuming, struggle to keep up with the increasing volume and complexity of threats. The NVIDIA Vulnerability Analysis Blueprint offers a transformative solution, leveraging advanced AI technologies to redefine container security.
Blog
•Feb 3, 2025

Partner POV | How Akamai Strengthened Its Cybersecurity Portfolio With M&A

CEO Tom Leighton on How Edgio, Noname Deals Will Fuel Akamai's API Defense Strategy.
Video
•15:27
•Jan 23, 2025

Explore BIG-IP Next

F5 and WWT are partners in testing this next evolution of BIG-IP and providing valuable feedback that F5 is implementing to best serve our customers and make the update to BIG-IP Next seamless.
Video
•2:38
•Dec 18, 2024

Partner POV | The Year in Review 2024 by Akamai

Akamai has published State of the Internet (SOTI) reports — in-depth analyses of the latest cybersecurity research and trends that provide valuable insights into the evolving threat landscape and cybersecurity challenges faced by organizations worldwide.
Partner Contribution
•Dec 16, 2024

The Cyber Window Episode 9: SCA Remediation

In this episode of The Cyber Window, WWT Global Application Security Architect Matt Rose discusses new remediation capabilities being brought to market by SCA platforms. Want to know the benefits and potential issues with these capabilities then have a watch
Video
•4:24
•Dec 8, 2024

Cybersecurity Platforms vs. Point Solutions: Swiss Army Knives or Precision Tools?

This first article in a 5-part series explores the difference between cybersecurity platforms and point solutions. It explains how platforms offer unified, scalable protection while point solutions deliver specialized, best-in-class capabilities. Using simple analogies, it shows how these approaches tackle complex business challenges, setting the stage for deeper dives in upcoming articles.
Blog
•Dec 5, 2024

Deploy Customer Edge Mode in F5 Distributed Cloud (XC) with Application Hosted on GCP

Welcome to the F5 Distributed Cloud (XC) with Customer Edge Deployment mode This lab, presented by WWT and powered by F5 vesctl command line tool, will guide you through aspects of managing configuration within GCP, Kubernetes using F5 Distributed Cloud (XC) in Customer Edge deployment mode. This hands-on experience guides you through deploying a multi-cloud application across GCP, which is accessible via Private IP through an F5 By harnessing the capabilities of the F5 HTTPS Load Balancer, routing traffic within GCP environments privately.
Advanced Configuration Lab
•18 launches

Navigating the Future of Network Management with WWT & F5's BIG-IP Next

Today, many enterprise networking leaders face the seemingly daunting task of enhancing performance, security, and scalability while managing complex transitions. BIG-IP Next, along with WWT, offers a seamless solution that simplifies the journey through automation. The platform integrates application security and traffic management across diverse architectures, ensuring comprehensive coverage. WWT's vast lab resources and agnostic expert guidance provide invaluable support, making the shift straightforward.
Article
•Nov 14, 2024

MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown

In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024

The Cyber Window Episode 8: More is Better!!!

In this episode of The Cyber Window, WWT Global Application Security Architect Matt Rose talks about how multiple approaches to securing things like code, APIs and LLMs is much better than putting all your eggs in one basket. Risk and approaches to risk have many different variables so make sure you don't have tunnel vision when you look for risk.
Video
•5:03
•Nov 11, 2024

Application & API Security

As the industry shifts from monolithic to microservices-based applications, fortify your application and API landscapes against emerging threats and vulnerabilities.

21 Followers

At a glance

90Total
23Blogs
22Articles
20Videos
14Labs
5Events
3Briefings
1Case Study
1Learning Path
1Playlist
What's related
  • Security
  • F5
  • Cloud
  • Cloud Security
  • F5 Application Delivery Contollers
  • Blog
  • F5 Distributed Cloud
  • WWT Presents
  • AI Security
  • ATC
  • Networking
  • Application Delivery Controllers
  • Akamai
  • F5 Automation
  • Cybersecurity Risk & Strategy
  • Network Security
  • Application Services
  • F5 BIG-IP Next
  • AI & Data
  • Security Operations

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Cookies