Overview
Explore
Labs
Services
Events
Partners
Select a tab
27 results found
Modernizing DoD Infrastructure in the Face of Change
Massive investments in IT infrastructure will be needed for the DoD to effectively leverage AI, advanced cybersecurity measures and cloud adoption — all critical to mission readiness. However, these investments must consider talent shortages, technical debt and other operational challenges. Join WWT experts Chris Morgenstern, DoD Consulting Solutions Architect, and Tim Robinson, DoD Principal Solutions Architect, as they discuss modernizing DoD infrastructure in the face of change.
Video
•1:28
•Mar 18, 2025
Network Access Control- 802.1X Lightboard
Walk through how 802.1X works on a network. What role the supplicant, authenticator, and authentication server play in 802.1X. How to deploy 802.1X, and recommendations for EAP (Extensible Authentication Protocol) in a network.
Video
•12:23
•Apr 8, 2025
Partner POV | Google Distributed Cloud air-gapped: Cloud Innovation On-Premises and at the Edge
Google Distributed Cloud air-gapped delivers a fully managed cloud experience for organizations that require complete isolation to meet stringent sovereignty and regulatory requirements. It does not require connectivity to Google Cloud or the public internet and comes with many of our leading AI technologies, to increase the value of your data, while keeping it secure.
Video
•1:25
•Feb 10, 2025
Emerging and International Security Risk: Executive Perspectives
A rapidly evolving threat landscape is putting security leaders and their teams on their heels. Cyber attacks, AI, nation-state bad actors, regulatory changes — the list is growing by the day. Watch WWT's Vice President of Global Cybersecurity Chris Konrad as he hosts an executive discussion with Dave DeWalt (Founder and CEO of NightDragon), Rob Joyce (former Director of Cybersecurity for the NSA) and Kate Kuehn (WWT's Global Head of Cybersecurity Advocacy) as they explore strategies for government collaboration, board preparation and future cybersecurity challenges. They'll provide actionable advice for organizations to enhance their resilience against current and future cyber threats.
Video
•1:45
•Nov 19, 2024
Cisco Secure Cloud Control Lightboard Overview
Take a look at Cisco's new management tool that combines security controls for the cloud, services edge, applications, and large language models under a single view.
Video
•9:51
•Apr 8, 2025
Cisco Secure Edge (Umbrella) SIG Integration With Cisco SD-WAN
Cisco Secure Edge (formerly Umbrella) provides DNS-layer security, secure web gateway (SWG), cloud-delivered firewall, and cloud access security broker (CASB) in a single, cloud-native, security platform. Cisco Secure Edge can be seamlessly integrated into Cisco SD-WAN using feature and device templates in vManage. This integration with SD-WAN gives you the ability to rapidly deploy Umbrella SIG services to hundreds or thousands of remote office locations throughout the world. With Cisco Secure Edge and SD-WAN you can create a global scale secure access fabric that is highly available!
Video
•4:57
•May 29, 2023
Wiz Operating Platform Demo
Learn about Wiz's simply intuitive user interface, built on the Wiz Security graph.
Video
•10:12
•Oct 30, 2024
CheckPoint Harmony - Highest Level of Security for Remote Users
Check Point Harmony is the industry's first unified security solution for users, devices, and access, consolidating six products to provide uncompromised security and simplicity for everyone. It protects devices and internet connections from the most sophisticated attacks while ensuring Zero-Trust Access to corporate applications - all in a single solution that is easy to use, manage and buy. With Harmony, your users get the same level of protection regardless of where they are, the applications they access, or the devices they use.
Video
•1:54
•Aug 28, 2023
Veritas Data Security in the Cloud
Veritas provides powerful tools like role-based access control, multi-factor authentication, digital certificates, single sign-on and encryption for data in transit and at rest. With AI and machine learning you can monitor anomalous activity and report on threats. We provide reliable backup solutions that ensure full, immutable copies of your business-critical data can be restored quickly through any environment, at any scale.
Video
•2:02
•Jul 6, 2023
Is Your Data Secure in the Cloud?
Now that they're in the cloud, many organizations are asking whether their rush to migrate all workloads and applications was really best for the long-term success of the business. Cloud security plays a big part in that consideration. So, how should organizations think about this balancing act between "embracing everything cloud" vs "protecting their most valuable data"? Has the recent acceleration in cloud adoption changed the traditional function/role of security teams?
In this video, we identify what an ideal cloud security program looks like, why cloud developers are being asked to "shift left," and what steps leaders can take now to help cloud security enable the business and unlock the full value promised by investment in the cloud.
Video
•0:09
•Nov 12, 2024
AWS Inter-Regional With Direct Connect
AWS provides many options for inter-area connectivity to their resources. This video focuses on the AWS direct connect deployment that enables users to establish a direct, private connection between on-premises networks and AWS.
Video
•17:47
•Jan 24, 2025
Veritas Alta Data Protection
Veritas Alta Data Protection delivers the industry's broadcast protection for cloud workloads with AI-powered automation, flexible recovery options, cloud-native storage technology, and elastic infrastructure.
Video
•1:30
•Nov 17, 2023