Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

27 results found

Cisco Secure Cloud Control Lightboard Overview

Take a look at Cisco's new management tool that combines security controls for the cloud, services edge, applications, and large language models under a single view.
Video
•9:51
•Apr 8, 2025

Emerging and International Security Risk: Executive Perspectives

A rapidly evolving threat landscape is putting security leaders and their teams on their heels. Cyber attacks, AI, nation-state bad actors, regulatory changes — the list is growing by the day. Watch WWT's Vice President of Global Cybersecurity Chris Konrad as he hosts an executive discussion with Dave DeWalt (Founder and CEO of NightDragon), Rob Joyce (former Director of Cybersecurity for the NSA) and Kate Kuehn (WWT's Global Head of Cybersecurity Advocacy) as they explore strategies for government collaboration, board preparation and future cybersecurity challenges. They'll provide actionable advice for organizations to enhance their resilience against current and future cyber threats.​
Video
•1:45
•Nov 19, 2024

Is Your Data Secure in the Cloud?

Now that they're in the cloud, many organizations are asking whether their rush to migrate all workloads and applications was really best for the long-term success of the business. Cloud security plays a big part in that consideration. So, how should organizations think about this balancing act between "embracing everything cloud" vs "protecting their most valuable data"? Has the recent acceleration in cloud adoption changed the traditional function/role of security teams? In this video, we identify what an ideal cloud security program looks like, why cloud developers are being asked to "shift left," and what steps leaders can take now to help cloud security enable the business and unlock the full value promised by investment in the cloud.
Video
•0:09
•Nov 12, 2024

Modernizing DoD Infrastructure in the Face of Change

Massive investments in IT infrastructure will be needed for the DoD to effectively leverage AI, advanced cybersecurity measures and cloud adoption — all critical to mission readiness. However, these investments must consider talent shortages, technical debt and other operational challenges. Join WWT experts Chris Morgenstern, DoD Consulting Solutions Architect, and Tim Robinson, DoD Principal Solutions Architect, as they discuss modernizing DoD infrastructure in the face of change.
Video
•1:28
•Mar 18, 2025

Cisco Secure Edge (Umbrella) SIG Integration With Cisco SD-WAN

Cisco Secure Edge (formerly Umbrella) provides DNS-layer security, secure web gateway (SWG), cloud-delivered firewall, and cloud access security broker (CASB) in a single, cloud-native, security platform. Cisco Secure Edge can be seamlessly integrated into Cisco SD-WAN using feature and device templates in vManage. This integration with SD-WAN gives you the ability to rapidly deploy Umbrella SIG services to hundreds or thousands of remote office locations throughout the world. With Cisco Secure Edge and SD-WAN you can create a global scale secure access fabric that is highly available!
Video
•4:57
•May 29, 2023

SentinelOne's Singularity Cloud Security Overview

Blocking an Attack in Under One Minute
Video
•1:39
•Sep 9, 2025

Partner POV | Google Distributed Cloud air-gapped: Cloud Innovation On-Premises and at the Edge

Google Distributed Cloud air-gapped delivers a fully managed cloud experience for organizations that require complete isolation to meet stringent sovereignty and regulatory requirements. It does not require connectivity to Google Cloud or the public internet and comes with many of our leading AI technologies, to increase the value of your data, while keeping it secure.
Video
•1:25
•Feb 10, 2025

Network Access Control- 802.1X Lightboard

Walk through how 802.1X works on a network. What role the supplicant, authenticator, and authentication server play in 802.1X. How to deploy 802.1X, and recommendations for EAP (Extensible Authentication Protocol) in a network.
Video
•12:23
•Apr 8, 2025

CheckPoint Harmony - Highest Level of Security for Remote Users

Check Point Harmony is the industry's first unified security solution for users, devices, and access, consolidating six products to provide uncompromised security and simplicity for everyone. It protects devices and internet connections from the most sophisticated attacks while ensuring Zero-Trust Access to corporate applications - all in a single solution that is easy to use, manage and buy. With Harmony, your users get the same level of protection regardless of where they are, the applications they access, or the devices they use.
Video
•1:54
•Aug 28, 2023

Protecting Businesses from Ransomware

Ransomware is a critical issue affecting organization's internal security and data protection. It has become much more pronounced in recent years. WWT's Dominic Greco and Tim Schaap review the importance of Cyber Resiliency and Disaster Recovery toward protecting against Ransomware attacks.
Video
•7:21
•Apr 30, 2025

Azure VPN Gateway

Whether you're looking to connect your remote workers to your company's resources or create a hybrid cloud environment, the Azure VPN Gateway is an essential tool for any organization utilizing Azure services.
Video
•3:22
•Feb 20, 2023

Wiz Operating Platform Demo

Learn about Wiz's simply intuitive user interface, built on the Wiz Security graph.
Video
•10:12
•Oct 30, 2024

Cloud Security

Defending valuable data and digital assets against existing and emerging cyber threats, human error and insider threats.

1147 Followers

At a glance

173Total
49Articles
46Blogs
27Videos
17Labs
9Learning Paths
7Case Studies
6Events
4Assessments
4Workshops
2Briefings
1Playlist
1WWT Research
What's related
  • Cloud
  • Security
  • Blog
  • Network Security
  • ATC
  • Cloud Strategy and Adoption
  • Cybersecurity Risk & Strategy
  • Application & API Security
  • Security Operations
  • AWS
  • Cisco
  • F5
  • Networking
  • Wiz
  • Cloud Networking
  • Data Security
  • Automation
  • Microsoft
  • Endpoint Security
  • F5 Application Delivery Contollers

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies