Overview
Explore
Labs
Services
Events
Partners
Select a tab
27 results found
Modernizing DoD Infrastructure in the Face of Change
Massive investments in IT infrastructure will be needed for the DoD to effectively leverage AI, advanced cybersecurity measures and cloud adoption — all critical to mission readiness. However, these investments must consider talent shortages, technical debt and other operational challenges. Join WWT experts Chris Morgenstern, DoD Consulting Solutions Architect, and Tim Robinson, DoD Principal Solutions Architect, as they discuss modernizing DoD infrastructure in the face of change.
Video
•1:28
•Mar 18, 2025
Emerging and International Security Risk: Executive Perspectives
A rapidly evolving threat landscape is putting security leaders and their teams on their heels. Cyber attacks, AI, nation-state bad actors, regulatory changes — the list is growing by the day. Watch WWT's Vice President of Global Cybersecurity Chris Konrad as he hosts an executive discussion with Dave DeWalt (Founder and CEO of NightDragon), Rob Joyce (former Director of Cybersecurity for the NSA) and Kate Kuehn (WWT's Global Head of Cybersecurity Advocacy) as they explore strategies for government collaboration, board preparation and future cybersecurity challenges. They'll provide actionable advice for organizations to enhance their resilience against current and future cyber threats.
Video
•1:45
•Nov 19, 2024
Partner POV | Google Distributed Cloud air-gapped: Cloud Innovation On-Premises and at the Edge
Google Distributed Cloud air-gapped delivers a fully managed cloud experience for organizations that require complete isolation to meet stringent sovereignty and regulatory requirements. It does not require connectivity to Google Cloud or the public internet and comes with many of our leading AI technologies, to increase the value of your data, while keeping it secure.
Video
•1:25
•Feb 10, 2025
Cisco Secure Cloud Control Lightboard Overview
Take a look at Cisco's new management tool that combines security controls for the cloud, services edge, applications, and large language models under a single view.
Video
•9:51
•Apr 8, 2025
Cisco Secure Edge (Umbrella) SIG Integration With Cisco SD-WAN
Cisco Secure Edge (formerly Umbrella) provides DNS-layer security, secure web gateway (SWG), cloud-delivered firewall, and cloud access security broker (CASB) in a single, cloud-native, security platform. Cisco Secure Edge can be seamlessly integrated into Cisco SD-WAN using feature and device templates in vManage. This integration with SD-WAN gives you the ability to rapidly deploy Umbrella SIG services to hundreds or thousands of remote office locations throughout the world. With Cisco Secure Edge and SD-WAN you can create a global scale secure access fabric that is highly available!
Video
•4:57
•May 29, 2023
AWS Inter-Regional With Direct Connect
AWS provides many options for inter-area connectivity to their resources. This video focuses on the AWS direct connect deployment that enables users to establish a direct, private connection between on-premises networks and AWS.
Video
•17:47
•Jan 24, 2025
Wiz Operating Platform Demo
Learn about Wiz's simply intuitive user interface, built on the Wiz Security graph.
Video
•10:12
•Oct 30, 2024
Azure VPN Gateway
Whether you're looking to connect your remote workers to your company's resources or create a hybrid cloud environment, the Azure VPN Gateway is an essential tool for any organization utilizing Azure services.
Video
•3:22
•Feb 20, 2023
CheckPoint Harmony - Highest Level of Security for Remote Users
Check Point Harmony is the industry's first unified security solution for users, devices, and access, consolidating six products to provide uncompromised security and simplicity for everyone. It protects devices and internet connections from the most sophisticated attacks while ensuring Zero-Trust Access to corporate applications - all in a single solution that is easy to use, manage and buy. With Harmony, your users get the same level of protection regardless of where they are, the applications they access, or the devices they use.
Video
•1:54
•Aug 28, 2023
CheckPoint CloudGuard Effective Risk Management - Focus on the Alerts that Matter
As cloud computing empowers developers and DevOps engineers, it becomes increasingly challenging for security teams to identify and prioritize risks. Don't let your cloud environment drown in alerts. Benefit from CloudGuard Effective Risk Management and focus on what's most important—ensuring the best security for your organization.
Video
•1:43
•Aug 28, 2023
Parter POV | Generative AI, Predictive AI and the CISO
Cloud Security Bootcamp 2024: AI in Cloud Security with Frank Dickson, Group VP of Security & Trust, IDC and presented by Sentinel One.
Video
•32:10
•Sep 26, 2024
Shift Left to Protect APIs with F5 | Partner Spotlight
APIs have become the backbone of modern digital interactions, connecting everything from morning coffee purchases to streaming services. But the rise of API-centric architectures has drastically expanded the attack surface -- over 90 percent of web-based cyberattacks are now targeting API endpoints, exploiting new vulnerabilities often overlooked by security teams – and rendered traditional security measures are no longer sufficient.
Join F5 Field CTO Chuck Herrin and WWT's Head of Global Cyber Strategy Traci Byrne as they talk about the urgent need for more dynamic and comprehensive defense strategies to prevent breaches. Chuck and Traci detail how security teams can "shift left" to better address API risks and vulnerabilities and outline practical steps security leaders can take to bolster their defenses.
Video
•0:39
•Aug 21, 2024