Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

What's popular

Data Center Priorities for 2026

Key data center priorities to guide IT infrastructure modernization in 2026
WWT Research
•Oct 20, 2025
cybersecurity

Cyber experts pinpoint what to look out for in 2026

Expect significant innovations in AI-driven cyber tools and a closer convergence between cybersecurity and geopolitics, they said.
News
•Dec 30, 2025

Why Good Backups Don't Equal Cyber Resilience: The Case for Minimum Viability

AI-driven cyber attacks challenge traditional disaster recovery by targeting backups, forcing organizations to redefine resilience. As attackers grow more sophisticated, businesses must identify their "minimum viable company" to prioritize recovery. Cross-functional coordination, AI-enabled defenses, and regular practice in consequence-free environments are essential for effective cyber resilience.
Article
•Jan 28, 2026

Data Protection: Ensuring Integrated NVIDIA AI Security at Scale

Learn how a data-centric, zero trust approach can fortify your organization's most valuable asset: Its data. With maturity models, AI-specific strategies and implementation best practices, this guide will help you build resilient, compliant and recovery-ready data protection across hybrid and high-performance environments.
WWT Research
•Jan 5, 2026

Getting Started With Rubrik

The Rubrik Data Protection Fundamentals Learning Path will introduce you to the basic features and functionality of Rubrik. Learn about Rubrik's next-generation data management solution that goes beyond traditional data backups.
Learning Path

What's new

Why Good Backups Don't Equal Cyber Resilience: The Case for Minimum Viability

AI-driven cyber attacks challenge traditional disaster recovery by targeting backups, forcing organizations to redefine resilience. As attackers grow more sophisticated, businesses must identify their "minimum viable company" to prioritize recovery. Cross-functional coordination, AI-enabled defenses, and regular practice in consequence-free environments are essential for effective cyber resilience.
Article
•Jan 28, 2026

Partner POV | AI in Commvault Cloud

Commvault's AI-driven platform, powered by Metallic® AI, revolutionizes data protection with machine learning and intelligent automation. By adhering to ethical AI standards, it enhances threat detection, risk management, and user experience.
Partner Contribution
•Jan 28, 2026

Partner POV | Data Rooms: Unlocking the Power of Trusted Data for AI Innovation

Commvault's Data Rooms transform backup data into AI-ready assets, bridging data protection and activation. This offering enables secure, policy-controlled data access for AI and analytics, enhancing innovation without increasing risk. By integrating with existing AI ecosystems, Data Rooms unlock historical intelligence, fostering responsible AI advancement and business growth.
Partner Contribution
•Jan 26, 2026

Rubrik: Leveled Up

Take your skills to the next level with this intermediate learning series with Rubrik, where you'll explore advanced OEM-specific data protection and cyber recovery strategies in depth.
Learning Series

Cyber Recovery with Rubrik

This learning series provides a strong foundation in cyber recovery, preparing users with the core knowledge they need before diving into OEM-specific and more advanced content. Get started with Rubrik Cyber Recovery!
Learning Series

Data Protection with Rubrik

This learning series provides a strong foundation in data protection, preparing users with the core knowledge they need before diving into OEM-specific and more advanced content. Get started with Rubrik Data Protection!
Learning Series

Rubrik: Build Your Foundation

This learning series provides a strong foundation in data protection and cyber recovery, preparing users with the core knowledge they need before diving into OEM-specific content. Get started with Rubrik!
Learning Series

Hyper-V - VM Creations Lab

In this lab, we will walk through the process of creating a Hyper-V virtual machine. The lab will guide you through selecting the VM's configuration, such as allocating memory, assigning virtual processors, and creating a virtual hard disk. We will then show how to choose the installation method, such as using an ISO image, to install the operating system.
Advanced Configuration Lab
•62 launches

Dell PowerProtect DD Virtual Edition Deployment and Configuration

Dell PowerProtect DD Virtual Edition (DDVE) is the software-defined data protection offering within the Dell PowerProtect DD Series. DDVE provides flexibility while maintaining all the core differentiating protection storage capabilities. This lab will demonstrate the deployment and initial configuration of a PowerProtect DD Virtual Edition instance within a VMware vSphere environment.
Advanced Configuration Lab
•56 launches

Pure Storage Demo: SQL DB Refresh from FlashArray to CBS

In this demo, we will show how easy and quick it is to refresh a DR instance of a SQL DB living in Azure on CBS from an on-premises Prod instance living in Equinix on a FlashArray.
Video
•7:56
•Jan 6, 2026

Data Protection: Ensuring Integrated NVIDIA AI Security at Scale

Learn how a data-centric, zero trust approach can fortify your organization's most valuable asset: Its data. With maturity models, AI-specific strategies and implementation best practices, this guide will help you build resilient, compliant and recovery-ready data protection across hybrid and high-performance environments.
WWT Research
•Jan 5, 2026
cybersecurity

Cyber experts pinpoint what to look out for in 2026

Expect significant innovations in AI-driven cyber tools and a closer convergence between cybersecurity and geopolitics, they said.
News
•Dec 30, 2025

F5 Distributed Cloud WAAP Use Cases Demo

Several of the fundamental principles of F5 Distributed Cloud (XC) are highlighted in this lab environment. You will be simulating a customer during the lab who needs to verify the safety of an application. The objective is to verify the applications safety of on-premises or application on cloud before and after enabling F5 Distributed Cloud Console WAAP Capabilities by sending attacks to the application.
Advanced Configuration Lab
•224 launches

Achieve OWASP Compliance Through BIG-IP AWAF

Systems are at higher risk without a concerted, repeatable application security configuration process. In this lab, you will learn how to build a declarative AWAF policy and achieve OWASP Top Ten (2021) compliance with the BIG-IP OWASP Compliance Dashboard. A complete CI/CD pipeline is used to deploy our AWAF policy to the BIG-IP system using Application Services 3 Extension (AS3) and Ansible.
Advanced Configuration Lab
•165 launches

Veeam Availability Suite Lab

This lab introduces Veeam Backup & Recovery, focusing on the protection of virtual machines running on VMware. Exercises include initial configuration, manual backup of a VM, and protection of VMs using tags.
Foundations Lab
•216 launches

Partner POV | RecoveryAgent: Precision Recover Through Intelligent Orchestration

RecoveryAgent streamlines the complexities of disaster and cyber recovery situations. Organizations can design blueprints that automate recovery workflows and mitigate the risks of data loss.
Video
•2:20
•Nov 14, 2025

When AI Starts to Act on Its Own, Who's in Control?

As artificial intelligence moves from prediction to action, a new security frontier is taking shape. In this episode, Zscaler's Head of AI Innovation Phil Tee and WWT's VP of Global Cyber Chris Konrad explore the rise of autonomous agents, the evolution of Zero Trust and what it means to secure AI itself. From poisoned prompts to quantum threats, they warn the biggest risk isn't just deploying AI — it's trusting it. A sharp, real-world look at how enterprises can protect their future as machines begin to make decisions of their own.
Video
•0:57
•Nov 5, 2025

Cyber Recovery and Data Protection

WWT's Dominic Greco discusses WWT's high level approach to Cyber Recovery and lessons to be learned in Cyber Recovery.
Video
•4:00
•Oct 29, 2025

Partner POV | Sovereign Data, Sovereign Access: Introducing Modern FIDO Authentication for SAS PCE

Thales' SAS PCE with FIDO authentication offers enterprises sovereign control over identity data, ensuring compliance and resilience. It provides phishing-resistant security, seamless access, and business continuity, addressing regulatory demands and operational challenges in hybrid environments. This strategic investment enhances security, compliance, and user experience, safeguarding data sovereignty and independence.
Partner Contribution
•Oct 28, 2025

Partner POV | AD Recovery Testing: How to Know Your Recovery Plan Will Actually Work

Frequent testing of Active Directory (AD) recovery plans is essential to ensure business continuity during outages. Simulating disaster scenarios, testing in isolated environments, and regularly updating plans help identify vulnerabilities and prevent extended downtime, security risks, and data loss.
Partner Contribution
•Oct 27, 2025

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

909 Followers

At a glance

145Total
52Articles
32Blogs
23Videos
12Learning Paths
9Case Studies
7Events
7Labs
2WWT Research
1Workshop
What's related
  • Data Center
  • Security
  • ATC
  • Cyber Resilience
  • Commvault
  • Cohesity
  • Blog
  • Dell Tech
  • Rubrik
  • Dell Data Protection
  • AI & Data
  • Cloud
  • Cloud Security
  • Commvault Cyber Resilience
  • Data Security
  • Applied AI
  • Primary Storage
  • Dell PowerProtect
  • AI Security
  • WWT Presents

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies