Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

What's popular

Data Center Priorities for 2026

Key data center priorities to guide IT infrastructure modernization in 2026
WWT Research
•Oct 20, 2025

Visibility Before Velocity: Rethinking Infrastructure Refresh

A data center went down after a routine refresh. Not a cyberattack. Not a hardware defect. A power overload. A new rack of servers — installed without full visibility into what the system could actually support. That's how refresh projects fail today. Not from lack of budget or intent — but from blind spots between teams.
Video
•1:24
Mar 2, 2026

WWT and NetApp for Cyber Resilience - Secure Solutions for the Enterprise

In a world of evolving cyber threats, traditional disaster recovery is obsolete. NetApp and WWT together integrate security at the storage layer. Anticipate, withstand, recover and adapt to threats, transforming resilience into a strategic business advantage. Act now to protect your brand and revenue.
Blog
•Mar 4, 2026

Why Good Backups Don't Equal Cyber Resilience: The Case for Minimum Viability

AI-driven cyber attacks challenge traditional disaster recovery by targeting backups, forcing organizations to redefine resilience. As attackers grow more sophisticated, businesses must identify their "minimum viable company" to prioritize recovery. Cross-functional coordination, AI-enabled defenses, and regular practice in consequence-free environments are essential for effective cyber resilience.
Article
•Jan 28, 2026

When AI Starts to Act on Its Own, Who's in Control?

As artificial intelligence moves from prediction to action, a new security frontier is taking shape. In this episode, Zscaler's Head of AI Innovation Phil Tee and WWT's VP of Global Cyber Chris Konrad explore the rise of autonomous agents, the evolution of Zero Trust and what it means to secure AI itself. From poisoned prompts to quantum threats, they warn the biggest risk isn't just deploying AI — it's trusting it. A sharp, real-world look at how enterprises can protect their future as machines begin to make decisions of their own.
Video
•0:57
Nov 5, 2025

What's new

Building Cyber Resilience: Leveraging Cohesity's Advanced Data Protection Solutions

Join us for an insightful session on enhancing your organization's cyber resilience with Cohesity's advanced data protection solutions. This event will delve into strategies for safeguarding workloads against cyber threats, focusing on the integration of IT and security operations to deliver robust cyber resilience. Learn how Cohesity's unique approach can help your organization anticipate, withstand, and recover from cyber incidents, ensuring business continuity and data integrity.
Webinar
•Apr 2, 2026 • 9am

Partner POV | Now Generally Available: Rubrik and Everpure Cyber Visibility Integration

Rubrik and Pure Storage's integration revolutionizes cyber recovery by combining rapid snapshot restoration with robust threat detection. This seamless solution offers instant visibility and near-zero RTO recovery, eliminating the traditional trade-off between speed and security. Experience unparalleled data protection and resilience, available for deployment today.
Partner Contribution
•Mar 23, 2026
datacenter

Dataminr Redefines Cyber Defense with AI-Powered Client-Tailored Intelligence and Autonomous Threat and Exposure Management

Dataminr for Cyber Defense, the first unified solution from the acquisition of ThreatConnect, fuses real-time intelligence with detailed internal posture to contextualize, prioritize, and automate the entire threat management lifecycle.
News
•Mar 23, 2026

Unlocking Cyber Resilience: HPE Zerto Cyber Vault and Ransom Recovery

This event will delve into the critical aspects of cyber resilience, focusing on the HPE Zerto Cyber Vault's capabilities in combating ransomware threats. As cyberattacks grow in sophistication, enterprises need robust solutions to ensure rapid recovery and continuity. Our experts will explore how HPE Zerto's decentralized architecture and air-gapped recovery can dramatically reduce downtime and meet compliance needs. Attendees will gain insights into the architecture's core pillars and learn how to leverage these technologies to protect their organizations from the growing threat of ransomware.
Webinar
•Mar 19, 2026 • 9am

Rubrik Agent Cloud: End-to-End AI Agent Governance Overview

See Rubrik Agent Cloud in Action. Take back control of your AI and unleash agents without all the risk. Watch our short product walkthrough to learn how you can monitor your agents, govern their actions, and remediate their mistakes in minutes. Rubrik Agent Cloud enables your organizations to deliver AI transformation and deploy agents at scale with confidence.
Video
•2:57
•Mar 13, 2026

WWT and NetApp for Cyber Resilience - Secure Solutions for the Enterprise

In a world of evolving cyber threats, traditional disaster recovery is obsolete. NetApp and WWT together integrate security at the storage layer. Anticipate, withstand, recover and adapt to threats, transforming resilience into a strategic business advantage. Act now to protect your brand and revenue.
Blog
•Mar 4, 2026
ATC+

Exploring Veeam Kasten for Kubernetes

This lab introduces Veeam Kasten for Kubernetes, guiding learners through its interface, backup policy creation, and application restoration. Additionally, it explores blueprints and transform sets, equipping users with essential skills for efficient Kubernetes data management.
Foundations Lab
•Intermediate
•129 launches

Visibility Before Velocity: Rethinking Infrastructure Refresh

A data center went down after a routine refresh. Not a cyberattack. Not a hardware defect. A power overload. A new rack of servers — installed without full visibility into what the system could actually support. That's how refresh projects fail today. Not from lack of budget or intent — but from blind spots between teams.
Video
•1:24
•Mar 2, 2026

Commvault: Data Protection and Defense

This hands-on learning path introduces users to the foundational capabilities of Commvault. Learn about Commvault's scalable platform that ensures data security ad availability across all workloads and environments. By the end of this learning path, users will have a clear understanding of how to navigate Commvault, protect both virtual and physical workloads, and confidently perform essential data protection tasks in real-world environments.
Learning Path
•Fundamentals

Partner POV | Threat Protection with Cohesity Data Cloud

In this video, Shelly Calhoun Jones demonstrates Cohesity's latest threat protection enhancements in Cohesity Data Cloud.
Video
•6:36
•Feb 23, 2026

Partner POV | NetBackup DirectIO: Modernizing NetBackup with Cohesity Data Cloud

Enterprises today face escalating threats, expanding data estates, and growing operational complexity. To stay resilient, IT organizations must modernize their data protection without sacrificing the reliability of existing investments.
Partner Contribution
•Feb 23, 2026

Partner POV | NetBackup 11.1: Powering a new era of data resilience

Advancing data resilience, improving cloud agility, and simplifying data protection for modern enterprises like yours.
Partner Contribution
•Feb 23, 2026

Hands-on with Microsoft Group Policy

Maintaining security and managing user behavior in an enterprise environment is essential. Group Policy, a core feature of Microsoft Windows, allows administrators to enforce security and operational settings across the network. In this lab, you will implement group policies like strong password requirements, USB device restrictions, and automatic workstation locking to protect sensitive data.
Foundations Lab
•Fundamentals
•29 launches

Hands-on with Microsoft Active Directory

In this lab, you will set up a basic Active Directory environment to gain practical experience with directory services. The steps will include installing Active Directory, creating two Organizational Units (OUs)—one for users and one for groups—and setting up both a user account and a group account. To demonstrate group membership management, you will then add the user to the group. This lab is designed to help you build foundational skills for managing users and resources in a Windows Server environment.
Foundations Lab
•Fundamentals
•73 launches

Why Good Backups Don't Equal Cyber Resilience: The Case for Minimum Viability

AI-driven cyber attacks challenge traditional disaster recovery by targeting backups, forcing organizations to redefine resilience. As attackers grow more sophisticated, businesses must identify their "minimum viable company" to prioritize recovery. Cross-functional coordination, AI-enabled defenses, and regular practice in consequence-free environments are essential for effective cyber resilience.
Article
•Jan 28, 2026

Partner POV | AI in Commvault Cloud

Commvault's AI-driven platform, powered by Metallic® AI, revolutionizes data protection with machine learning and intelligent automation. By adhering to ethical AI standards, it enhances threat detection, risk management, and user experience.
Partner Contribution
•Jan 28, 2026

Partner POV | Data Rooms: Unlocking the Power of Trusted Data for AI Innovation

Commvault's Data Rooms transform backup data into AI-ready assets, bridging data protection and activation. This offering enables secure, policy-controlled data access for AI and analytics, enhancing innovation without increasing risk. By integrating with existing AI ecosystems, Data Rooms unlock historical intelligence, fostering responsible AI advancement and business growth.
Partner Contribution
•Jan 26, 2026

Rubrik: Leveled Up

Take your skills to the next level with this intermediate learning series with Rubrik, where you'll explore advanced OEM-specific data protection and cyber recovery strategies in depth.
Learning Series

Cyber Recovery with Rubrik

This learning series provides a strong foundation in cyber recovery, preparing users with the core knowledge they need before diving into OEM-specific and more advanced content. Get started with Rubrik Cyber Recovery!
Learning Series

Data Protection with Rubrik

This learning series provides a strong foundation in data protection, preparing users with the core knowledge they need before diving into OEM-specific and more advanced content. Get started with Rubrik Data Protection!
Learning Series

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

910 Followers

At a glance

148Total
53Articles
33Blogs
24Videos
10Learning Paths
9Case Studies
9Events
7Labs
2WWT Research
1Workshop
What's related
  • Data Center
  • Security
  • Cyber Resilience
  • ATC
  • Cohesity
  • Commvault
  • Blog
  • Rubrik
  • AI & Data
  • Cloud
  • Dell Tech
  • Cloud Security
  • Commvault Cyber Resilience
  • Data Security
  • Dell Data Protection
  • Applied AI
  • Primary Storage
  • Cohesity Data Protection
  • WWT Presents
  • AI Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies