Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

What's popular

Data Center Priorities for 2025

A roadmap for what to prioritize in the data center space.
WWT Research
•Jan 1, 2025

Cohesity Essentials Lab

The Cohesity Essentials Lab enables users to learn the fundamental features and functionality of the Cohesity DataPlatform.
Foundations Lab
1089 launches

AI Security Strategy Accelerator

Generative Artificial Intelligence is revolutionizing the way we work. As use cases grow in scope and number in every enterprise organization worldwide, unique new attack surfaces and threats are also rising. But so are AI-based defense innovations. WWT's AI Security Strategy Accelerator service will provide you with a vision for fully optimizing your AI security capabilities.
Assessment

University Data Center: Optimize Space With Modern Performance and Scalability

After years of steady enrollment growth, a major university needed to transfer its data center to a smaller location to make room for additional student residences.
Case Study

Strengthening Business and Cyber Resilience: The WWT and NetApp Partnership

In today's rapidly evolving digital landscape, businesses require technology partners that bring innovation, security and agility to the forefront. The partnership between World Wide Technology (WWT) and NetApp exemplifies this synergy, delivering next-generation solutions that align with NetApp's four key pillars for FY26: Modernization, Cloud, Cybersecurity and AI.
Blog
•Jul 14, 2025

What's new

Are Your Backups Quantum Safe?

Quantum computing threatens current encryption, making backup data vulnerable to "Harvest Now, Decrypt Later" attacks. As quantum capabilities advance, attackers may decrypt stored data. Safeguarding backups with post-quantum cryptography and robust key management is crucial. Are your backups ready for the quantum era?
Blog
•Aug 28, 2025

Protect, Detect, Recover: An Intro to Cyber Recovery

The Cyber Recovery Fundamentals Learning Path provides a solid foundation in the concepts, technologies, and best practices that form the backbone of modern cyber resilience. You'll learn how cyber recovery fits into an organization's overall data protection strategy, explore common threat scenarios such as ransomware, and discover the essential tools and processes used to detect, isolate, and restore critical data. You'll gain the practical knowledge needed to understand and apply cyber recovery principles in real-world environments.
Learning Path

Protect What Matters: An Intro to Data Protection

This beginner-friendly course provides a clear and practical introduction to the world of data protection. Designed to lay the groundwork for understanding why protecting data is critical in today's digital landscape. Explore key concepts like backup, recovery, and security, and discover how these practices safeguard information against risks and support business continuity. Perfect for anyone looking to build a strong foundation before advancing into more complex data protection and cyber recovery topics.
Learning Path

Partner Case Study | Conagra Secures Its Supply Chain from Cyber Threats

Discover how Conagra keeps food production secure and resilient with Cohesity. From user error to cyber threats, Cohesity helps ensure uptime and data protection across Conagra's entire supply chain.
Video
•2:42
•Aug 26, 2025

Partner POV | Modernizing Financial Cybersecurity: From Reactive to Resilient

In the high-stakes world of finance, cybersecurity is paramount. As cyber threats evolve, financial institutions must adopt advanced defenses, comply with stringent regulations, and maintain customer trust.
Partner Contribution
•Aug 14, 2025

2025 Gartner Enterprise Backup Magic Quadrant Review

The enterprise backup and recovery market is rapidly evolving, with AI-driven automation and cyber resilience becoming essential. The 2025 Gartner Magic Quadrant highlights key vendor innovations, including Druva's SaaS breakthrough and Cohesity's strategic acquisition of Veritas. As security challenges grow, robust data protection strategies are crucial for business continuity. Here are WWT's thoughts about this landscape.
Blog
•Aug 13, 2025

Partner POV | When You Can't Prevent the Unpreventable, Your Recovery Strategy Must Start Before an Attack

In a world where cyberattacks are inevitable, Rubrik's Preemptive Recovery Engine shifts the focus from prevention to rapid recovery. By integrating continuous threat analysis and automated recovery, it ensures businesses can swiftly bounce back, safeguarding continuity and trust. Are you prepared to recover faster than your attackers can adapt?
Partner Contribution
•Aug 11, 2025

Getting started with Cohesity

This Learning Path introduces you to the core features and functionality of Cohesity Data Protection and Cyber Recovery solutions. Starting with the Cohesity Data Platform, you'll explore how Cohesity DataProtect simplifies the protection of your most critical assets. As you progress, you'll gain insights into how Cohesity strengthens your defense against ransomware and other threats through advanced capabilities like anomaly detection, one-click threat intelligence and scanning, cyber vaulting, and machine learning–powered data classification.
Learning Path

Partner POV | Embracing Comprehensive Endpoint Protection

Remote work and increasing cyber threats heighten the need for robust endpoint security. Commvault Cloud Backup & Recovery offers comprehensive, user-friendly protection for diverse devices, ensuring data safety and compliance. With advanced threat detection and seamless integration, it empowers organizations to safeguard operations and maintain peace of mind in a digital world.
Partner Contribution
•Aug 6, 2025

Cohesity + Veritas: Inside the Innovation Engine

6 months after the close of the Veritas acquisition, Cohesity CEO, Sanjay Poonen, gives an update on the innovations that have launched and some specifics about the joint product roadmap.
Video
•5:52
•Aug 5, 2025

Strengthening Business and Cyber Resilience: The WWT and NetApp Partnership

In today's rapidly evolving digital landscape, businesses require technology partners that bring innovation, security and agility to the forefront. The partnership between World Wide Technology (WWT) and NetApp exemplifies this synergy, delivering next-generation solutions that align with NetApp's four key pillars for FY26: Modernization, Cloud, Cybersecurity and AI.
Blog
•Jul 14, 2025

Wands at the Ready: Navigating Data Protection and Sovereignty

Welcome to the first installment of our three-part series on Data Sovereignty. In this post, we step into our "Magical Library" to demystify the crucial differences between Data Protection and Data Sovereignty, exploring why understanding these concepts is vital for safeguarding your organization's most sensitive information in an increasingly regulated world.
Blog
•Jul 8, 2025

Partner POV | Transforming Recovery Operations: Pure Storage and Commvault's Partnership in Cyber Resilience

Commvault, a global leader in cyber resilience, is both a trusted partner and customer of Pure Storage. The company leverages FlashBlade//S to protect its most critical workloads.
Partner Contribution
•Jun 27, 2025

Partner POV | Threat and Data Classification Scanning with Cohesity

In this video, Shelly Calhoun-Jones, the Technical Marketing Director at Cohesity, introduces Threat and Data Classification Scanning in Cohesity Data Cloud and how it helps organizations respond faster to security events.
Video
•7:48
•May 19, 2025

Partner POV | Flexible deployment options coming for Cohesity Gaia

Our AI-powered conversational data assistant will soon be available as either a self-managed or a SaaS offering.
Partner Contribution
•May 19, 2025

Partner POV | Mastering Immutability, Air-Gapping, and Zero Trust for Unrivaled Cloud App Recovery

Commvault Cloud Rewind helps you bounce back quickly after disruptions
Partner Contribution
•May 18, 2025

🎤 MicDrop - Rubrik CTF

The MicDrop Capture the Flag (CTF) event will highlight Rubrik Security Cloud's (RSC) key features, helping customers understand how RSC provides cyber resiliency for their organizations. Features highlighted include: ✅ Data Protection – Back up and recover files, databases, and VMs to ensure data availability and ransomware resilience. ✅ Data Threat Analytics – Leverage IOCs, YARA rules, and hashes to detect and analyze potential threats. ✅ Cyber Recovery – Utilize automated, network-isolated recovery methods to restore operations securely and perform forensic analysis. ✅ Data Security Posture – Identify and monitor sensitive data exposure to improve security and compliance. ✅ Ruby - Rubrik's new generative AI assistant, your on-demand RSC expert This hands-on experience will provide insight into how these tools work together to protect, detect, and recover from cyber threats by demonstrating their value in an engaging CTF format using a real-world ransomware scenario.
Cyber Range
•May 15, 2025 • 10am

Commvault's New Directions and Announcements at SHIFT Event

Commvault's 'SHIFT' event unveiled a transformative approach to data protection, emphasizing continuous business resilience, AI-driven security and multicloud flexibility. Addressing cyber threats and compliance, the event highlighted the necessity of understanding business infrastructure for robust data management. Commvault's innovations promise to redefine the security landscape.
Blog
•May 7, 2025

Getting Started With Dell Data Protection

This Learning Path will introduce you to the basic features and functionality of the Dell Data Protection portfolio.
Learning Path

Getting Started With Veeam Data Protection

The Veeam Data Protection Fundamentals Learning Path provides an introduction to the Veeam Data Platform. Learn about the three pillars that Veeam builds from and go hands-on with Veeam Backup and Replication. This Learning Path covers the basic concepts and functions of Veeam and provides an overview of data protection fundamentals.
Learning Path

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

895 Followers

At a glance

173Total
70Articles
32Blogs
32Videos
12Learning Paths
9Case Studies
7Events
7Labs
2Workshops
1Assessment
1WWT Research
What's related
  • Data Center
  • Security
  • Cohesity
  • Cyber Resilience
  • Commvault
  • ATC
  • Blog
  • Dell Tech
  • Cloud
  • AI & Data
  • Rubrik
  • Cohesity Data Protection
  • Dell Data Protection
  • Primary Storage
  • Cloud Security
  • Cohesity Cyber Resilience
  • WWT Presents
  • Applied AI
  • Dell Public Sector
  • AI Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies