Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

What's popular

🎤 MicDrop - Rubrik CTF

The MicDrop Capture the Flag (CTF) event will highlight Rubrik Security Cloud's (RSC) key features, helping customers understand how RSC provides cyber resiliency for their organizations. Features highlighted include: ✅ Data Protection – Back up and recover files, databases, and VMs to ensure data availability and ransomware resilience. ✅ Data Threat Analytics – Leverage IOCs, YARA rules, and hashes to detect and analyze potential threats. ✅ Cyber Recovery – Utilize automated, network-isolated recovery methods to restore operations securely and perform forensic analysis. ✅ Data Security Posture – Identify and monitor sensitive data exposure to improve security and compliance. ✅ Ruby - Rubrik's new generative AI assistant, your on-demand RSC expert This hands-on experience will provide insight into how these tools work together to protect, detect, and recover from cyber threats by demonstrating their value in an engaging CTF format using a real-world ransomware scenario.
Cyber Range
•May 15, 2025 • 10am

Data Center Priorities for 2025

A roadmap for what to prioritize in the data center space.
WWT Research
•Jan 1, 2025

Think Beyond Disaster: Driving Cyber Recovery in the Data Center | Research

As bad actors leverage AI to make ransomware attacks more prevalent and effective, data center operators and security leaders must move beyond traditional disaster recovery plans and think strategically about cyber recovery. Join WWT Cyber Resiliency Expert Michael Ambruso and Emerging AI and Cybersecurity Solutions Architect Todd Hathaway as they discuss ways in which you can optimize your data recovery plan when — not if — you fall victim to attack. Michael and Todd clarify the important difference between disaster and cyber recovery, dive into the role AI is playing in offense and defense, and offer guidance on how to best increase resiliency throughout your organization.
Webinar
Jul 24, 2024 • 9am

Doomsday Prep: How to Keep Your Business Alive During a Ransomware Attack

With 88 percent of organizations facing at least one ransomware attack annually, the focus must shift from just prevention to survival. The solution: Minimum Viable Recovery (MVR) — a practical approach to recovering just enough to keep the business running. This is about achieving Minimum Viable Business, not full restoration.
Blog
•Apr 30, 2025

Rubrik Cloud Data Management Essentials Lab

Rubrik is a cloud data management and data security platform that focuses on much more than data backups. This lab provides a foundational overview of basic configuration tasks, implementation of objects, protection and recovery of VMware Virtual Machines, and SQL Databases, as well as an overview of Rubrik Reporting using Rubrik Security Cloud.
Foundations Lab
592 launches

What's new

Partner POV | Threat and Data Classification Scanning with Cohesity

In this video, Shelly Calhoun-Jones, the Technical Marketing Director at Cohesity, introduces Threat and Data Classification Scanning in Cohesity Data Cloud and how it helps organizations respond faster to security events.
Video
•7:48
•May 19, 2025

Partner POV | Flexible deployment options coming for Cohesity Gaia

Our AI-powered conversational data assistant will soon be available as either a self-managed or a SaaS offering.
Partner Contribution
•May 19, 2025

Partner POV | Mastering Immutability, Air-Gapping, and Zero Trust for Unrivaled Cloud App Recovery

Commvault Cloud Rewind helps you bounce back quickly after disruptions
Partner Contribution
•May 18, 2025

🎤 MicDrop - Rubrik CTF

The MicDrop Capture the Flag (CTF) event will highlight Rubrik Security Cloud's (RSC) key features, helping customers understand how RSC provides cyber resiliency for their organizations. Features highlighted include: ✅ Data Protection – Back up and recover files, databases, and VMs to ensure data availability and ransomware resilience. ✅ Data Threat Analytics – Leverage IOCs, YARA rules, and hashes to detect and analyze potential threats. ✅ Cyber Recovery – Utilize automated, network-isolated recovery methods to restore operations securely and perform forensic analysis. ✅ Data Security Posture – Identify and monitor sensitive data exposure to improve security and compliance. ✅ Ruby - Rubrik's new generative AI assistant, your on-demand RSC expert This hands-on experience will provide insight into how these tools work together to protect, detect, and recover from cyber threats by demonstrating their value in an engaging CTF format using a real-world ransomware scenario.
Cyber Range
•May 15, 2025 • 10am

Commvault's New Directions and Announcements at SHIFT Event

Commvault's 'SHIFT' event unveiled a transformative approach to data protection, emphasizing continuous business resilience, AI-driven security and multicloud flexibility. Addressing cyber threats and compliance, the event highlighted the necessity of understanding business infrastructure for robust data management. Commvault's innovations promise to redefine the security landscape.
Blog
•May 7, 2025

Getting Started with Cohesity

This Learning Path will introduce you to the basic features and functionality of the Cohesity Data Platform. Learn about Cohesity DataProtect and how it simplifies the protection of your most critical assets.
Learning Path

Getting Started With Dell Data Protection

This Learning Path will introduce you to the basic features and functionality of the Dell Data Protection portfolio.
Learning Path

Getting Started With Veeam Data Protection

The Veeam Data Protection Fundamentals Learning Path provides an introduction to the Veeam Data Platform. Learn about the three pillars that Veeam builds from and go hands-on with Veeam Backup and Replication. This Learning Path covers the basic concepts and functions of Veeam and provides an overview of data protection fundamentals.
Learning Path

Partner POV | 4 Simple Ways to Help Stop Cyberattacks

Don't overlook these easy-to-implement best practices for data protection.
Partner Contribution
•May 5, 2025

Doomsday Prep: How to Keep Your Business Alive During a Ransomware Attack

With 88 percent of organizations facing at least one ransomware attack annually, the focus must shift from just prevention to survival. The solution: Minimum Viable Recovery (MVR) — a practical approach to recovering just enough to keep the business running. This is about achieving Minimum Viable Business, not full restoration.
Blog
•Apr 30, 2025

Commvault Data Management & Protection Essentials Lab

Commvault unifies data management and protects data at scale for all workloads across every environment. Whether on-prem, in the cloud, across multiple clouds or a hybrid environment, Commvault solves real customer challenges while enabling organizations to proactively simplify and manage the complexity and growth of enterprise data. This foundational lab gives an overview of the Commvault user interface, demonstrating the ease of protecting and recovering virtual and physical workloads, as well as databases.
Foundations Lab
•207 launches

Thoughts on Breaking Glass (in Case of Emergency) for Backup Systems

In a world of escalating cyber threats, the "break glass" account emerges as a crucial lifeline, enabling emergency access to backup systems when standard authentication fails. This strategy ensures business continuity and data recovery, safeguarding against catastrophic losses even when Identity and Access Management systems are compromised.
Blog
•Apr 16, 2025

Getting Started With Rubrik

The Rubrik Data Protection Fundamentals Learning Path will introduce you to the basic features and functionality of Rubrik. Learn about Rubrik's next-generation data management solution that goes beyond traditional data backups.
Learning Path

Rubrik Data Protection

For those with a foundational understanding of Rubrik, this Learning Path will explore how Rubrik protects specific workloads such as Kubernetes, M365, and Microsoft Azure. This Learning Path also introduces Rubrik's Continuous Data Protection and details how Rubrik uses SLA Domains to simplify data protection.
Learning Path

Getting Started With Commvault

This Learning Path will introduce you to the basic features and functionality of Commvault's data protection solutions. Learn about Commvault's scalable platform that ensures data security and availability across all workloads and environments.
Learning Path

Hyper-V - VM Creations Lab

In this lab, we will walk through the process of creating a Hyper-V virtual machine. The lab will guide you through selecting the VM's configuration, such as allocating memory, assigning virtual processors, and creating a virtual hard disk. We will then show how to choose the installation method, such as using an ISO image, to install the operating system.
Advanced Configuration Lab
•25 launches

Hands-On Lab Workshop: Protection of Kubernetes Containers with VEEAM

Join us for the Virtual Lab Workshop! During this exclusive session, the host will introduce the Protection of Kurbernetes Containers with VEEAM learning paths. This lab focuses on navigating the Veeam Kasten interface, creating a backup policy and restoring an application. Participants will also be introduced to blueprints and transform sets, providing a comprehensive understanding of protection strategies for Kubernetes environments. This lab aims to equip IT professionals with the foundational knowledge needed to manage and optimize Kubernetes container protection in real-world settings, emphasizing best practices and avoiding common pitfalls.
Webinar
•Mar 20, 2025 • 11am

Partner POV | Why the World's Most Sensitive Data is Protected by NetApp

Ransomware was long perceived as a victimless crime. While attacks on an organization's data led to unplanned downtime and unpredictable expenses, the organizations themselves took the bulk of the damage.
Partner Contribution
•Mar 19, 2025

Partner POV | Cohesity + Veritas: Creating the new leader in AI-powered data security

Sanjay Poonen, Cohesity CEO & President, explains why the new Cohesity is more committed than ever to its mission to protect, secure, and provide insights into the world's data.
Video
•4:27
•Mar 19, 2025

Partner POV | Cohesity + Veritas Open Letter to Customers

On December 10, 2024, Cohesity announced the completion of our combination with Veritas' enterprise data protection business, making Cohesity the world's largest data protection software provider by market share. To reiterate our "No Customer Left Behind" commitment, CEO Sanjay Poonen released the following open letter to customers.
Partner Contribution
•Mar 19, 2025

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

885 Followers

At a glance

170Total
69Articles
30Blogs
30Videos
11Learning Paths
10Labs
9Case Studies
7Events
2Workshops
1Assessment
1WWT Research
What's related
  • Data Center
  • Security
  • Cohesity
  • Cyber Resilience
  • Commvault
  • ATC
  • Cloud
  • Blog
  • Dell Tech
  • AI & Data
  • Cohesity Data Protection
  • Rubrik
  • Dell Data Protection
  • Primary Storage
  • Cloud Security
  • Cloud Data Management
  • Cohesity Cyber Resilience
  • WWT Presents
  • AI Solutions
  • Dell Public Sector

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Cookies