Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

75 results found

Dell PowerProtect Data Manager Appliance: A Hands-on Review

Dell's first truly hyper converged backup appliance, the PowerProtect Data Manager Appliance, is an appliance that delivers on plug and play setup with a modern user interface backed by proven protection storage technology.
Article
•Jan 24, 2024

The Role of Data Governance in Security and Risk Management

Data governance is an integral component of a comprehensive security and risk management program. Here's why and some frameworks available to put into practice.
Article
•Jun 10, 2023

Partner POV | What is Data Security Posture Management (DSPM)?

Learn what data security posture management (DSPM) is and isn't, why it's important, how it works, and how to evaluate DSPM solutions.
Partner Contribution
•Aug 29, 2024

Why Rubrik and NetApp Are Better Together

An intelligent data management solution that can help lower operational latency during a business interruption.
Article
•Mar 1, 2023

8 Data Solution Trends for 2023 and Beyond

From digital twins to sustainable IT, these are eight trends our WWT data solutions experts are keeping their eyes on for 2023 and beyond.
Article
•Feb 27, 2023

Cohesity Gaia Brings GenAI to Backup Data—Securely

Cohesity Gaia enables organizations to make smarter and faster decisions securely and responsibly by bringing the power of retrieval-augmented generation (RAG) AI and large language modeling (LLM) to your backup enterprise data within Cohesity.
Article
•Dec 13, 2024

Partner POV | The Business Impact of Active Directory Outages: Real-World Costs

Active Directory outages can cripple businesses, leading to significant financial and reputational damage. A robust recovery strategy is essential to minimize downtime and ensure swift restoration.
Partner Contribution
•Oct 17, 2025

Partner POV | Ransomware with Early Threat Detection and Diversion

Learn how Commvault Cloud's Threatwise cyber deception helps spot and divert ransomware threats early, reducing the blast radius. Discover automated best practices for quicker threat detection and protection against evolving cyberattacks.
Partner Contribution
•Jan 22, 2024

Partner POV | AD Recovery Testing: How to Know Your Recovery Plan Will Actually Work

Frequent testing of Active Directory (AD) recovery plans is essential to ensure business continuity during outages. Simulating disaster scenarios, testing in isolated environments, and regularly updating plans help identify vulnerabilities and prevent extended downtime, security risks, and data loss.
Partner Contribution
•Oct 27, 2025

Partner POV | Identity Crisis: Why Business Resilience Starts with Authentication

Identity is now the critical battleground in cybersecurity, yet many organizations lack robust strategies for identity risk management and recovery. As identity becomes the primary attack surface, businesses must prioritize identity resilience to ensure operational continuity and trust restoration.
Partner Contribution
•Oct 13, 2025

Better Together: How Cohesity's Combination with Veritas Reshapes Enterprise Data Protection

For years, backup data was treated as a necessary insurance policy—something you hope you never need but can't afford to be without. Those days are over with the December 2024 combination of Cohesity and Veritas.
Article
•Oct 2, 2025

Deliver Maximum Business Agility with a Modern Approach to Cloud Data Backup

How to Determine the Best Way to Backup Your Data in the Cloud
Article
•Jul 24, 2024

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

905 Followers

At a glance

181Total
75Articles
33Videos
32Blogs
12Learning Paths
9Case Studies
8Events
7Labs
2Workshops
2WWT Research
1Assessment
What's related
  • Data Center
  • Security
  • Cohesity
  • Cyber Resilience
  • ATC
  • Commvault
  • Dell Tech
  • Blog
  • Rubrik
  • Cloud
  • AI & Data
  • Dell Data Protection
  • Cohesity Data Protection
  • Primary Storage
  • Cohesity Cyber Resilience
  • WWT Presents
  • Cloud Security
  • Data Security
  • Applied AI
  • Commvault Cyber Resilience

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies