Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

52 results found

Why Good Backups Don't Equal Cyber Resilience: The Case for Minimum Viability

AI-driven cyber attacks challenge traditional disaster recovery by targeting backups, forcing organizations to redefine resilience. As attackers grow more sophisticated, businesses must identify their "minimum viable company" to prioritize recovery. Cross-functional coordination, AI-enabled defenses, and regular practice in consequence-free environments are essential for effective cyber resilience.
Article
•Jan 28, 2026

F5 Distributed Cloud SaaS: WAAP (Web App and API Protection)

Explore the Web App & API Protection (WAAP) capabilities of F5 Distributed Cloud platform.
Article
•Aug 16, 2024

Partner POV | Transforming Recovery Operations: Pure Storage and Commvault's Partnership in Cyber Resilience

Commvault, a global leader in cyber resilience, is both a trusted partner and customer of Pure Storage. The company leverages FlashBlade//S to protect its most critical workloads.
Partner Contribution
•Jun 27, 2025

Partner POV | What is Data Security Posture Management (DSPM)?

Learn what data security posture management (DSPM) is and isn't, why it's important, how it works, and how to evaluate DSPM solutions.
Partner Contribution
•Aug 29, 2024

Partner POV | 3 Ways to Leverage AI to Improve Your Data Security Posture

AI is often seen as a solution to cybersecurity challenges, but its effectiveness depends on proper implementation and management.
Partner Contribution
•Aug 26, 2024

Partner POV | Sovereign Data, Sovereign Access: Introducing Modern FIDO Authentication for SAS PCE

Thales' SAS PCE with FIDO authentication offers enterprises sovereign control over identity data, ensuring compliance and resilience. It provides phishing-resistant security, seamless access, and business continuity, addressing regulatory demands and operational challenges in hybrid environments. This strategic investment enhances security, compliance, and user experience, safeguarding data sovereignty and independence.
Partner Contribution
•Oct 28, 2025

Partner POV | When You Can't Prevent the Unpreventable, Your Recovery Strategy Must Start Before an Attack

In a world where cyberattacks are inevitable, Rubrik's Preemptive Recovery Engine shifts the focus from prevention to rapid recovery. By integrating continuous threat analysis and automated recovery, it ensures businesses can swiftly bounce back, safeguarding continuity and trust. Are you prepared to recover faster than your attackers can adapt?
Partner Contribution
•Aug 11, 2025

Partner POV | Announcing Amazon S3 Protection with Rubrik Security Cloud

We are very excited to announce that Rubrik Security Cloud is expanding its AWS coverage to now protect Amazon S3 as a supported workload
Partner Contribution
•Apr 24, 2024

Partner POV | Identity Crisis: Why Business Resilience Starts with Authentication

Identity is now the critical battleground in cybersecurity, yet many organizations lack robust strategies for identity risk management and recovery. As identity becomes the primary attack surface, businesses must prioritize identity resilience to ensure operational continuity and trust restoration.
Partner Contribution
•Oct 13, 2025

Partner POV | Modernizing Financial Cybersecurity: From Reactive to Resilient

In the high-stakes world of finance, cybersecurity is paramount. As cyber threats evolve, financial institutions must adopt advanced defenses, comply with stringent regulations, and maintain customer trust.
Partner Contribution
•Aug 14, 2025

Partner POV | Elevating Cyber Resilience in a Cloud-First World

Discover how Commvault's latest innovations, unveiled at the 2024 SHIFT event, are set to revolutionize the future of data protection.
Partner Contribution
•Nov 13, 2024

Partner POV | Data Rooms: Unlocking the Power of Trusted Data for AI Innovation

Commvault's Data Rooms transform backup data into AI-ready assets, bridging data protection and activation. This offering enables secure, policy-controlled data access for AI and analytics, enhancing innovation without increasing risk. By integrating with existing AI ecosystems, Data Rooms unlock historical intelligence, fostering responsible AI advancement and business growth.
Partner Contribution
•Jan 26, 2026

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

910 Followers

At a glance

148Total
52Articles
33Blogs
24Videos
12Learning Paths
9Case Studies
8Labs
7Events
2WWT Research
1Workshop
What's related
  • Data Center
  • Security
  • ATC
  • Cyber Resilience
  • Cohesity
  • Commvault
  • Blog
  • Dell Tech
  • Rubrik
  • AI & Data
  • Cloud
  • Dell Data Protection
  • Cloud Security
  • Data Security
  • Applied AI
  • Commvault Cyber Resilience
  • Primary Storage
  • Dell PowerProtect
  • AI Security
  • Cohesity Data Protection

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies