Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

52 results found

Why Good Backups Don't Equal Cyber Resilience: The Case for Minimum Viability

AI-driven cyber attacks challenge traditional disaster recovery by targeting backups, forcing organizations to redefine resilience. As attackers grow more sophisticated, businesses must identify their "minimum viable company" to prioritize recovery. Cross-functional coordination, AI-enabled defenses, and regular practice in consequence-free environments are essential for effective cyber resilience.
Article
•Jan 28, 2026

F5 Distributed Cloud SaaS: WAAP (Web App and API Protection)

Explore the Web App & API Protection (WAAP) capabilities of F5 Distributed Cloud platform.
Article
•Aug 16, 2024

Better Together: How Cohesity's Combination with Veritas Reshapes Enterprise Data Protection

For years, backup data was treated as a necessary insurance policy—something you hope you never need but can't afford to be without. Those days are over with the December 2024 combination of Cohesity and Veritas.
Article
•Oct 2, 2025

Partner POV | What is Data Security Posture Management (DSPM)?

Learn what data security posture management (DSPM) is and isn't, why it's important, how it works, and how to evaluate DSPM solutions.
Partner Contribution
•Aug 29, 2024

Partner POV | Sovereign Data, Sovereign Access: Introducing Modern FIDO Authentication for SAS PCE

Thales' SAS PCE with FIDO authentication offers enterprises sovereign control over identity data, ensuring compliance and resilience. It provides phishing-resistant security, seamless access, and business continuity, addressing regulatory demands and operational challenges in hybrid environments. This strategic investment enhances security, compliance, and user experience, safeguarding data sovereignty and independence.
Partner Contribution
•Oct 28, 2025

Cohesity Gaia Brings GenAI to Backup Data—Securely

Cohesity Gaia enables organizations to make smarter and faster decisions securely and responsibly by bringing the power of retrieval-augmented generation (RAG) AI and large language modeling (LLM) to your backup enterprise data within Cohesity.
Article
•Dec 13, 2024

Partner POV | Transforming Recovery Operations: Pure Storage and Commvault's Partnership in Cyber Resilience

Commvault, a global leader in cyber resilience, is both a trusted partner and customer of Pure Storage. The company leverages FlashBlade//S to protect its most critical workloads.
Partner Contribution
•Jun 27, 2025

Partner POV | Introducing the Power of Commvault® Cleanroom™ Recovery: Beyond a Secure Space

When it comes to cyber recovery, a cleanroom, also known as an Isolated Recovery Environment (IRE), is known for providing security and cleanliness. However, a true and proven cleanroom concept goes beyond its physical attributes. It embodies a comprehensive approach to cyber recovery, combining a secure, independent environment with precise planning, established processes, diligent testing, and well-defined procedures.
Partner Contribution
•Jul 29, 2024

Partner POV | Identity Crisis: Why Business Resilience Starts with Authentication

Identity is now the critical battleground in cybersecurity, yet many organizations lack robust strategies for identity risk management and recovery. As identity becomes the primary attack surface, businesses must prioritize identity resilience to ensure operational continuity and trust restoration.
Partner Contribution
•Oct 13, 2025

Partner POV | 4 Simple Ways to Help Stop Cyberattacks

Don't overlook these easy-to-implement best practices for data protection.
Partner Contribution
•May 5, 2025

Partner POV | Data Theft in Salesforce: Manipulating Public Links

Varonis Threat Labs uncovered a vulnerability in Salesforce's public link feature that threat actors could exploit to retrieve sensitive data.
Partner Contribution
•Nov 14, 2024

Partner POV | A Ransomware attack is only the beginning

This blog highlights 4 steps for response and recovery: secure perimeter, assess damage, avoid negligence, and transparently communicate with stakeholders.
Partner Contribution
•Apr 24, 2024

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

909 Followers

At a glance

145Total
52Articles
32Blogs
23Videos
12Learning Paths
9Case Studies
7Events
7Labs
2WWT Research
1Workshop
What's related
  • Data Center
  • Security
  • ATC
  • Cyber Resilience
  • Commvault
  • Cohesity
  • Blog
  • Dell Tech
  • Rubrik
  • Dell Data Protection
  • AI & Data
  • Cloud
  • Cloud Security
  • Commvault Cyber Resilience
  • Data Security
  • Applied AI
  • Primary Storage
  • Dell PowerProtect
  • AI Security
  • WWT Presents

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies