Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

32 results found

2025 Gartner Enterprise Backup Magic Quadrant Review

The enterprise backup and recovery market is rapidly evolving, with AI-driven automation and cyber resilience becoming essential. The 2025 Gartner Magic Quadrant highlights key vendor innovations, including Druva's SaaS breakthrough and Cohesity's strategic acquisition of Veritas. As security challenges grow, robust data protection strategies are crucial for business continuity. Here are WWT's thoughts about this landscape.
Blog
•Aug 13, 2025

Commvault and Dell PowerProtect DD - Better Together

Commvault and Dell Technologies have partnered to provide customers with enhanced, API level integration between Commvault's Backup & Recovery software and Dell's data protection storage hardware products. Commvault is integrating Dell DD Boost backup protocol into their software stack, allowing Commvault users to write directly to Dell PowerProtect DD (PPDD) series appliances using the appliances' native protocol.
Blog
•Jun 11, 2024

Are Your Backups Quantum Safe?

Quantum computing threatens current encryption, making backup data vulnerable to "Harvest Now, Decrypt Later" attacks. As quantum capabilities advance, attackers may decrypt stored data. Safeguarding backups with post-quantum cryptography and robust key management is crucial. Are your backups ready for the quantum era?
Blog
•Aug 28, 2025

Cyber Resilience - A Holistic Approach

A holistic approach to a cyber resilience program is essential, emphasizing both recovery and cybersecurity posture to minimize the impact and reduce the recovery scope after a cyber event.
Blog
•Aug 14, 2024

Setting RPO and RTO Based on Risk

Assigning RPO (Recovery Point Objective) and RTO (Recovery Time Objective) based on risk analysis ensures optimal data protection and business continuity. Critical systems require shorter RPO and RTO, balancing cost and risk. This strategic approach minimizes downtime and data loss, safeguarding operations against disasters and cyber threats.
Blog
•Feb 20, 2025

Thoughts on Backup Retention

Learn more about the merits of keeping backup retention as short as needed to provide recovery ability and keep solutions cost low.
Blog
•Jul 1, 2024

Strengthening Business and Cyber Resilience: The WWT and NetApp Partnership

In today's rapidly evolving digital landscape, businesses require technology partners that bring innovation, security and agility to the forefront. The partnership between World Wide Technology (WWT) and NetApp exemplifies this synergy, delivering next-generation solutions that align with NetApp's four key pillars for FY26: Modernization, Cloud, Cybersecurity and AI.
Blog
•Jul 14, 2025

Wands at the Ready: Navigating Data Protection and Sovereignty

Welcome to the first installment of our three-part series on Data Sovereignty. In this post, we step into our "Magical Library" to demystify the crucial differences between Data Protection and Data Sovereignty, exploring why understanding these concepts is vital for safeguarding your organization's most sensitive information in an increasingly regulated world.
Blog
•Jul 8, 2025

Thoughts on Breaking Glass (in Case of Emergency) for Backup Systems

In a world of escalating cyber threats, the "break glass" account emerges as a crucial lifeline, enabling emergency access to backup systems when standard authentication fails. This strategy ensures business continuity and data recovery, safeguarding against catastrophic losses even when Identity and Access Management systems are compromised.
Blog
•Apr 16, 2025

Secure All Together – Think About "The 3 R's"

In today's digital age, it is crucial to prioritize cybersecurity and focus on the three key areas of risk, resilience and recovery. By evaluating and mitigating risks, building resilience and having a well-defined recovery plan, organizations can enhance their security and ensure business continuity. Collaboration and embracing these principles can create a safer digital world.
Blog
•Aug 8, 2024

Immutable Backup Strategy and the Journey to Cyber Resilience

Immutable backups are a key part of data protection strategy, cyber vaults, and the acceleration to mature cyber resilience.
Blog
•Jun 3, 2024

Veritas Alta Data Protection Powered by Cloud Scale Technology

Many clients are and have been moving to cloud service providers to take advantage of the flexibility and scalability that they offer. As IT evolves and adopts these new cloud technologies and platforms it becomes critical that the data protection strategy being used for cloud assets is equally versatile.
Blog
•Dec 17, 2023

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

908 Followers

At a glance

146Total
52Articles
32Blogs
25Videos
12Learning Paths
9Case Studies
7Events
6Labs
2WWT Research
1Workshop
What's related
  • Data Center
  • Security
  • ATC
  • Cyber Resilience
  • Cohesity
  • Commvault
  • Blog
  • Dell Tech
  • Rubrik
  • Dell Data Protection
  • Cloud
  • AI & Data
  • Cloud Security
  • Data Security
  • WWT Presents
  • Primary Storage
  • Commvault Cyber Resilience
  • AI Security
  • Applied AI
  • Cohesity Data Protection

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies