Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

30 results found

Doomsday Prep: How to Keep Your Business Alive During a Ransomware Attack

With 88 percent of organizations facing at least one ransomware attack annually, the focus must shift from just prevention to survival. The solution: Minimum Viable Recovery (MVR) — a practical approach to recovering just enough to keep the business running. This is about achieving Minimum Viable Business, not full restoration.
Blog
•Apr 30, 2025

Commvault's New Directions and Announcements at SHIFT Event

Commvault's 'SHIFT' event unveiled a transformative approach to data protection, emphasizing continuous business resilience, AI-driven security and multicloud flexibility. Addressing cyber threats and compliance, the event highlighted the necessity of understanding business infrastructure for robust data management. Commvault's innovations promise to redefine the security landscape.
Blog
•May 7, 2025

Commvault and Dell PowerProtect DD - Better Together

Commvault and Dell Technologies have partnered to provide customers with enhanced, API level integration between Commvault's Backup & Recovery software and Dell's data protection storage hardware products. Commvault is integrating Dell DD Boost backup protocol into their software stack, allowing Commvault users to write directly to Dell PowerProtect DD (PPDD) series appliances using the appliances' native protocol.
Blog
•Jun 11, 2024

Setting RPO and RTO Based on Risk

Assigning RPO (Recovery Point Objective) and RTO (Recovery Time Objective) based on risk analysis ensures optimal data protection and business continuity. Critical systems require shorter RPO and RTO, balancing cost and risk. This strategic approach minimizes downtime and data loss, safeguarding operations against disasters and cyber threats.
Blog
•Feb 20, 2025

Thoughts on Backup Retention

Learn more about the merits of keeping backup retention as short as needed to provide recovery ability and keep solutions cost low.
Blog
•Jul 1, 2024

Thoughts on Breaking Glass (in Case of Emergency) for Backup Systems

In a world of escalating cyber threats, the "break glass" account emerges as a crucial lifeline, enabling emergency access to backup systems when standard authentication fails. This strategy ensures business continuity and data recovery, safeguarding against catastrophic losses even when Identity and Access Management systems are compromised.
Blog
•Apr 16, 2025

The Time for Post Quantum Encryption is Now, Not Later

This post is not comprehensive of all encryption and data security practices, but it highlights the impending necessity for post-quantum cryptography adoption. We will take a brief look at why this is a current concern, who has this technology today and why we need to start adoption soon.
Blog
•Nov 11, 2024

Immutable Backup Strategy and the Journey to Cyber Resilience

Immutable backups are a key part of data protection strategy, cyber vaults, and the acceleration to mature cyber resilience.
Blog
•Jun 3, 2024

Preparing for DORA Compliance with Pure Storage and Commvault?

WWT's take on the new DORA compliance joint solution brief from Pure Storage and Commvault that aims to help customers meet requirements and will aid in your cyber resiliency plan.
Blog
•Dec 10, 2024

Veritas Flex Appliance and InfoScale Proof of Concept

Every business should have reliable, scalable data protection and disaster recovery solutions that allow them to reduce risk, eliminate uncertainty and maintain control of their environment. If you are searching for answers to these challenges, look no further than Veritas Flex Appliances with NetBackup for enterprise data protection and Veritas InfoScale for high-availability disaster recovery for critical applications.
Blog
•Aug 19, 2024

Veritas Alta Data Protection Powered by Cloud Scale Technology

Many clients are and have been moving to cloud service providers to take advantage of the flexibility and scalability that they offer. As IT evolves and adopts these new cloud technologies and platforms it becomes critical that the data protection strategy being used for cloud assets is equally versatile.
Blog
•Dec 17, 2023

Thoughts on Kubernetes Data Protection

Kubernetes was created by Google in 2014 and donated to the Cloud Native Computing Foundation (CNCF) in 2015. It has become the de facto standard for running containers in production at scale.
Blog
•Aug 11, 2023

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

888 Followers

At a glance

170Total
69Articles
30Blogs
30Videos
11Learning Paths
10Labs
9Case Studies
7Events
2Workshops
1Assessment
1WWT Research
What's related
  • Data Center
  • Security
  • Cohesity
  • Cyber Resilience
  • Commvault
  • ATC
  • Blog
  • Cloud
  • Dell Tech
  • AI & Data
  • Cohesity Data Protection
  • Rubrik
  • Dell Data Protection
  • Primary Storage
  • Cloud Security
  • Cloud Data Management
  • Cohesity Cyber Resilience
  • WWT Presents
  • Applied AI
  • Dell Public Sector

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies