Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

25 results found

When AI Starts to Act on Its Own, Who's in Control?

As artificial intelligence moves from prediction to action, a new security frontier is taking shape. In this episode, Zscaler's Head of AI Innovation Phil Tee and WWT's VP of Global Cyber Chris Konrad explore the rise of autonomous agents, the evolution of Zero Trust and what it means to secure AI itself. From poisoned prompts to quantum threats, they warn the biggest risk isn't just deploying AI — it's trusting it. A sharp, real-world look at how enterprises can protect their future as machines begin to make decisions of their own.
Video
•0:57
•Nov 5, 2025

Commvault with Dell PowerProtect Data Domain

Commvault is now a Dell DD Boost ecosystem partner, allowing the incorporation of the DD Boost SDK directly into the Commvault platform. This integration allows for advanced levels of integration and feature support with no additional software or plug-ins required.
Video
•7:51
•Aug 7, 2024

Partner POV | RecoveryAgent: Precision Recover Through Intelligent Orchestration

RecoveryAgent streamlines the complexities of disaster and cyber recovery situations. Organizations can design blueprints that automate recovery workflows and mitigate the risks of data loss.
Video
•2:20
•Nov 14, 2025

Shift Left to Protect APIs with F5 | Partner Spotlight

APIs have become the backbone of modern digital interactions, connecting everything from morning coffee purchases to streaming services. But the rise of API-centric architectures has drastically expanded the attack surface -- over 90 percent of web-based cyberattacks are now targeting API endpoints, exploiting new vulnerabilities often overlooked by security teams – and rendered traditional security measures are no longer sufficient. Join F5 Field CTO Chuck Herrin and WWT's Head of Global Cyber Strategy Traci Byrne as they talk about the urgent need for more dynamic and comprehensive defense strategies to prevent breaches. Chuck and Traci detail how security teams can "shift left" to better address API risks and vulnerabilities and outline practical steps security leaders can take to bolster their defenses.
Video
•0:39
•Aug 21, 2024

Provision Pure FlashBlade Storage for Commvault

Commvault's workflow feature simplifies and automates a wide range of common tasks. The Pure Storage provided workflow for Commvault creates FlashBlade storage Object Accounts, User Accounts and Buckets while applying best practices for securing access and privileges. This short video walks you through adding the workflow along with the execution of the workflow to create a storage bucket on a FlashBlade that Commvault's Media Agents and Storage Accelerators will back up directly via the S3 protocol.
Video
•11:34
•Nov 11, 2024

Think Beyond Disaster: Driving Cyber Recovery in the Data Center

As bad actors leverage AI to make ransomware attacks more prevalent and effective, data center operators and security leaders must move beyond traditional disaster recovery plans and think strategically about cyber recovery. Join WWT Cyber Resiliency Expert Michael Ambruso and Emerging AI and Cybersecurity Solutions Architect Todd Hathaway as they discuss ways in which you can optimize your data recovery plan when — not if — you fall victim to attack. Michael and Todd clarify the important difference between disaster and cyber recovery, dive into the role AI is playing in offense and defense, and offer guidance on how to best increase resiliency throughout your organization.
Video
•2:23
•Mar 3, 2025

Partner POV | Threat and Data Classification Scanning with Cohesity

In this video, Shelly Calhoun-Jones, the Technical Marketing Director at Cohesity, introduces Threat and Data Classification Scanning in Cohesity Data Cloud and how it helps organizations respond faster to security events.
Video
•7:48
•May 19, 2025

Overview: Commvault Cloud Data Recovery

Commvault Cloud delivers advanced cyber resilience capabilities to ensure your organization is always ready, resilient, and recoverable.
Video
•1:22
•Feb 21, 2024

Accelerating Time to Recovery with Zerto Cyber Resilience Vault | Partner Spotlight

Cyber threats continue to grow in frequency and sophistication, and the adoption of AI is adding to the complexity. Most CISOs are confident they can recover when they are attacked, but accelerating time-to-recovery is a top concern.
Video
•1:22
•Jul 23, 2024

Balancing Risk, Recovery and Resiliency with Commvault | Meet the Chief

Cyber resilience has become an executive- and board-level imperative for organizations of all kinds. But how can leaders ensure their businesses can withstand and recover from the inevitable cyber attack? In this episode of Meet the Chief, Commvault CEO Sanjay Mirchandani details his unique perspective on the evolving nature of cyber resilience, the shift from pure defense to a focus on data protection and rapid recovery, and the need for a unified platform to safeguard all workloads. Sanjay also explores the responsible use of AI in enhancing recovery capabilities and operational excellence, and shares insights related to building a culture of trust and transparency.
Video
•0:20
•Sep 4, 2024

Introducing Zerto Cyber Resilience Vault

Zerto Cyber Resilience Vault is an isolated, zero-trust clean room combined with an immutable data vault that saves the day when all else fails.
Video
•0:46
•Apr 26, 2024

Commvault Cloud Rewind Overview

Discover how Cloud Rewind by Commvault® Cloud makes cloud cyber resilience and recovery simple.
Video
•2:05
•Nov 5, 2024

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

907 Followers

At a glance

153Total
58Articles
32Blogs
25Videos
12Learning Paths
9Case Studies
8Labs
7Events
1Workshop
1WWT Research
What's related
  • Data Center
  • Security
  • Cyber Resilience
  • Cohesity
  • ATC
  • Commvault
  • Dell Tech
  • Blog
  • Rubrik
  • Dell Data Protection
  • Cloud
  • Cloud Security
  • AI & Data
  • Cohesity Data Protection
  • WWT Presents
  • Data Security
  • Dell PowerProtect
  • Primary Storage
  • Commvault Cyber Resilience
  • Dell Public Sector

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies