Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

32 results found

When AI Starts to Act on Its Own, Who's in Control?

As artificial intelligence moves from prediction to action, a new security frontier is taking shape. In this episode, Zscaler's Head of AI Innovation Phil Tee and WWT's VP of Global Cyber Chris Konrad explore the rise of autonomous agents, the evolution of Zero Trust and what it means to secure AI itself. From poisoned prompts to quantum threats, they warn the biggest risk isn't just deploying AI — it's trusting it. A sharp, real-world look at how enterprises can protect their future as machines begin to make decisions of their own.
Video
•0:57
•Nov 5, 2025

Commvault with Dell PowerProtect Data Domain

Commvault is now a Dell DD Boost ecosystem partner, allowing the incorporation of the DD Boost SDK directly into the Commvault platform. This integration allows for advanced levels of integration and feature support with no additional software or plug-ins required.
Video
•7:51
•Aug 7, 2024

Cyber Recovery and Data Protection

WWT's Dominic Greco discusses WWT's high level approach to Cyber Recovery and lessons to be learned in Cyber Recovery.
Video
•4:00
•Oct 29, 2025

Pure Storage Demo: SQL DB Refresh from FlashArray to CBS

In this demo, we will show how easy and quick it is to refresh a DR instance of a SQL DB living in Azure on CBS from an on-premises Prod instance living in Equinix on a FlashArray.
Video
•7:56
•Oct 12, 2023

Provision Pure FlashBlade Storage for Commvault

Commvault's workflow feature simplifies and automates a wide range of common tasks. The Pure Storage provided workflow for Commvault creates FlashBlade storage Object Accounts, User Accounts and Buckets while applying best practices for securing access and privileges. This short video walks you through adding the workflow along with the execution of the workflow to create a storage bucket on a FlashBlade that Commvault's Media Agents and Storage Accelerators will back up directly via the S3 protocol.
Video
•11:34
•Nov 11, 2024

Partner Case Study | Conagra Secures Its Supply Chain from Cyber Threats

Discover how Conagra keeps food production secure and resilient with Cohesity. From user error to cyber threats, Cohesity helps ensure uptime and data protection across Conagra's entire supply chain.
Video
•2:42
•Aug 26, 2025

Introducing Zerto Cyber Resilience Vault

Zerto Cyber Resilience Vault is an isolated, zero-trust clean room combined with an immutable data vault that saves the day when all else fails.
Video
•0:46
•Apr 26, 2024

Commvault Cloud Rewind Overview

Discover how Cloud Rewind by Commvault® Cloud makes cloud cyber resilience and recovery simple.
Video
•2:05
•Nov 5, 2024

Cohesity + Veritas: Inside the Innovation Engine

6 months after the close of the Veritas acquisition, Cohesity CEO, Sanjay Poonen, gives an update on the innovations that have launched and some specifics about the joint product roadmap.
Video
•5:52
•Aug 5, 2025

Balancing Risk, Recovery and Resiliency with Commvault | Meet the Chief

Cyber resilience has become an executive- and board-level imperative for organizations of all kinds. But how can leaders ensure their businesses can withstand and recover from the inevitable cyber attack? In this episode of Meet the Chief, Commvault CEO Sanjay Mirchandani details his unique perspective on the evolving nature of cyber resilience, the shift from pure defense to a focus on data protection and rapid recovery, and the need for a unified platform to safeguard all workloads. Sanjay also explores the responsible use of AI in enhancing recovery capabilities and operational excellence, and shares insights related to building a culture of trust and transparency.
Video
•0:20
•Sep 4, 2024

Infrastructure Built for Tomorrow

IT infrastructure that's capable of responding to whatever tomorrow brings is crucial to remaining competitive in today's global markets.  At World Wide Technology, we understand that in order to support your business, your employees and customers' growing demands, you need a foundation that enables innovation and fosters growth. 
Video
•1:01
•Jun 22, 2023

Overview: Commvault Cloud

Commvault Cloud ® powered by Metallic AI ® is the first platform for true cloud cyber resilience, delivering the highest security, most intelligence, and fastest recovery.
Video
•1:43
•Apr 26, 2024

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

901 Followers

At a glance

179Total
75Articles
32Blogs
32Videos
12Learning Paths
9Case Studies
8Events
6Labs
2Workshops
2WWT Research
1Assessment
What's related
  • Data Center
  • Security
  • Cohesity
  • Cyber Resilience
  • ATC
  • Commvault
  • Dell Tech
  • Blog
  • Rubrik
  • Cloud
  • AI & Data
  • Dell Data Protection
  • Cohesity Data Protection
  • Primary Storage
  • WWT Presents
  • Cloud Security
  • Cohesity Cyber Resilience
  • Data Security
  • Applied AI
  • Dell PowerProtect

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies