Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Services
Partners

Select a tab

What's popular

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

WWT and NetApp for Cyber Resilience - Secure Solutions for the Enterprise

In a world of evolving cyber threats, traditional disaster recovery is obsolete. NetApp and WWT together integrate security at the storage layer. Anticipate, withstand, recover and adapt to threats, transforming resilience into a strategic business advantage. Act now to protect your brand and revenue.
Blog
•Mar 4, 2026

When AI Starts to Act on Its Own, Who's in Control?

As artificial intelligence moves from prediction to action, a new security frontier is taking shape. In this episode, Zscaler's Head of AI Innovation Phil Tee and WWT's VP of Global Cyber Chris Konrad explore the rise of autonomous agents, the evolution of Zero Trust and what it means to secure AI itself. From poisoned prompts to quantum threats, they warn the biggest risk isn't just deploying AI — it's trusting it. A sharp, real-world look at how enterprises can protect their future as machines begin to make decisions of their own.
Video
•0:57
Nov 5, 2025

The $2.3 Trillion Question: Why 84% of Digital Transformations Still Fail

Discover why most digital transformations struggle and learn practical strategies for success! This post explores how shifting from technology-first to business-first thinking can dramatically improve outcomes. Get actionable tips for aligning technology with real business needs and creating meaningful change that actually works.
Blog
•Jun 3, 2025

Deepfakes for Good? How AI is Powering the Next Era of Personalization

In this episode of the AI Proving Ground Podcast, Adam Dumey and Chris Roberts explore one of the more surprising — and controversial — topics in generative AI: the use of synthetic media and deepfakes in personalized customer experiences.
Video
•1:07
Apr 29, 2025

What's new

Before You Scale AI, Fix Your Data Foundation

The new AI bottleneck is whether your enterprise data can be trusted, governed, and used at speed. Recorded live at NVIDIA GTC, this episode of the AI Proving Ground Podcast features Tore Sundelin of NetApp and Derek Elbert of World Wide Technology discussing why unstructured data, policy-based governance, data classification and unified AI data pipelines are becoming critical as enterprises push toward agentic AI and production-scale inference.
Video
•2:03
•Apr 2, 2026

Partner POV | Proofpoint Insider Threat Management

In a world of distributed workforces, insider threats pose significant risks to organizations. Proofpoint's Insider Threat Management (ITM) offers comprehensive visibility and adaptive, risk-based approaches to detect and mitigate insider risks. By balancing privacy and security, ITM empowers organizations to protect data, reduce incidents, and enhance overall security posture.
Partner Contribution
•Apr 2, 2026

Strengthening Healthcare Cybersecurity in an Era of Disruption

In an era of digital transformation, healthcare cybersecurity is mission-critical, impacting patient safety and operational resilience. By prioritizing foundational security strategies, healthcare cybersecurity leaders can navigate evolving threats and regulatory demands, ensuring safer, more resilient care environments.
WWT Research
•Mar 26, 2026

Partner POV | Varonis Launches Atlas to Secure AI and the Data That Powers It

Varonis Atlas revolutionizes AI security by offering an end-to-end platform that manages the entire AI security lifecycle. It uniquely integrates data context, enabling organizations to safely scale AI by continuously discovering, monitoring, and securing AI systems, including shadow AI, while ensuring compliance and mitigating third-party risks.
Partner Contribution
•Mar 24, 2026

A Quick Guide to Data Loss Prevention Solutions

Whether your organization is starting with data loss prevention or has been doing it for a long time, it never hurts to take a look at what's new in the market. Here is a quick guide for what you should be looking for.
Blog
•Mar 23, 2026

Checkpoint SD-WAN Lab

The Check Point SD-WAN lab is a hands-on environment designed to teach how Quantum SD-WAN is configiured over an existing environment that deploys Check Point security gateways . You will explore a distributed topology that includes branch sites with multiple ISP connections, centralized management, and simulated internet and MPLS transport, then configure SD-WAN objects tunnels & monitor various parameters. The lab also emphasizes operational workflows, including policy deployment, validation, & monitoring.
Advanced Configuration Lab
•Intermediate
•10 launches

WWT and NetApp for Cyber Resilience - Secure Solutions for the Enterprise

In a world of evolving cyber threats, traditional disaster recovery is obsolete. NetApp and WWT together integrate security at the storage layer. Anticipate, withstand, recover and adapt to threats, transforming resilience into a strategic business advantage. Act now to protect your brand and revenue.
Blog
•Mar 4, 2026

Partner POV | Smart Data: The Super Fuel Driving Next-Gen Observability

In a hyperconnected world, NETSCOUT's Smart Data revolutionizes observability by transforming raw network traffic into actionable insights. Through deep packet inspection, it enhances performance monitoring, threat detection, and AI-driven analytics, fostering collaboration across teams. This innovation empowers organizations to optimize infrastructure, enhance security, and align technical insights with business goals.
Partner Contribution
•Feb 12, 2026

Partner POV | East-West Is the New North-South: Rethink Security for the AI-Driven Data Center

In AI-driven data centers, traditional perimeter security is obsolete as east-west traffic dominates. This shift necessitates microsegmentation to secure internal communications, reduce attack surfaces, and ensure compliance. Akamai Guardicore Segmentation with Aruba CX 10000 offers real-time, in-fabric enforcement, optimizing security for modern applications and AI workloads.
Partner Contribution
•Feb 12, 2026

Partner POV | AI Tool Poisoning: How Hidden Instructions Threaten AI Agents

AI tool poisoning exploits vulnerabilities in tool descriptions, leading AI agents to perform unintended actions, risking data breaches and unauthorized access. This article explores the mechanics of tool poisoning, its various forms, and strategies for defense, emphasizing the critical need for robust security measures to protect AI systems.
Partner Contribution
•Feb 10, 2026

Milan 2026: Securing the Upcoming Winter Games in an Age of Hyper-Connectivity and AI-Driven Chaos

The expanding digital ecosystem of the Winter Games demands identity-first, AI-aware security heading into Milan 2026.
Blog
•Feb 5, 2026

Partner POV | Post-Quantum Cryptography: What It Is and How It Works

Quantum computers threaten current encryption, necessitating post-quantum cryptography (PQC) to secure data against future quantum attacks. Organizations must transition to PQC, leveraging algorithms like Kyber and Dilithium, to protect sensitive information. Proactive adoption ensures long-term security, safeguarding data from the impending quantum era.
Partner Contribution
•Jan 29, 2026

Partner POV | Eliminate Risk Blindspots with Multi-modal Fusion AI

Dataminr's Multi-Modal Fusion AI revolutionizes incident detection by integrating diverse data types—text, images, video, and more—into a unified model. This approach enables rapid, comprehensive threat analysis, enhancing organizational resilience and response times. By fusing disparate signals, it provides a complete, real-time context, surpassing traditional single-modality methods.
Partner Contribution
•Jan 7, 2026

Partner POV | Prompt Security's AI & Security Predictions for 2026

AI's integration into security by 2026 will redefine organizational boundaries, with agentic AI expanding capabilities and risks. Healthcare and critical industries will rely on AI for cybersecurity, while autonomous AI-driven cyberattacks will challenge traditional defenses. Data poisoning and near-AGI advancements will necessitate robust governance, reshaping model responsibility and control.
Partner Contribution
•Jan 7, 2026

Data Security Posture Management (DSPM) Workshop

Workshop

Data Protection: Ensuring Integrated NVIDIA AI Security at Scale

Learn how a data-centric, zero trust approach can fortify your organization's most valuable asset: Its data. With maturity models, AI-specific strategies and implementation best practices, this guide will help you build resilient, compliant and recovery-ready data protection across hybrid and high-performance environments.
WWT Research
•Jan 5, 2026

Data Security Posture Management (DSPM) Briefing

In this briefing, we will work with your key stakeholders to identify where your data is located, who is accessing it, how and where it's moving and how does this align with your governance, risk and compliance policies. Our experts will discuss how we help customers identify gaps in your data security and we will help identify how to best implement and operationalize a DSPM platform.
Briefing

Inside NVIDIA: The $5 Trillion Engine Redefining the Future of AI

AI is rewriting the rules of the global economy. Powered by leaps in accelerated computing, digital twins and autonomous systems, a new industrial era is emerging in real time. In this episode of the AI Proving Ground Podcast, NVIDIA leaders Jay Puri, Charlie Wuischpard and Craig Weinstein break down how the entire AI stack — from the silicon driving breakthroughs to the software shaping intelligent experiences — is redefining how we build, operate and compete. This conversation gives leaders a clear view of what's coming next—and what it takes to align their organizations, scale AI innovation, and stay ahead in a race where velocity, architecture, and ambition now determine advantage.
Video
•0:58
•Dec 5, 2025

Partner POV | How Cyera and Torq Automate Data Protection

Cyera and Torq revolutionize data protection by automating detection and response, transforming SOCs from reactive to autonomous. Their integration offers real-time visibility and instant remediation of data risks across cloud and SaaS environments, ensuring continuous, adaptive security. Discover how this partnership enhances data security intelligence and operational efficiency.
Partner Contribution
•Dec 3, 2025

Securing the AI Surge with Check Point's GenAI Protect

This blog explores how GenAI has surged into daily workflows, often without visibility or guardrails, and why organizations must secure this adoption without slowing productivity. It explains the risks of shadow AI, the value of Check Point's GenAI Protect and how WWT's AI Proving Ground accelerates safe, multivendor GenAI deployment across modern enterprise environments.
Blog
•Nov 20, 2025

Data Security

Data Security Home. WWT Capabilities around Data Security Posture Management (DSPM)

14 Followers

At a glance

96Total
35Articles
32Blogs
15Videos
5Learning Paths
3Labs
2Briefings
2WWT Research
1Assessment
1Workshop
What's related
  • Security
  • AI Security
  • Blog
  • AI & Data
  • Cloud
  • Cybersecurity Risk & Strategy
  • Cloud Security
  • ATC
  • Data Center
  • Data Protection & Cyber Recovery
  • Security Operations
  • Endpoint Security
  • Data Strategy and Architecture
  • GenAI
  • Network Security
  • Varonis
  • AI Proving Ground Podcast
  • Data Analytics
  • AI Proving Ground
  • Applied AI

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies