Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

What's popular

CrowdStrike CTF: Falcon

THIS EVENT IS FULL. THERE IS ANOTHER CROWDSTRIKE CTF on 11/20/25 https://www.wwt.com/event/68d1aa3809339a9dd017002b CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology. Tools utilized within the game: 🔷Crowdstrike Falcon (EDR tool, end point protection and analysis) 🔷Crowdstrike Logscale (History and logging) 🔷CrowdStrike Cloud Security 🔷CrowdStrike Identity Threat Protection This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Oct 29, 2025 • 10am

SentinelOne CTF: Siren Song

SentinelOne delivers a unified, AI-powered platform for endpoint protection, detection, and response. The Singularity Operations Center gives security teams real-time visibility, autonomous remediation, and deep threat context—all from a single console. In this Capture the Flag (CTF) challenge, you'll step into the role of a cyber defender and use SentinelOne's Singularity platform to investigate and respond to a ransomware attack. This interactive experience offers a hands-on opportunity to apply core blue team skills while exploring SentinelOne's capabilities in a dynamic, threat-rich environment. Primary tools utilized within the game: 🔹 SentinelOne Singularity Operations Center (EDR/XDR & incident response)
Cyber Range
Nov 13, 2025 • 9am

Elastic Endpoint Security Lab

Elastic Security provides a different approach to EDR by combing EDR and SIEM capabilities which leads to reduced mean time to detect and respond to threats. Elastic Security for endpoint prevents ransomware and malware, detects advanced threats and arms responders with vital investigative context, such as prioritized detections to help stop alert fatigue.
Sandbox Lab
793 launches

Tanium Integrated Lab

Tanium Integrated Lab Experience the transformative power of Tanium's Autonomous Endpoint Management at WWT's Advanced Technology Center. This integrated lab showcases real-time automation, enhancing IT operations and cybersecurity. Discover how Tanium, ServiceNow, and Microsoft Security solutions synergize to accelerate threat detection and response, shifting cybersecurity from reactive to proactive for robust resilience.
Advanced Configuration Lab
7 launches

SentinelOne Endpoint & AI SIEM Foundations Lab

Welcome to the SentinelOne Endpoint & AI SIEM Foundations lab provided by the WWT ATC! This lab provides you with a sample environment where you can gain hands-on experience with the SentinelOne solution.
Foundations Lab
177 launches

What's new

CrowdStrike CTF: Falcon

CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology. Tools utilized within the game: 🔷Crowdstrike Falcon (EDR tool, end point protection and analysis) 🔷Crowdstrike Logscale (History and logging) 🔷CrowdStrike Cloud Security 🔷CrowdStrike Identity Threat Protection This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Nov 20, 2025 • 10am

SentinelOne CTF: Siren Song

SentinelOne delivers a unified, AI-powered platform for endpoint protection, detection, and response. The Singularity Operations Center gives security teams real-time visibility, autonomous remediation, and deep threat context—all from a single console. In this Capture the Flag (CTF) challenge, you'll step into the role of a cyber defender and use SentinelOne's Singularity platform to investigate and respond to a ransomware attack. This interactive experience offers a hands-on opportunity to apply core blue team skills while exploring SentinelOne's capabilities in a dynamic, threat-rich environment. Primary tools utilized within the game: 🔹 SentinelOne Singularity Operations Center (EDR/XDR & incident response)
Cyber Range
•Nov 13, 2025 • 9am

CrowdStrike CTF: Falcon

THIS EVENT IS FULL. THERE IS ANOTHER CROWDSTRIKE CTF on 11/20/25 https://www.wwt.com/event/68d1aa3809339a9dd017002b CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology. Tools utilized within the game: 🔷Crowdstrike Falcon (EDR tool, end point protection and analysis) 🔷Crowdstrike Logscale (History and logging) 🔷CrowdStrike Cloud Security 🔷CrowdStrike Identity Threat Protection This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Oct 29, 2025 • 10am

Partner POV | As security continues to evolve, has your mobile strategy?

In a world of escalating mobile threats, Omnissa's Workspace ONE UEM and Mobile Threat Defense offer a robust solution. While UEM manages devices, Mobile Threat Defense detects and mitigates sophisticated cyber threats. Together, they safeguard corporate and BYOD devices, ensuring secure access and reducing vulnerabilities in an ever-evolving digital landscape.
Partner Contribution
•Oct 13, 2025

Partner POV | Eradicate Deeply Embedded Threats with AI-powered Endpoint Forensics

Organizations paying ransoms often face repeat attacks due to inadequate root-cause analysis and security measures. Trellix EDRF, integrating AI and forensic capabilities, transforms incident response by providing real-time, context-rich insights. This proactive approach enables faster threat containment, comprehensive breach understanding, and continuous security improvement, empowering even junior analysts.
Partner Contribution
•Oct 13, 2025

Beyond Identity Foundations Lab

This lab features Beyond Identity which is an authentication solution that uses device-bound credentials for zero-friction passwordless authentication. Beyond Identity is a cloud-native platform that uses Authenticators downloaded on endpoints which registers a users credentials and collects signals on the endpoint to capture device security posture for authentication.
Foundations Lab
•222 launches

Partner POV | The Hidden Third Party Risk in Airport Baggage Handling Systems

The aviation industry's digital evolution exposes vulnerabilities, as seen in a baggage handling system breach via third-party access. This article explores the risks of interconnected cyber-physical systems and offers strategies for securing critical infrastructure, emphasizing the need for continuous trust verification and dynamic security measures to ensure operational resilience.
Partner Contribution
•Oct 9, 2025

Zscaler Internet Access, CrowdStrike, and Okta Integration Lab

This lab exists to provide hands-on experience with the integration between ZIA, CrowdStrike Falcon, and Okta through relevant use cases. First, this lab can be used to see how the integration between CrowdStrike Falcon and ZIA can ensure administrators have end-to-end insight into the threat landscape to minimize attack surface and deliver rapid threat detection and response. On top of this, the lab allows users to see how Okta can integrate with both CrowdStrike and Zscaler to strengthen a company's Zero Trust profile, enhance threat detection during authentication and monitor the intersection of security and access management.
Advanced Configuration Lab
•266 launches

Partner POV | Proofpoint's Next Human Factor Report Uncovers Insights: Phishing & URL-Based Threats

Phishing tactics are evolving, with attackers increasingly using URLs over attachments, expanding into mobile and hybrid vectors like smishing and QR code phishing. Despite security measures, phishing exploits human instincts, posing significant risks. Organizations must enhance defenses against these diversified threats to prevent data breaches and large-scale fraud.
Partner Contribution
•Oct 3, 2025

SentinelOne Endpoint & AI SIEM Foundations Lab

Welcome to the SentinelOne Endpoint & AI SIEM Foundations lab provided by the WWT ATC! This lab provides you with a sample environment where you can gain hands-on experience with the SentinelOne solution.
Foundations Lab
•177 launches

SentinelOne XDR

In this learning path you will gain a fundamental understanding of the SentinelOne XDR solution by exploring topics such as the architecture on which SentinelOne XDR is built and the configuration of agent policies. You will also learn about topics such as the endpoint response actions and XDR response actions that SentinelOne can leverage to stop a threat in its tracks.
Learning Path

CrowdStrike CTF : Falcon

CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology. Tools utilized within the game: 🔷Crowdstrike Falcon (EDR tool, end point protection and analysis) 🔷Crowdstrike Logscale (History and logging) 🔷CrowdStrike Cloud Security 🔷CrowdStrike Identity Threat Protection This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network. IF THIS EVENT IS FULL, PLEASE HEAD OVER TO THE OCTOBER EVENT - https://www.wwt.com/event/68b0c1cca140c6b365be5894
Cyber Range
•Sep 4, 2025 • 9am

Black Hat Exclusive: SentinelOne's Steve Regini on the Future of Endpoint Security

Matt Berry, Global Field CTO of Cybersecurity at WWT, is joined by Steve Regini, SVP of Global Solutions Engineering at SentinelOne, to discuss the future of Endpoint Security at Black Hat USA 2025.
Video
•15:05
•Aug 25, 2025

Partner POV | Fortinet and CrowdStrike Joint Solution

Delivering AI-powered protection, adaptive zero-trust access, and accelerated threat detection and response across your entire digital infrastructure
Partner Contribution
•Aug 25, 2025

CrowdStrike CTF: Falcon

CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology. Tools utilized within the game: 🔷Crowdstrike Falcon (EDR tool, end point protection and analysis) 🔷Crowdstrike Logscale (History and logging) 🔷CrowdStrike Cloud Security 🔷CrowdStrike Identity Threat Protection This is a mixed capture the flag style event that will require you and your team to zero in on malicious actors inside of a network, identify vulnerable or outdated services, and brace yourself for a real-time series of cyber attacks. Points will be awarded for finding those exploits, remediating them to the best of your ability and defending Iron Guardian's network.
Cyber Range
•Aug 21, 2025 • 10am

Tanium Integrated Lab

Tanium Integrated Lab Experience the transformative power of Tanium's Autonomous Endpoint Management at WWT's Advanced Technology Center. This integrated lab showcases real-time automation, enhancing IT operations and cybersecurity. Discover how Tanium, ServiceNow, and Microsoft Security solutions synergize to accelerate threat detection and response, shifting cybersecurity from reactive to proactive for robust resilience.
Advanced Configuration Lab
•7 launches

Partner POV | Embracing Comprehensive Endpoint Protection

Remote work and increasing cyber threats heighten the need for robust endpoint security. Commvault Cloud Backup & Recovery offers comprehensive, user-friendly protection for diverse devices, ensuring data safety and compliance. With advanced threat detection and seamless integration, it empowers organizations to safeguard operations and maintain peace of mind in a digital world.
Partner Contribution
•Aug 6, 2025

Partner POV | Check Point and Pax8 Partnership Provides Powerful New Security Offerings for MSPs

MSPs face a transformative era as cloud adoption and hybrid work rise. Check Point's partnership with Pax8 empowers MSPs with AI-driven, unified security solutions via the Pax8 Marketplace. This collaboration simplifies operations, enhances protection, and accelerates growth, marking a pivotal shift in delivering enterprise-grade cyber security with increased efficiency and profitability.
Partner Contribution
•Jul 3, 2025

Trellix Endpoint Security Overview

Build a confident, more resilient enterprise with Trellix's intelligent and proactive endpoint security platform—designed to deliver advanced protection across your organization.
Video
•1:18
•Jun 16, 2025

Trellix Email Security Overview

Email is the top attack vector—secure it with advanced protection. Pair it with XDR for unified threat detection, faster response, and stronger defense across your organization.
Video
•1:13
•Jun 16, 2025

Endpoint Security

Improve the visibility, protection and management of your endpoints with speed and scale, all while securing your data and driving operational efficiencies.

1012 Followers

At a glance

93Total
26Blogs
21Articles
15Videos
11Labs
7Events
5Case Studies
4Learning Paths
3Briefings
1Workshop
What's related
  • Security
  • Network Security
  • Security Operations
  • Blog
  • CrowdStrike
  • Cyber Range
  • Cybersecurity Risk & Strategy
  • ATC
  • Cloud
  • Cloud Security
  • Digital Workspace
  • Fortinet
  • OT Security
  • Data Security
  • End-User Computing
  • Networking
  • Tanium
  • AI Security
  • Cisco
  • Fortinet Endpoint Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies