Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

25 results found

End User Computing Nerd vs the Great Firewall of China

Traveling to China for the holidays, I circumvented the Great Firewall of China to stay connected to the West. What worked and what didn't? While personal VPNs failed, using international roaming, VDI and an enterprise browser proved effective. This journey highlighted the challenges and solutions for maintaining internet access to the West in a highly restricted environment.
Blog
•Jan 20, 2025

Introduction to Cortex XDR

Learn how Cortex XDR secures the future by rewiring security operations.
Blog
•Jan 24, 2023

Configuring Omnissa Access as an IDP in Island Enterprise Browser

Integrating Omnissa Access as an Identity Provider (IDP) with Island Enterprise Browser creates a seamless, secure access experience. This strategic alignment enhances Zero Trust security, enabling granular control and risk-aware access. Organizations benefit from streamlined onboarding, reduced risk and improved productivity for a secure, efficient digital workspace for all users.
Blog
•Apr 24, 2025

The MITRE ATT&CK Framework: A Beginner's Guide

As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the MITRE ATT&CK framework. We simplify and explain this framework used by attackers to compromise your digital ecosystem.
Blog
•Nov 11, 2024

Platforms vs. Point Solutions: Perspectives from the Executive, Consultant, and Engineer

This fourth article in the 5-part series compares platforms and point solutions through the perspectives of executives, consultants and engineers. It highlights their priorities, objections and ways to overcome challenges, offering insight into how different roles contribute to finding the right balance between simplicity, flexibility and long-term cybersecurity success.
Blog
•Jan 7, 2025

Using the ATC and Cyber Range to Upskill your Security Operations Team

Utilize the Cyber Range's CTFs and Learning Paths to help develop security teams and give your SOC a competitive edge.
Blog
•Jul 12, 2024

Primer Series: NAPP - Malware Prevention

VMware's NSX Malware Prevention application within the NSX Application Platform (NAPP) takes SDDC security to the file level by enabling detection and prevention of known and unknown malicious files from being run within a Windows operating system or being transmitted through a Tier-1 gateway.
Blog
•Jul 13, 2022

Primer Series: NAPP - Network Detection and Response (NDR)

VMware's Network Detection and Response (NDR) application is able to monitor and analyze network traffic flows collected by the NSX Intelligence application, malicious file events from Edge appliances (NSX Malware Prevention application required) and IDS/IPS events from the Distributed IDPS that cross both the network perimeter (North/South), as well as lateral traffic from inside the perimeter (East/West).
Blog
•Jun 14, 2022

SSL Orchestrator Use Case: Secure Web Gateway (SWG) "as a Service"

This article explains how to run and configure Secure Web Gateway (SWG) "as a service" inside the Service Chain for an SSL Orchestrator.
Blog
•Jun 24, 2024

Primer Series: NAPP - NSX Intelligence

With the release of NSX-T Data Center 3.2, NSX Intelligence has transitioned from being a large, monolithic, virtual machine based appliance to a modern micro-services application running within the VMware NSX Application Platform (NAPP).
Blog
•Jun 14, 2022

Enhancing mobile endpoint security with Omnissa's Workspace One Mobile Threat Defense (MTD)

Learn how Omnissa's Workspace One MTD's tight integration with Workspace ONE empowers organizations to protect their mobile workforce effectively and minimize operational overhead.
Blog
•May 15, 2024

Why Should Organizations Optimize Their SOC?

To address growing cyber threats, companies must optimize their Security Operations Centers (SOCs). SOCs designed properly detect and mitigate incidents faster. SOC optimization improves security by comparing architectures, procedures, tools and teams to industry standards. Clear, timely communication and industry norms are essential. SOC optimization increases resource allocation and protects against emerging threats. Security, threat response and compliance are advantages. Automating, streamlining and communicating improve incident detection and response. Risks are reduced by SOC optimization.
Blog
•Jun 23, 2023

Endpoint Security

Improve the visibility, protection and management of your endpoints with speed and scale, all while securing your data and driving operational efficiencies.

1015 Followers

At a glance

82Total
25Blogs
20Articles
13Labs
9Videos
5Case Studies
4Events
3Learning Paths
2Briefings
1Workshop
What's related
  • Security
  • Security Operations
  • Network Security
  • Blog
  • ATC
  • CrowdStrike
  • Cyber Range
  • Cybersecurity Risk & Strategy
  • Cloud
  • Cloud Security
  • Data Security
  • Whole-of-state cybersecurity
  • Networking
  • AI Security
  • Tanium
  • Digital Workspace
  • End-User Computing
  • Fortinet
  • Identity and Access Management
  • OT Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies