Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Partners

Select a tab

What's popular

Using Cisco's DNA Center to Deploy SD-Access

Use this step-by-step guide to easily design your network, define your policies and provision your infrastructure with Cisco's DNA Center.
Article
•May 31, 2023

Entitled to Nothing: How to Evaluate an IGA Solution Before it Evaluates You!

This post provides key considerations, traps to avoid and an IGA evaluation checklist that will make your compliance officer smile.
Blog
•May 14, 2025

CyberArk Privileged Account Management Lab

Explore the essential features of CyberArk Privileged Access Security (PAS) in this lab, showcasing its capabilities in managing and auditing privileged accounts across Windows and Linux environments. Discover how CyberArk PAS enhances security through automated password management and secure session monitoring.
Foundations Lab
456 launches

Best Practices for Healthcare Delivery Organizations to Safeguard Sensitive Data in the Age of AI

Healthcare delivery organizations should follow a zero trust approach to cybersecurity to safeguard patient data, intellectual property and more, especially as AI solutions become more integrated into everyday operations.
WWT Research
•Apr 21, 2024

Identity and Access Management Workshop

As identities span across internal, external, customer or a combination of the three, how are you managing them? What is your confidence level that you know who that identity belongs to? With the trend of "identity is the new perimeter," it is extremely vital that organizations have an IAM strategy and know how IAM can enable a business while strengthening their security posture.
Workshop

What's new

The Trojan Within: A Modern Halloween Tale of Identity

Not all ghosts haunt from the shadows. This Halloween, follow Jack O'Lantern, a remote contractor with a hidden identity, and see how AI-generated personas can bypass onboarding. Learn why verifying who enters your organization is more important than ever
Blog
•Oct 28, 2025

Unlocking Zero Trust: The Role of OAuth in Security Architecture

In today's cloud-centric, BYOD-driven and distributed microservices landscape, traditional security measures such as VPNs and perimeter defenses struggle to keep pace with the increasing need for enterprise security. Implicitly trusting entities within a network poses significant risks, necessitating a paradigm shift. Enter Zero Trust—an approach that requires independent security for every enterprise asset and authenticates and authorizes user and process identities at every level. This lab explores the critical role of OAuth in enabling a Zero Trust architecture and allows lab users to implement & test the OAuth Solution.
Advanced Configuration Lab
•53 launches

Beyond Identity Foundations Lab

This lab features Beyond Identity which is an authentication solution that uses device-bound credentials for zero-friction passwordless authentication. Beyond Identity is a cloud-native platform that uses Authenticators downloaded on endpoints which registers a users credentials and collects signals on the endpoint to capture device security posture for authentication.
Foundations Lab
•223 launches

Partner POV | Building AI-ready Identity Security with Okta Identity Security Posture Management

AI agents autonomously manage systems using inherited workload identities, posing significant security risks. Okta Identity Security Posture Management offers comprehensive visibility and control over these identities, ensuring organizations can safely harness AI's potential. Addressing this overlooked attack surface is crucial for thriving in the AI-driven future.
Partner Contribution
•Oct 8, 2025

Partner POV | Why the Future of Security Depends on Verifiable Identity

In a digital age plagued by deepfakes and identity fraud, traditional security measures falter. The solution lies in verifiable digital credentials, offering cryptographic proof of identity. As AI threats rise, embracing this new trust model is crucial to safeguarding privacy and ensuring secure, user-controlled digital identities.
Partner Contribution
•Oct 7, 2025

Scattered Spider and the Insurance Industry

Scattered Spider exploits the insurance industry's vulnerabilities through advanced social engineering, targeting legacy systems and human weaknesses. As cyber threats evolve, insurers must transition from prevention to resilience, focusing on rapid detection and response. The industry's future hinges on integrating technology, processes and human awareness to thwart these sophisticated attacks.
Blog
•Aug 31, 2025

Identity and Access Management Workshop

As identities span across internal, external, customer or a combination of the three, how are you managing them? What is your confidence level that you know who that identity belongs to? With the trend of "identity is the new perimeter," it is extremely vital that organizations have an IAM strategy and know how IAM can enable a business while strengthening their security posture.
Workshop

Partner POV | Check Point and Pax8 Partnership Provides Powerful New Security Offerings for MSPs

MSPs face a transformative era as cloud adoption and hybrid work rise. Check Point's partnership with Pax8 empowers MSPs with AI-driven, unified security solutions via the Pax8 Marketplace. This collaboration simplifies operations, enhances protection, and accelerates growth, marking a pivotal shift in delivering enterprise-grade cyber security with increased efficiency and profitability.
Partner Contribution
•Jul 3, 2025

Transforming Healthcare with SD-Access

Cisco's Software-Defined Access brings 5 key network benefits to healthcare organizations.
Article
•Jun 23, 2025

Entitled to Nothing: How to Evaluate an IGA Solution Before it Evaluates You!

This post provides key considerations, traps to avoid and an IGA evaluation checklist that will make your compliance officer smile.
Blog
•May 14, 2025

Identity & Access Management with Beyond Identity

The Beyond Identity learning path will provide information on what the solution is and explain some of the features of Identity & Access Management (IAM). In addition, the learning path will also provide a lab environment to gain some hands-on experience with the solution.
Learning Path

Identity & Access Management with CyberArk

The CyberArk learning path provides a high-level overview of Identity & Access Management (IAM) and some of its features and capabilities. In addition, this learning path introduces CyberArk's Privileged Access Security (PAS) solution and provides a lab environment to gain hands-on experience with the solution.
Learning Path

Unlocking the Right Fit: A Practical Guide to Evaluating a Workforce Access Management Solution

In this short and strategic guide, we'll help you cut through the jargon, and get clear on what actually matters when it comes to choosing the perfect Workforce Access Management solution.
Blog
•May 12, 2025

BeyondTrust Privileged Access Management

This learning path provides an exploration of privileged access management with real-world use cases and guidance on how to protect your organization from threats targeting privileged accounts. This learning path covers foundational topics to gain an understanding of how BeyondTrust can benefit your organization.
Learning Path

Understanding Cisco ISE 3.x and the Benefits of Migrating from ISE 2.x to 3.x

Cisco Identity Services Engine (ISE) 3.x represents a significant upgrade over its predecessor, Cisco ISE 2.x, offering a host of new features, improved performance and enhanced security capabilities. This blog post delves into the key features of Cisco ISE 3.x and highlights the benefits of migrating from earlier versions, providing a thorough understanding of why this upgrade is essential for modern network environments.
Blog
•May 6, 2025

The Grizzled CyberVet: RSA Conference 2025 – AI, Identity and the Battle for San Francisco

RSA 2025 brought together 45,000+ cybersecurity minds under one theme: "Many Voices. One Community." The message? The future of security is about collaboration and adaptation.
Blog
•May 5, 2025

CyberArk Privileged Account Management Lab

Explore the essential features of CyberArk Privileged Access Security (PAS) in this lab, showcasing its capabilities in managing and auditing privileged accounts across Windows and Linux environments. Discover how CyberArk PAS enhances security through automated password management and secure session monitoring.
Foundations Lab
•456 launches

How Attackers Are Utilizing MFA Fatigue In An Attempt To Gain Unauthorized Access To A Network

With Multi-Factor Authentication (MFA) adoption growing, attackers are turning to fatigue tactics to bypass protections. Learn how MFA bombing works, the signs to watch for, and how adaptive MFA and smart user responses can help prevent unauthorized access.
Blog
•Apr 29, 2025

Configuring Omnissa Access as an IDP in Island Enterprise Browser

Integrating Omnissa Access as an Identity Provider (IDP) with Island Enterprise Browser creates a seamless, secure access experience. This strategic alignment enhances Zero Trust security, enabling granular control and risk-aware access. Organizations benefit from streamlined onboarding, reduced risk and improved productivity for a secure, efficient digital workspace for all users.
Blog
•Apr 24, 2025

Dynamic Persona Assessment

An organization's workforce — its employees — are at the center of every process and digital transformation. So it's crucial they have the right tools for success. Yet we often find end-user technology decisions are disjointed, left up to distinct business units or simply sprawling over time. <br/> <br/> When organizations pivot towards employee-centric digital experience or plan for large-scale workspace refresh, the need to empower end users with the right technology tools and provide measurable business value is paramount. <br/> <br/> Our Dynamic Persona Assessment differentiates itself from traditional persona assessments by merging data and institutional knowledge, building a sustainable persona framework that can be used for a variety of business and technical decisions and initiatives.
Assessment

Identity and Access Management

Make access decisions more manageable and save time and costs through automation.

1073 Followers

At a glance

65Total
21Blogs
18Articles
5Labs
5Learning Paths
4Videos
3Assessments
3Case Studies
2Briefings
2Events
1Workshop
1WWT Research
What's related
  • Security
  • Blog
  • Okta
  • ATC
  • Cisco
  • Cisco Security
  • Cybersecurity Risk & Strategy
  • AI Security
  • Cisco Network Security
  • Security Operations
  • Digital Workspace
  • End-User Computing
  • Endpoint Security
  • What we do
  • Beyond Identity
  • Cisco Identity Services Engine (ISE)
  • CyberArk
  • Network Security
  • Sailpoint Technologies, Inc.
  • Consulting Services

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies