Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Partners

Select a tab

14 results found

Transforming Healthcare with SD-Access

Cisco's Software-Defined Access brings 5 key network benefits to healthcare organizations.
Article
•Jun 23, 2025

Five Considerations for Successful Identity and Access Management Architecture

Discover the five considerations needed to effectively incorporate Identity and Access Management (IAM) into your business.
Article
•Apr 14, 2025

Partner POV | What's the Best Way to Stop GenAI Data Loss? Take a Human-Centric Approach

The release of Proofpoint DLP Transform provides a modern alternative that helps CISOs protect data while allowing users to access GenAI tools.
Partner Contribution
•May 1, 2024

Partner POV | Securing APIs While Navigating Today's Booming API Economy

The rapid evolution and expansion of APIs have created a new and urgent challenge: securing this prime opportunity for exploitation.
Partner Contribution
•Jul 24, 2024

Partner POV | Unblocking the Challenges of FIDO Key Management

Multi-factor authentication (MFA) is essential for protecting digital identities in a zero-trust security framework, but not all methods are equally secure. Thales offers solutions for decentralized management and for centralized control, ensuring improved security.
Partner Contribution
•Aug 9, 2024

Partner POV | Why the Future of Security Depends on Verifiable Identity

In a digital age plagued by deepfakes and identity fraud, traditional security measures falter. The solution lies in verifiable digital credentials, offering cryptographic proof of identity. As AI threats rise, embracing this new trust model is crucial to safeguarding privacy and ensuring secure, user-controlled digital identities.
Partner Contribution
•Oct 7, 2025

Partner POV | Check Point and Pax8 Partnership Provides Powerful New Security Offerings for MSPs

MSPs face a transformative era as cloud adoption and hybrid work rise. Check Point's partnership with Pax8 empowers MSPs with AI-driven, unified security solutions via the Pax8 Marketplace. This collaboration simplifies operations, enhances protection, and accelerates growth, marking a pivotal shift in delivering enterprise-grade cyber security with increased efficiency and profitability.
Partner Contribution
•Jul 3, 2025

Partner POV | Sovereign Data, Sovereign Access: Introducing Modern FIDO Authentication for SAS PCE

Thales' SAS PCE with FIDO authentication offers enterprises sovereign control over identity data, ensuring compliance and resilience. It provides phishing-resistant security, seamless access, and business continuity, addressing regulatory demands and operational challenges in hybrid environments. This strategic investment enhances security, compliance, and user experience, safeguarding data sovereignty and independence.
Partner Contribution
•Oct 28, 2025

Partner POV | Building AI-ready Identity Security with Okta Identity Security Posture Management

AI agents autonomously manage systems using inherited workload identities, posing significant security risks. Okta Identity Security Posture Management offers comprehensive visibility and control over these identities, ensuring organizations can safely harness AI's potential. Addressing this overlooked attack surface is crucial for thriving in the AI-driven future.
Partner Contribution
•Nov 1, 2025

Partner POV | Digital Onboarding: Convenience Meets Security in Banking

What onboarding in consumer banking was five years ago, where it stands today, and where it's heading is a business-critical change worth both understanding and optimizing. Because while the goal – opening a bank account – remains the same, consumer expectations, the process itself, and the security measures involved have all been redefined.
Partner Contribution
•Jul 10, 2024

Partner POV | How Okta Embraces Identity Verification Using Persona

Okta is enhancing security in remote work by integrating Persona's identity verification technology into onboarding and account recovery, reducing fraud and improving efficiency.
Partner Contribution
•Mar 27, 2025

Partner POV | CrowdStrike Drives Cybersecurity Forward with New Innovations

Explore CrowdStrike's new product capabilities built to fortify organizations' defenses with comprehensive protection across key layers of their environment.
Partner Contribution
•Sep 26, 2024

Identity and Access Management

Make access decisions more manageable and save time and costs through automation.

1079 Followers

At a glance

58Total
24Blogs
14Articles
6Labs
5Learning Paths
3Case Studies
2Events
1Assessment
1Briefing
1Video
1Workshop
What's related
  • Security
  • Blog
  • ATC
  • Okta
  • AI Security
  • Cybersecurity Risk & Strategy
  • Cisco
  • Cisco Security
  • Endpoint Security
  • Network Security
  • Security Operations
  • Cisco Network Security
  • CyberArk
  • Networking
  • Thales
  • What we do
  • Whole-of-state cybersecurity
  • Zero Trust
  • Beyond Identity
  • Cisco Identity Services Engine (ISE)

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies