Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Partners

Select a tab

15 results found

Partner POV | AI at Work 2024: A view from the C-suite

C-suite executives must prioritize the adoption of robust security practices around AI, with IAM at the forefront, to safeguard against unauthorized access and potential breaches.
Partner Contribution
•Aug 14, 2024

Partner POV | Sovereign Data, Sovereign Access: Introducing Modern FIDO Authentication for SAS PCE

Thales' SAS PCE with FIDO authentication offers enterprises sovereign control over identity data, ensuring compliance and resilience. It provides phishing-resistant security, seamless access, and business continuity, addressing regulatory demands and operational challenges in hybrid environments. This strategic investment enhances security, compliance, and user experience, safeguarding data sovereignty and independence.
Partner Contribution
•Oct 28, 2025

Transforming Healthcare with SD-Access

Cisco's Software-Defined Access brings 5 key network benefits to healthcare organizations.
Article
•Jun 23, 2025

Partner POV | Unblocking the Challenges of FIDO Key Management

Multi-factor authentication (MFA) is essential for protecting digital identities in a zero-trust security framework, but not all methods are equally secure. Thales offers solutions for decentralized management and for centralized control, ensuring improved security.
Partner Contribution
•Aug 9, 2024

Five Considerations for Successful Identity and Access Management Architecture

Discover the five considerations needed to effectively incorporate Identity and Access Management (IAM) into your business.
Article
•Apr 14, 2025

Partner POV | Securing APIs While Navigating Today's Booming API Economy

The rapid evolution and expansion of APIs have created a new and urgent challenge: securing this prime opportunity for exploitation.
Partner Contribution
•Jul 24, 2024

Partner POV | Digital Onboarding: Convenience Meets Security in Banking

What onboarding in consumer banking was five years ago, where it stands today, and where it's heading is a business-critical change worth both understanding and optimizing. Because while the goal – opening a bank account – remains the same, consumer expectations, the process itself, and the security measures involved have all been redefined.
Partner Contribution
•Jul 10, 2024

Partner POV | Securing Every Identity in the Age of AI

Identity has become the primary attack vector in modern enterprises, with machine identities outnumbering human ones. CyberArk's integration with Palo Alto Networks elevates identity security to a core platform, offering continuous, dynamic protection against identity-based breaches. This partnership empowers organizations to innovate securely in the AI-driven era.
Partner Contribution
•Mar 5, 2026

Partner POV | What's the Best Way to Stop GenAI Data Loss? Take a Human-Centric Approach

The release of Proofpoint DLP Transform provides a modern alternative that helps CISOs protect data while allowing users to access GenAI tools.
Partner Contribution
•May 1, 2024

Partner POV | Check Point and Pax8 Partnership Provides Powerful New Security Offerings for MSPs

MSPs face a transformative era as cloud adoption and hybrid work rise. Check Point's partnership with Pax8 empowers MSPs with AI-driven, unified security solutions via the Pax8 Marketplace. This collaboration simplifies operations, enhances protection, and accelerates growth, marking a pivotal shift in delivering enterprise-grade cyber security with increased efficiency and profitability.
Partner Contribution
•Jul 3, 2025

Partner POV | How Okta Embraces Identity Verification Using Persona

Okta is enhancing security in remote work by integrating Persona's identity verification technology into onboarding and account recovery, reducing fraud and improving efficiency.
Partner Contribution
•Mar 27, 2025

Partner POV | Building AI-ready Identity Security with Okta Identity Security Posture Management

AI agents autonomously manage systems using inherited workload identities, posing significant security risks. Okta Identity Security Posture Management offers comprehensive visibility and control over these identities, ensuring organizations can safely harness AI's potential. Addressing this overlooked attack surface is crucial for thriving in the AI-driven future.
Partner Contribution
•Nov 1, 2025

Identity and Access Management

Make access decisions more manageable and save time and costs through automation.

1079 Followers

At a glance

60Total
24Blogs
15Articles
6Labs
5Learning Paths
3Case Studies
2Events
1Assessment
1Briefing
1Video
1Workshop
1WWT Research
What's related
  • Security
  • Blog
  • ATC
  • AI Security
  • Okta
  • Cybersecurity Risk & Strategy
  • Cisco
  • Cisco Security
  • CyberArk
  • Endpoint Security
  • Network Security
  • Security Operations
  • Cisco Network Security
  • Networking
  • Thales
  • What we do
  • Whole-of-state cybersecurity
  • Zero Trust
  • Beyond Identity
  • Cisco Identity Services Engine (ISE)

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies