Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Partners

Select a tab

15 results found

Five Considerations for Successful Identity and Access Management Architecture

Discover the five considerations needed to effectively incorporate Identity and Access Management (IAM) into your business.
Article
•Apr 14, 2025

Partner POV | Building AI-ready Identity Security with Okta Identity Security Posture Management

AI agents autonomously manage systems using inherited workload identities, posing significant security risks. Okta Identity Security Posture Management offers comprehensive visibility and control over these identities, ensuring organizations can safely harness AI's potential. Addressing this overlooked attack surface is crucial for thriving in the AI-driven future.
Partner Contribution
•Nov 1, 2025

Partner POV | Sovereign Data, Sovereign Access: Introducing Modern FIDO Authentication for SAS PCE

Thales' SAS PCE with FIDO authentication offers enterprises sovereign control over identity data, ensuring compliance and resilience. It provides phishing-resistant security, seamless access, and business continuity, addressing regulatory demands and operational challenges in hybrid environments. This strategic investment enhances security, compliance, and user experience, safeguarding data sovereignty and independence.
Partner Contribution
•Oct 28, 2025

Transforming Healthcare with SD-Access

Cisco's Software-Defined Access brings 5 key network benefits to healthcare organizations.
Article
•Jun 23, 2025

Partner POV | Check Point and Pax8 Partnership Provides Powerful New Security Offerings for MSPs

MSPs face a transformative era as cloud adoption and hybrid work rise. Check Point's partnership with Pax8 empowers MSPs with AI-driven, unified security solutions via the Pax8 Marketplace. This collaboration simplifies operations, enhances protection, and accelerates growth, marking a pivotal shift in delivering enterprise-grade cyber security with increased efficiency and profitability.
Partner Contribution
•Jul 3, 2025

Partner POV | Why the Future of Security Depends on Verifiable Identity

In a digital age plagued by deepfakes and identity fraud, traditional security measures falter. The solution lies in verifiable digital credentials, offering cryptographic proof of identity. As AI threats rise, embracing this new trust model is crucial to safeguarding privacy and ensuring secure, user-controlled digital identities.
Partner Contribution
•Oct 7, 2025

Partner POV | Digital Onboarding: Convenience Meets Security in Banking

What onboarding in consumer banking was five years ago, where it stands today, and where it's heading is a business-critical change worth both understanding and optimizing. Because while the goal – opening a bank account – remains the same, consumer expectations, the process itself, and the security measures involved have all been redefined.
Partner Contribution
•Jul 10, 2024

Partner POV | How Okta Embraces Identity Verification Using Persona

Okta is enhancing security in remote work by integrating Persona's identity verification technology into onboarding and account recovery, reducing fraud and improving efficiency.
Partner Contribution
•Mar 27, 2025

Partner POV | Insider Threat Mitigation: 5 Best Practices to Reduce Risk

Insider threats, which involve authorized individuals misusing their access to data or systems, have become a top concern for security leaders.
Partner Contribution
•Jan 22, 2024

Partner POV | AI at Work 2024: A view from the C-suite

C-suite executives must prioritize the adoption of robust security practices around AI, with IAM at the forefront, to safeguard against unauthorized access and potential breaches.
Partner Contribution
•Aug 14, 2024

Partner POV | Unblocking the Challenges of FIDO Key Management

Multi-factor authentication (MFA) is essential for protecting digital identities in a zero-trust security framework, but not all methods are equally secure. Thales offers solutions for decentralized management and for centralized control, ensuring improved security.
Partner Contribution
•Aug 9, 2024

Partner POV | Securing APIs While Navigating Today's Booming API Economy

The rapid evolution and expansion of APIs have created a new and urgent challenge: securing this prime opportunity for exploitation.
Partner Contribution
•Jul 24, 2024

Identity and Access Management

Make access decisions more manageable and save time and costs through automation.

1074 Followers

At a glance

58Total
22Blogs
15Articles
6Labs
5Learning Paths
3Case Studies
2Assessments
2Events
1Briefing
1Video
1Workshop
What's related
  • Security
  • Blog
  • ATC
  • Okta
  • AI Security
  • Cybersecurity Risk & Strategy
  • Cisco
  • Cisco Security
  • Endpoint Security
  • Network Security
  • Security Operations
  • Cisco Network Security
  • Digital Workspace
  • End-User Computing
  • Networking
  • Thales
  • What we do
  • Whole-of-state cybersecurity
  • Zero Trust
  • Beyond Identity

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies