Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Partners

Select a tab

4 results found

Authentication in a Zero Trust Framework

Matt Berry, WWT's Global Field CTO of Cybersecurity, shares how you can reduce risk, cost and complexity with authentication in a zero trust framework.
Video
•16:19
•Apr 7, 2023

Forcepoint Trusted Thin Client (TTC)

Forcepoint's Trusted Thin Client (TTC) is an innovative, highly streamlined cross-domain solution that gives you secure, simultaneous access to multiple sensitive and non-sensitive networks through a single device.
Video
•2:17
•May 30, 2023

The End-User Computing vs. Security Smackdown: Strategies to Emerge Victorious in the Digital Workspace

Tired of the endless tug-of-war between your end-user computing and security teams? Join WWT experts Ivan Wintersteiger, Director of EUC and AIOps (Observability), and Jordan Hildebrand, Global Cyber Practice Director, as they face-off in a discussion about strategies to move past the "us vs. them" mentality. You'll learn the frameworks, communication tactics and assessment methods that enable a harmonious balance between employee experience and security posture.
Video
•1:04
•Jan 28, 2025

Break the attack chain with Proofpoint

Protect your people from advanced email attacks and identity-based threats. Defend sensitive data from theft, loss and insider threats.
Video
•0:50
•Sep 5, 2023

Identity and Access Management

Make access decisions more manageable and save time and costs through automation.

1064 Followers

At a glance

58Total
19Blogs
15Articles
5Labs
4Learning Paths
4Videos
3Assessments
3Case Studies
2Briefings
2Events
1WWT Research
What's related
  • Security
  • Blog
  • ATC
  • Cisco
  • Cisco Network Security
  • Cisco Security
  • Okta
  • AI Security
  • Cybersecurity Risk & Strategy
  • Digital Workspace
  • End-User Computing
  • Security Operations
  • Endpoint Security
  • Network Security
  • What we do
  • Beyond Identity
  • Cisco Identity Services Engine (ISE)
  • CyberArk
  • Networking
  • Sailpoint Technologies, Inc.

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Cookies