Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

2 results found

Modern Strategies for Voice Security

Organizations rely on communicating securely and privately with their customers. What happens when these communication channels are under attack? While AI has enabled many beneficial applications, criminals are finding novel ways to abuse it. The person on the far end of a voice call is becoming much more challenging to authenticate. These new forms of attack must be met with constant vigilance and defense-in-depth. This briefing discusses the threats facing organizations today, how to prepare and remain on guard, and ways to integrate voice security incident response into your disaster recovery plan.
Briefing
•2 hrs

Enterprise Video Conferencing: Next-Gen Meetings Briefing

Meetings are integral to how we do business — they're where decisions are discussed and made. Good meetings are simple to schedule and join, and they foster engagement and collaboration from each participant, whether remote or in person. This two- to four-hour briefing will focus on the latest meeting room technologies and explain the various options for simplifying and enhancing the experience across your enterprise.
Briefing
•3 hrs

Meetings

Make meetings easy to schedule, join, use and manage while fostering high-performing teams.

655 Followers

At a glance

68Total
23Videos
15Articles
14Case Studies
8Blogs
2Briefings
2WWT Research
1Lab
1Learning Path
1Playlist
1Workshop
What's related
  • Digital Workspace
  • Unified Communications
  • Hybrid Work
  • Cisco
  • Employee Experience
  • HP Poly
  • Webex
  • Logitech
  • Microsoft
  • Cisco Hybrid Work
  • What we do
  • Microsoft Teams
  • Digital
  • Poly Room Solutions
  • ATC
  • AI & Data
  • Cisco Collaboration
  • Customer Success
  • End-User Computing
  • Applied AI

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies