Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

19 results found

Shift Left to Protect APIs with F5 | Partner Spotlight

APIs have become the backbone of modern digital interactions, connecting everything from morning coffee purchases to streaming services. But the rise of API-centric architectures has drastically expanded the attack surface -- over 90 percent of web-based cyberattacks are now targeting API endpoints, exploiting new vulnerabilities often overlooked by security teams – and rendered traditional security measures are no longer sufficient. Join F5 Field CTO Chuck Herrin and WWT's Head of Global Cyber Strategy Traci Byrne as they talk about the urgent need for more dynamic and comprehensive defense strategies to prevent breaches. Chuck and Traci detail how security teams can "shift left" to better address API risks and vulnerabilities and outline practical steps security leaders can take to bolster their defenses.
Video
•0:39
•Aug 21, 2024

Cisco Hybrid Mesh Firewall Overview

Cisco's Hybrid Mesh Firewall solution is a highly distributed security fabric optimized to stop advanced threats, protect application vulnerabilities, and implement zero trust segmentation across environments.
Video
•1:58
•Oct 24, 2025

Can AI Be Trusted to Run Critical Networks?

Artificial intelligence is firmly in the heart of the world's most critical infrastructure — the massive networks that keep our digital lives running. In this episode of the AI Proving Ground Podcast, two of our top trusted advisors to the world's largest network operators — Dave Clough and Yohannes Tafesse — break down the high-stakes reality of applying AI at scale, the often-overlooked work of preparing data and building trust, and why the lessons emerging from telecom will shape how every enterprise approaches AI in mission-critical environments.
Video
•0:54
•Oct 21, 2025

Protecting Businesses from Ransomware

Ransomware is a critical issue affecting organization's internal security and data protection. It has become much more pronounced in recent years. WWT's Dominic Greco and Tim Schaap review the importance of Cyber Resiliency and Disaster Recovery toward protecting against Ransomware attacks.
Video
•7:21
•Apr 30, 2025

Smart, Simple, Secure: Transform Your Network with Cisco Catalyst SD-WAN

As more applications move to the cloud, it becomes essential to evolve existing networks to meet the demands of multicloud networking. Cisco Catalyst SD-WAN is designed to transform your network with a smart, simple, and secure solution.
Video
•1:40
•Mar 20, 2025

Cisco Hypershield: Reimagining security at AI-scale

Given the challenges of today's threat landscape, nothing less than a radical rethinking of security will do. Cisco Hypershield is it.
Video
•2:20
•Dec 9, 2024

Cisco Secure Edge (Umbrella) DNS Security Integration With Cisco SD-WAN

Traditional methods of backhauling Internet-bound traffic from branches to a data center for traditional security services is expensive and latency intensive. Many organizations are improving their network infrastructure by adopting a SASE (Secure Access Services Edge) architecture. Cisco SD-WAN and Cisco Secure Edge (formerly Umbrella) SASE integrations give organizations the ability to leverage cloud-delivered security in minutes. This demonstration is designed to give an overview of the integration between Umbrella DNS Layer Security and Cisco SD-WAN.
Video
•6:42
•Oct 7, 2024

Cisco Secure Firewall FTD

In this video Drew Kaiser (WWT Technical Solution Architect) and Nick Carrieri (Cisco SBG's Director of Product Management) take a look at Cisco Firewall Threat Defense and some of the new features available with the latest release.
Video
•9:32
•Jan 13, 2026

Cisco Secure Firewall Strength in Unity

There is strength in unity, and when it comes to protecting the integrity of your organization, the same holds true. You need multiple security tools working together to protect your network, workforce, and workloads.
Video
•1:40
•Jan 22, 2025

Move Toward a More Secure and Scalable Network by Adopting SSE | Research

Adoption of Secure Service Edge (SSE) platforms, which provides security and policy enforcement right at the cloud edge, is accelerating and remains key to realizing a full SASE model. In this episode of WWT Research, Technical Solutions Engineer Nicole Portell outlines steps you can take to implement SSE for a secure, scalable and flexible network architecture that optimizes traffic flows and optimizes user experience.
Video
•1:45
•Jun 17, 2024

Fortinet Hardware Refresh: Advice from Security Experts

As the digital landscape evolves, maintaining secure, high-performance infrastructure is critical. Fortinet's upcoming End of Support (EOS) dates for numerous models mark a pivotal moment for IT leaders.
Video
•3:55
•Sep 30, 2025

Partner POV | Inside Fortinet's Unified SASE Architecture

Introducing Fortinet Unified SASE, a global unified protection across your entire network with a single management console, agent and policies.
Video
•1:03
•Jan 27, 2026

Network Security

Decrease your attack surface, improve visibility and reduce risk while simplifying management and operations.

1166 Followers

At a glance

188Total
63Blogs
47Labs
27Articles
19Videos
10Case Studies
10Learning Paths
7Events
4Workshops
1Briefing
What's related
  • Security
  • ATC
  • Blog
  • Cyber Range
  • Cloud
  • Networking
  • Security Operations
  • Cloud Security
  • Cybersecurity Risk & Strategy
  • Cisco
  • Endpoint Security
  • Fortinet
  • Cisco Security
  • Application & API Security
  • Palo Alto Networks
  • AI Security
  • Zero Trust
  • Whole-of-state cybersecurity
  • Cisco Secure Firewall
  • Cisco Network Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies