Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

18 results found

Can AI Be Trusted to Run Critical Networks?

Artificial intelligence is firmly in the heart of the world's most critical infrastructure — the massive networks that keep our digital lives running. In this episode of the AI Proving Ground Podcast, two of our top trusted advisors to the world's largest network operators — Dave Clough and Yohannes Tafesse — break down the high-stakes reality of applying AI at scale, the often-overlooked work of preparing data and building trust, and why the lessons emerging from telecom will shape how every enterprise approaches AI in mission-critical environments.
Video
•0:54
•Oct 21, 2025

Fortinet Hardware Refresh: Advice from Security Experts

As the digital landscape evolves, maintaining secure, high-performance infrastructure is critical. Fortinet's upcoming End of Support (EOS) dates for numerous models mark a pivotal moment for IT leaders.
Video
•3:55
•Sep 30, 2025

Cisco Hybrid Mesh Firewall Overview

Cisco's Hybrid Mesh Firewall solution is a highly distributed security fabric optimized to stop advanced threats, protect application vulnerabilities, and implement zero trust segmentation across environments.
Video
•1:58
•Oct 24, 2025

Cisco Hypershield: Reimagining security at AI-scale

Given the challenges of today's threat landscape, nothing less than a radical rethinking of security will do. Cisco Hypershield is it.
Video
•2:20
•Dec 9, 2024

Protecting Businesses from Ransomware

Ransomware is a critical issue affecting organization's internal security and data protection. It has become much more pronounced in recent years. WWT's Dominic Greco and Tim Schaap review the importance of Cyber Resiliency and Disaster Recovery toward protecting against Ransomware attacks.
Video
•7:21
•Apr 30, 2025

Demo | Omnis Cyber Intelligence

Dive into NETSCOUT's interactive demo where every click reveals hidden threats and empowers you to take action.
Video
•2:52
•Dec 13, 2024

Cisco Secure Edge (Umbrella) DNS Security Integration With Cisco SD-WAN

Traditional methods of backhauling Internet-bound traffic from branches to a data center for traditional security services is expensive and latency intensive. Many organizations are improving their network infrastructure by adopting a SASE (Secure Access Services Edge) architecture. Cisco SD-WAN and Cisco Secure Edge (formerly Umbrella) SASE integrations give organizations the ability to leverage cloud-delivered security in minutes. This demonstration is designed to give an overview of the integration between Umbrella DNS Layer Security and Cisco SD-WAN.
Video
•6:42
•Oct 7, 2024

Move Toward a More Secure and Scalable Network by Adopting SSE | Research

Adoption of Secure Service Edge (SSE) platforms, which provides security and policy enforcement right at the cloud edge, is accelerating and remains key to realizing a full SASE model. In this episode of WWT Research, Technical Solutions Engineer Nicole Portell outlines steps you can take to implement SSE for a secure, scalable and flexible network architecture that optimizes traffic flows and optimizes user experience.
Video
•1:45
•Jun 17, 2024

Partner POV | AED Adaptive DDoS

More than 13 million DDoS attacks were launched last year. NetScout's Arbor Edge Defense delivers adaptive DDoS protection.
Video
•3:07
•Mar 7, 2024

How to Enhance Network Performance and Security With Graphiant's Khalid Raza – the 'Father' of SD-WAN | Meet the Chief

From data security models to AI-driven threat detection, Graphiant is at the forefront of modern network solutions. In this episode of Meet the Chief, we talk with Graphiant CEO Khalid Raza – widely recognized as the 'father' of SD-WAN – about the pivotal roles of AI and data exchanges and how these are set to revolutionize network management and performance. Khalid also discusses the need to secure critical infrastructure.
Video
•1:35
•Aug 21, 2024

Shift Left to Protect APIs with F5 | Partner Spotlight

APIs have become the backbone of modern digital interactions, connecting everything from morning coffee purchases to streaming services. But the rise of API-centric architectures has drastically expanded the attack surface -- over 90 percent of web-based cyberattacks are now targeting API endpoints, exploiting new vulnerabilities often overlooked by security teams – and rendered traditional security measures are no longer sufficient. Join F5 Field CTO Chuck Herrin and WWT's Head of Global Cyber Strategy Traci Byrne as they talk about the urgent need for more dynamic and comprehensive defense strategies to prevent breaches. Chuck and Traci detail how security teams can "shift left" to better address API risks and vulnerabilities and outline practical steps security leaders can take to bolster their defenses.
Video
•0:39
•Aug 21, 2024

The Transformative Power of SASE-SSE in Enterprise Security for the AI Era

In the rapidly evolving landscape of digital enterprise, Secure Access Service Edge (SASE) and Security Service Edge (SSE) have emerged as pivotal frameworks for enhancing enterprise security. These technologies promise to revolutionize how organizations approach network security, offering integrated solutions that are both agile and scalable to meet the demands of AI-driven workloads. This panel brings together thought leaders from leading SASE/SSE suppliers to discuss the transformative potential of these technologies. Rather than focusing on supplier-specific features, the discussion will center on real-world use cases and the broader impact of SASE/SSE on enterprise security. Key topics will include the integration of AI with SASE/SSE, strategic deployment considerations, and the future trajectory of these technologies in supporting secure, AI-ready infrastructures.
Video
•0:18
•Nov 25, 2024

Network Security

Decrease your attack surface, improve visibility and reduce risk while simplifying management and operations.

1160 Followers

At a glance

174Total
54Blogs
42Labs
27Articles
18Videos
10Case Studies
8Events
8Learning Paths
4Workshops
3Briefings
What's related
  • Security
  • ATC
  • Cyber Range
  • Blog
  • Cloud
  • Networking
  • Security Operations
  • Cloud Security
  • Cybersecurity Risk & Strategy
  • Cisco
  • Endpoint Security
  • Zero Trust
  • Cisco Security
  • AI Security
  • Application & API Security
  • Palo Alto Networks
  • Fortinet
  • F5
  • Cisco Network Security
  • Whole-of-state cybersecurity

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies