Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

2 results found

Move Toward a More Secure and Scalable Network by Adopting SSE | Research

Adoption of Secure Service Edge (SSE) platforms, which provides security and policy enforcement right at the cloud edge, is accelerating and remains key to realizing a full SASE model. In this episode of WWT Research, Technical Solutions Engineer Nicole Portell outlines steps you can take to implement SSE for a secure, scalable and flexible network architecture that optimizes traffic flows and optimizes user experience.
Webinar
•Jun 20, 2024 • 9am

Driving Simplicity Amid Chaos: How Cisco is Tackling Network and Security Convergence | Partner Spotlight

AI adoption, digital transformation efforts and macroeconomic conditions are putting more pressure on IT leaders to simplify to more efficiently support their business. Key to that effort will be tightly integrated and intelligent solutions that create a unified experience that drive action. Join Vikas Butaney, SVP and GM of Cisco Cloud, SD-WAN, and Industrial IoT Connectivity, and Raj Chopra, SVP and Chief Product Officer for Cisco's Security Business Group, as they discuss the convergence of networking and security in today's IT landscape. The two talk with WWT experts Chris Konrad and Neil Anderson about Cisco's networking and security strategy that focuses on creating a great unified experience, and the role data and AI play in the future.
Webinar
•Mar 14, 2024 • 9am

Secure Access Service Edge (SASE)

Integrate multiple security and networking functions into a single service, to enhance security, scalability, and performance for organizations.

497 Followers

At a glance

57Total
14Blogs
14Videos
13Articles
5Labs
3Briefings
2Case Studies
2Events
2Learning Paths
1Workshop
1WWT Research
What's related
  • Security
  • Networking
  • Software Defined WAN (SD-WAN)
  • Zscaler
  • Cisco
  • Blog
  • Zscaler SASE
  • ATC
  • Cloud
  • Network Security
  • Palo Alto Networks
  • Zero Trust
  • Zscaler Zero Trust
  • Cisco SD-WAN
  • Cloud Security
  • Fortinet
  • Netskope
  • Zscaler Data Protection
  • Cisco Network Security
  • AI Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies