Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

What's popular

Illumio Zero Trust Segmentation Foundations

The Illumio Segmentation Lab is a demo intended to provide hands-on experience in performing both application dependency mapping and host-based segmentation using Illumio.
Foundations Lab
•125 launches

Zscaler Zero Trust Lab

Zscaler is responsible for securing more than 400 of the Forbes Global 2000 companies. They provide security as a service delivered through a purpose-built, globally distributed platform. The focus of this lab is zero trust access utilizing a solution known as Zscaler Private Access (ZPA). ZPA is a cloud service that provides seamless, zero trust access to private applications running on public cloud or within the data center. With ZPA, applications don't need to be exposed to the internet, making them completely invisible to unauthorized users. This service enables the applications to connect to users via inside-out connectivity versus extending the network to them. It disrupts legacy approaches to remote access such as traditional VPN, establishing per-service dynamic encryption and trust evaluation.
Foundations Lab
983 launches

Akamai Guardicore Centra Foundations Lab

The Akamai Guardicore Centra Foundations Lab aims to give people a hands-on experience with the central segmentation solution through a variety of use cases.
Foundations Lab
175 launches

Guardicore Zero Trust

Learn about Akamai Guardicore Segmentation, a software-based microsegmentation solution that provides a simple, fast, and intuitive way to enforce Zero Trust principles. In this Learning Path, you will explore the architecture on which Akamai Guardicore Segmentation runs, as well as look into how Guardicore is able to visualize and organize an environment through the use of asset labels. You will also learn how Guardicore establishes micro-segmentation using these asset labels through the creation of both manual and wizard-based policy rules.
Learning Path

Fortinet Security POC – Zero Trust Network Access (ZTNA)

In March 2023, a Fortinet ZTNA proof of concept test (POC) was completed in the WWT Advanced Technology Center. Here, we present a summary of the testing and results.
Blog
•Aug 8, 2023

What's new

The Life of a Security Girl

In honor of Cybersecurity Awareness Month, we're calling out all the masterminds to show that understanding your digital defense shouldn't feel like you just need to tolerate it. Instead, we'll map essential concepts to Taylor Swift's newest hits so you can shake it off and finally realize that having a security strategy is your ultimate getaway car to safety, ensuring your data is always safe and sound.
Blog
•Oct 23, 2025

Partner POV | Backing Up Your Data Isn't Enough. Only Complete Cyber Resilience Will Protect Your Agency From Ransomware.

Ransomware disrupts lives, not just organizations. Prevention isn't enough; agencies need a proactive cyber resilience strategy. Rubrik bridges gaps between IT teams, ensuring data integrity and rapid recovery. Embrace zero-trust, immutable backups, and threat monitoring to safeguard critical data and maintain operational continuity.
Partner Contribution
•Oct 21, 2025

Zscaler - Zero Trust Branch (ZTB) and Airgap

Zscaler, the leader in cloud security, brings together several of their technologies in their Zero Trust Exchange to implement, improve, and bolster your zero trust architecture (ZTA) within your organization. Utilizing their Zero Trust Exchange at the core of their technologies, it weave together secure internet access with Zscaler Internet Access (ZIA), private network access using Zscaler Private Access (ZPA) eliminating the need for traditional VPNs, data loss protection (DLP) and cloud access security broker (CASB) incorporated in Zscaler Data Protection, and network segmentation implementing Zscaler Airgap - their agentless micro-segmentation technology, all to reduce your attack surface and combining this all into a single enhanced platform. In this learning path, we are going to focus on our Zero Trust Branch and Airgap technologies and how they can together, improve your ZTA.
Learning Path

Cisco's True Universal ZTNA

In today's dynamic digital landscape, organizations are tasked with delivering seamless, secure access to applications and data across a hybrid, multi-device world.
Video
•1:55
•Oct 10, 2025

Unlocking Zero Trust: The Role of OAuth in Security Architecture

In today's cloud-centric, BYOD-driven and distributed microservices landscape, traditional security measures such as VPNs and perimeter defenses struggle to keep pace with the increasing need for enterprise security. Implicitly trusting entities within a network poses significant risks, necessitating a paradigm shift. Enter Zero Trust—an approach that requires independent security for every enterprise asset and authenticates and authorizes user and process identities at every level. This lab explores the critical role of OAuth in enabling a Zero Trust architecture and allows lab users to implement & test the OAuth Solution.
Advanced Configuration Lab
•52 launches

Practical Magic: Let's Build Zero Trust

How do you implement a security concept that feels like magic? The answer isn't an illusion; it's a practical craft. We're moving beyond theory to provide the blueprint: 5 concrete steps that build this powerful idea into a tangible, resilient defense for your organization.
Blog
•Oct 10, 2025

Partner POV | Check Point and Nutanix Advance Cloud Network Security

As hybrid cloud environments expand, Check Point CloudGuard Network Security's integration with Nutanix Cloud Infrastructure 7.3 enhances security through seamless service insertion and firewall chaining. This collaboration simplifies zero trust architecture, micro-segmentation, and compliance, offering dynamic, scalable protection without added complexity, empowering organizations to secure their networks efficiently.
Partner Contribution
•Oct 9, 2025

Partner POV | AI-powered App Segmentation: Unlocking Zero Trust at Scale

Imagine a castle surrounded by strong stone walls and a deep moat designed to keep unwanted visitors out. The drawbridge is tightly guarded, and all of the focus is placed on making sure no one from the outside gets in. But what happens when someone crosses the bridge? Inside the castle walls, it's a free for all. There are no locked doors, no security for treasures, and no checks on where people roam. Similarly, in many IT environments, once a user connects to the network, they often gain broad access to applications and data, with little control over what happens inside.
Partner Contribution
•Aug 29, 2025

Akamai Guardicore Centra Foundations Lab

The Akamai Guardicore Centra Foundations Lab aims to give people a hands-on experience with the central segmentation solution through a variety of use cases.
Foundations Lab
•175 launches

Partner POV | Fortinet and CrowdStrike Joint Solution

Delivering AI-powered protection, adaptive zero-trust access, and accelerated threat detection and response across your entire digital infrastructure
Partner Contribution
•Aug 25, 2025

Zero Trust Briefing

Explore the transformative power of Zero Trust, a strategy redefining cybersecurity by eliminating inherent trust. Discover practical insights, challenges and methodologies to safeguard digital assets. With WWT's expertise and partnerships, accelerate your Zero Trust journey and secure your organization's future. Ideal for CISOs, IT leaders and security practitioners.
Briefing

Introduction to Zero Trust

Introduction to Zero Trust provides a foundational understanding of the "never trust, always verify" security model, highlighting its necessity in today's distributed and threat-filled digital landscape. It introduces Microsoft's six-pillar framework for Zero Trust, outlining how their tools align with core principles like "Verify Explicitly," "Least Privilege," and "Assume Breach" across various organizational assets.
Video
•6:30
•Aug 7, 2025

5 Technology Trends Driving Business Value in Insurance

The insurance industry is transforming digitally, fueled by emerging technologies that are reshaping how insurers operate, engage customers and manage risk. These innovations are not just about modernization but also about unlocking real business value.
Blog
•Jul 30, 2025

Bringing Zero Trust to Life With Microsoft

Zero Trust is not a product, but a strategic approach to security. Still, viewing these principles through a vendor's solutions — like Microsoft's — makes them much easier to apply. Microsoft's tools map directly to the seven core pillars of modern Zero Trust. Here's how each pillar is addressed with Microsoft technologies that help bring each concept to life.
Blog
•Jul 16, 2025

Work Securely from Anywhere with Zero Trust

Picture working from a coffee shop, a park or your comfy couch. Your office can be anywhere now, but this flexibility makes protecting company data more challenging. That's why Zero Trust is crucial. In this blog, we'll explain what Zero Trust means, why it matters for secure remote work and share clear examples—especially for those working on the go with different devices.
Blog
•Jul 14, 2025

Nile Innovation and Service Differentatiation

Bob Hrbek discusses the WWT and Nile partnership and what is Network-as-a-Service from the Nile perspective.
Video
•18:05
•Jul 11, 2025

Identity and Access Management Workshop

As identities span across internal, external, customer or a combination of the three, how are you managing them? What is your confidence level that you know who that identity belongs to? With the trend of "identity is the new perimeter," it is extremely vital that organizations have an IAM strategy and know how IAM can enable a business while strengthening their security posture.
Workshop

Partner POV | Zero Trust is Reshaping Cyber Insurance by Reducing Risk

In an era where ransomware attacks continue to show the shortcomings of perimeter-based defenses, Zero Trust has proven itself as a game-changer for cyber insurance outcomes.
Partner Contribution
•Jul 1, 2025

The Versatile Data Center Smart Switch: Cisco N9300

The Cisco Nexus N9300 Smart Switch revolutionizes data center infrastructure with its convergence of high-performance switching, network security and application services. Featuring Cisco Silicon One ASICs and a Data Processing Unit, it offers intelligent, service-aware capabilities. Optional Hypershield enhances zero-trust security, making it ideal for AI, hybrid cloud and security-conscious environments.
Blog
•Jun 25, 2025

Practical Zero Trust Security with Fortinet Universal ZTNA

Fortinet Universal ZTNA delivers practical Zero Trust security through continuous, context-aware access control, endpoint verification and centralized analytics enabling organizations to protect users and applications across hybrid environments.
Blog
•Jun 24, 2025

Zero Trust

Improve your organization's ability to protect against today's most sophisticated attacks — inside and outside the network — with zero trust security.

1143 Followers

At a glance

111Total
49Articles
26Blogs
13Videos
6Case Studies
6Labs
3Briefings
2Events
2Learning Paths
2Workshops
1Assessment
1WWT Research
What's related
  • Security
  • Zscaler
  • Blog
  • Network Security
  • Zscaler Zero Trust
  • SASE
  • Zscaler SASE
  • Cybersecurity Risk & Strategy
  • Cloud
  • Cloud Security
  • ATC
  • Cisco
  • Networking
  • Zscaler Data Protection
  • Fortinet
  • Fortinet Zero Trust Access
  • Segmentation
  • Public Sector
  • AI Security
  • Akamai

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies