Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

10 results found

Authentication in a Zero Trust Framework

Matt Berry, WWT's Global Field CTO of Cybersecurity, shares how you can reduce risk, cost and complexity with authentication in a zero trust framework.
Video
•16:19
•Apr 7, 2023

Dive Into the Mind of the 'Father of Zero Trust' John Kindervag | Meet the Chief

Zero trust has taken the cybersecurity industry by storm, creating hype, misunderstanding and confusion. What does zero trust actually mean? And how can you adopt it? Who better to answer those questions than the creator of zero trust, John Kindervag, who joined our latest episode of Meet the Chief to talk about the story behind developing this seminal security strategy over a decade ago and how it has evolved to address modern threats. John also discusses the importance of segmentation in establishing a zero trust foundation and provides valuable insights for security leaders looking to strengthen their zero trust posture and stay ahead of constantly changing adversaries.
Video
•0:54
•Jul 16, 2024

Partner POV | Redefining Cyber Risk Quantification (CRQ) with Zscaler's Risk360

Risk360 is streamlined Cyber Risk Quantification solution that simplifies assessing potential financial losses and adverse impacts from cyber threats. With RIsk360, evaluate the likelihood of cyber incidents, their potential organizational impact, and the effectiveness of existing cybersecurity measures effortlessly. Prioritize investments and make informed decisions to manage and mitigate cyber risks effectively.
Video
•11:34
•Sep 6, 2024

Securing Application Access With Fortinet Zero Trust Network Access

The Internet is the new perimeter and nothing should be trusted until verified. View how to achieve simple, automatic secure remote access that verifies who and what is on your network and secures application access no matter where users are located with Fortinet Zero Trust Network Access (ZTNA).
Video
•2:28
•May 17, 2024

Zero Trust Insights for Federal Agencies with Dell

Hear from Dan Carroll, Dell Federal's Field CTO for Cybersecurity, about Zero Trust Insights for Federal Agencies
Video
•6:56
•Jul 31, 2023

Enable Zero Trust with Akamai

Today's enterprises are benefitting from the Zero Trust security model. Learn how you can enable Zero Trust with Akamai.
Video
•0:24
•Apr 27, 2023

Zscaler Data Protection Platform with Brian Deitch

Get ready to explore the future of data protection, where we embrace a cloud-native approach enhanced by the capabilities of machine learning. Completely managed efficiently through a single DLP policy, enforcing security in motion, at rest, and at the endpoint.
Video
•12:01
•Sep 3, 2024

Dell Trusted Infrastructure Overview

A modern, resilient and intelligent technology foundation for your Zero Trust architecture and security transformation.
Video
•1:17
•Oct 22, 2023

Demystifying Zero Trust: Navigate the Journey One Step at a Time

In a digital landscape fraught with sophisticated cyber threats, traditional security models fall short in providing adequate protection.
Video
•25:26
•Nov 30, 2023

Partner POV | Zero Trust in 5 Minutes

VPNs can never be zero trust because they typically grant broad network access to users, and well, users on the network are a recipe for disaster. Discover why Zscaler's inside-out zero trust married to identity helps enforce true user-to-application zero trust without exposing an attack surface and keeping the users off the network.
Video
•4:38
•Sep 3, 2024

Zero Trust

Improve your organization's ability to protect against today's most sophisticated attacks — inside and outside the network — with zero trust security.

1136 Followers

At a glance

95Total
44Articles
19Blogs
10Videos
7Labs
6Case Studies
3Briefings
2Events
1Assessment
1Learning Path
1Workshop
1WWT Research
What's related
  • Security
  • Zscaler
  • Network Security
  • Blog
  • Zscaler Zero Trust
  • SASE
  • ATC
  • Zscaler SASE
  • Cisco
  • Cybersecurity Risk & Strategy
  • Networking
  • Zscaler Data Protection
  • Cloud
  • Cloud Security
  • Segmentation
  • Akamai
  • Palo Alto Networks
  • Public Sector
  • Fortinet
  • Cisco Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies