Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

13 results found

Nile Innovation and Service Differentatiation

Bob Hrbek discusses the WWT and Nile partnership and what is Network-as-a-Service from the Nile perspective.
Video
•18:05
•Jul 11, 2025

Authentication in a Zero Trust Framework

Matt Berry, WWT's Global Field CTO of Cybersecurity, shares how you can reduce risk, cost and complexity with authentication in a zero trust framework.
Video
•16:19
•Apr 7, 2023

Introduction to Zero Trust

Introduction to Zero Trust provides a foundational understanding of the "never trust, always verify" security model, highlighting its necessity in today's distributed and threat-filled digital landscape. It introduces Microsoft's six-pillar framework for Zero Trust, outlining how their tools align with core principles like "Verify Explicitly," "Least Privilege," and "Assume Breach" across various organizational assets.
Video
•6:30
•Aug 7, 2025

Demystifying Zero Trust: Navigate the Journey One Step at a Time

In a digital landscape fraught with sophisticated cyber threats, traditional security models fall short in providing adequate protection.
Video
•25:26
•Nov 30, 2023

Enable Zero Trust with Akamai

Today's enterprises are benefitting from the Zero Trust security model. Learn how you can enable Zero Trust with Akamai.
Video
•0:24
•Apr 27, 2023

Partner POV | Zero Trust in 5 Minutes

VPNs can never be zero trust because they typically grant broad network access to users, and well, users on the network are a recipe for disaster. Discover why Zscaler's inside-out zero trust married to identity helps enforce true user-to-application zero trust without exposing an attack surface and keeping the users off the network.
Video
•4:38
•Sep 3, 2024

Zero Trust Insights for Federal Agencies with Dell

Hear from Dan Carroll, Dell Federal's Field CTO for Cybersecurity, about Zero Trust Insights for Federal Agencies
Video
•6:56
•Jul 31, 2023

Securing Application Access With Fortinet Zero Trust Network Access

The Internet is the new perimeter and nothing should be trusted until verified. View how to achieve simple, automatic secure remote access that verifies who and what is on your network and secures application access no matter where users are located with Fortinet Zero Trust Network Access (ZTNA).
Video
•2:28
•May 17, 2024

Zscaler Data Protection Platform with Brian Deitch

Get ready to explore the future of data protection, where we embrace a cloud-native approach enhanced by the capabilities of machine learning. Completely managed efficiently through a single DLP policy, enforcing security in motion, at rest, and at the endpoint.
Video
•12:01
•Sep 3, 2024

Microsoft within Workplace Zero Trust

Microsoft within Workplace Zero Trust outlines Microsoft's Zero Trust strategy, focusing on four key workplace pillars: Identities, Endpoints, Applications, and Data. It provides a high-level overview of the six integrated Microsoft security product families, including Microsoft Entra, Microsoft Intune, and Microsoft Defender, that work together to implement this Zero Trust model
Video
•6:01
•Sep 9, 2025

Partner POV | Redefining Cyber Risk Quantification (CRQ) with Zscaler's Risk360

Risk360 is streamlined Cyber Risk Quantification solution that simplifies assessing potential financial losses and adverse impacts from cyber threats. With RIsk360, evaluate the likelihood of cyber incidents, their potential organizational impact, and the effectiveness of existing cybersecurity measures effortlessly. Prioritize investments and make informed decisions to manage and mitigate cyber risks effectively.
Video
•11:34
•Sep 6, 2024

Dell Trusted Infrastructure Overview

A modern, resilient and intelligent technology foundation for your Zero Trust architecture and security transformation.
Video
•1:17
•Oct 22, 2023

Zero Trust

Improve your organization's ability to protect against today's most sophisticated attacks — inside and outside the network — with zero trust security.

1142 Followers

At a glance

108Total
48Articles
24Blogs
13Videos
6Case Studies
6Labs
3Briefings
2Events
2Learning Paths
2Workshops
1Assessment
1WWT Research
What's related
  • Security
  • Zscaler
  • Blog
  • Network Security
  • Zscaler Zero Trust
  • SASE
  • Zscaler SASE
  • ATC
  • Cisco
  • Cybersecurity Risk & Strategy
  • Networking
  • Cloud
  • Cloud Security
  • Fortinet
  • Zscaler Data Protection
  • Fortinet Zero Trust Access
  • Segmentation
  • Public Sector
  • Akamai
  • Microsoft

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies