Zero Trust Insights
Filter by Content Types
- No options
104 results found
Zscaler Zero Trust Lab
Zscaler is responsible for securing more than 400 of the Forbes Global 2000 companies. They provide security as a service delivered through a purpose-built, globally distributed platform. The focus of this lab is zero trust access utilizing a solution known as Zscaler Private Access (ZPA). ZPA is a cloud service that provides seamless, zero trust access to private applications running on public cloud or within the data center. With ZPA, applications don't need to be exposed to the internet, making them completely invisible to unauthorized users. This service enables the applications to connect to users via inside-out connectivity versus extending the network to them. It disrupts legacy approaches to remote access such as traditional VPN, establishing per-service dynamic encryption and trust evaluation.
Foundations Lab
•1025 launches
Partner POV | The Visibility Gap Undermining OT and IOT Security
Visibility is crucial for securing OT and IoT environments, where assumptions often replace facts. As connectivity grows, understanding device interactions and traffic patterns is essential for enforcing Zero Trust principles. Without visibility, security becomes guesswork, risking operational integrity and safety. Embrace visibility to transform blind spots into informed control.
Partner Contribution
•Feb 10, 2026
How To Accelerate Zero Trust Adoption
This panel discussion explores practical ways to accelerate Zero Trust adoption, highlighting shifts in cybersecurity strategy, the importance of early executive engagement, and actionable steps for launching a Zero Trust program.
Video
•16:22
•Feb 9, 2026
Zero Trust Frameworks
This panel discussion explores Zero Trust frameworks and how do they fit into your Zero Trust strategy.
Video
•16:21
•Feb 9, 2026
Security Priorities for 2026
A guide for security leaders to strengthen trust, reduce risk and build a more resilient, security-enabled enterprise
WWT Research
•Feb 9, 2026
SSE Technology Evaluation
In this report, we evaluate the strengths and weaknesses of leading SSE solutions relative to key innovation factors shaping a rapidly evolving market.
WWT Research
•Feb 1, 2026
Integrating Dataminr into a Palo Alto Networks–Centric Platform
Dataminr Pulse for Cyber Risk integrates external real-time intelligence into Palo Alto Networks' platform, enabling security teams to act on early warning signals before threats impact internal systems. This approach shifts security from reactive to prevention-based by leveraging AI-analyzed data from over a million public sources to detect risks outside organizational perimeters.
Blog
•Jan 28, 2026
Cisco ACI Segmentation Migration Lab
Over the past few years many customers deploying ACI have opted for using the "Network-Centric" approach for implementing their ACI installations. Customers who no want to migrate to a Application-Centric approach often find their workloads are spread across multiple subnets, and grouping them by application is difficult. This lab provides a technique on how to make this migration simpler
Advanced Configuration Lab
•74 launches
Former NSA Cyber Director on the Emerging AI Threat Landscape
AI-powered nation-state cyber threats have entered a new phase. In this episode of the AI Proving Ground Podcast, WWT's Head of National Security and Critical Infrastructure Madison Horn joins former NSA Director Rob Joyce to break down what's changed and why business leaders should be paying close attention.
Video
•1:55
•Jan 13, 2026
Asset Mapping & Visibility with Illumio's Zero Trust Segmentation Platform
Attackers often have a deeper understanding of their target environments than the targets themselves, allowing them to quickly exploit weaknesses, especially with AI at their disposal. Without a clear understanding of network activities, organizations cannot secure their environments effectively. While segmenting critical assets can prevent ransomware spread, understanding risk and exposure is crucial for effective segmentation. The Illumio Zero Trust Segmentation platform supports a zero trust strategy by providing end-to-end visibility, mapping assets, identifying risks, and offering intelligence to reduce the attack surface. It allows organizations to map connectivity, reveal vulnerabilities, and build security strategies around actual risks, all from a single console. Illumio enhances cyber resilience by offering comprehensive visibility to identify and mitigate risks.
Video
•1:19
•Jan 13, 2026
Illumio Zero Trust Segmentation Platform Overview
In today's hyper-connected, hybrid, multi-cloud world, cybersecurity incidents are increasingly targeted, costly, and disruptive, with breaches taking an average of 277 days to identify and contain and costing $4.45 million on average. Attackers exploit a lack of visibility and segmentation to access high-value assets, posing a significant threat to cyber resiliency. The Illumio Zero Trust Segmentation Platform offers a solution by providing unprecedented visibility across cloud, endpoint, and data center environments from a single console. It enables security teams to easily configure, deploy, and monitor segmentation, setting granular policies to control communications and isolate high-value assets, effectively stopping breaches and ransomware from spreading and strengthening cyber resiliency.
Video
•1:46
•Jan 13, 2026
Zero Trust Adoption Methodology
A vault door is only as secure as the strategy behind it. In the digital world, we often focus on the "door" (security tools) while ignoring the intelligent process required to govern who gets near our data, when they can access it and why. This video uses the commercial bank vault analogy to simplify the five foundational steps of a Zero Trust journey. Zero Trust isn't a one-time project; it's a repeatable process. Watch to see how these steps can be applied across your entire environment and how WWT can help you move from a whiteboard drawing to a validated, real-world roadmap.
Video
•11:33
•Jan 11, 2026