Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Events

Select a tab

What's popular

AI Essentials

Welcome to the AI Essentials Learning Series. This series is designed to equip you with the knowledge and skills necessary to understand key aspects of Artificial Intelligence (AI). As AI continues to revolutionize industries and transform the way we live and work, it is crucial to understand the fundamental components that enable its remarkable performance. This series of learning paths will provide you with a comprehensive overview of AI, High Performance Storage, High Performance Networking, High Performance Compute, and Security, all tailored to the specific needs of AI applications.
Learning Series

Building for Success: A CTO's Guide to Generative AI

A strategic roadmap for Chief Technology Officers to align GenAI strategies with business goals, assess infrastructure needs, and identify the talent and skills needed to achieve sustainable GenAI transformation.
WWT Research
•Apr 17, 2025

Fostering responsible AI: How WashU is building a smarter approach to risk and governance

When AI usage increased across departments, Washington University in St. Louis needed a way to manage it responsibly without slowing innovation. Learn how WWT helped the university assess its AI risk posture, align stakeholders and build a plan for a scalable governance framework.
Case Study

Security Priorities for 2025

In this report, our security experts outline four key areas to focus on in 2025.
WWT Research
•Jan 1, 2025

WWT Adds $1 Trillion TAM With Softchoice's Microsoft 'Prowess,' Midmarket Reach And $4B Security Boom

WWT's merger with Softchoice has been 'a match made in heaven' as the company attacks a new $1 trillion total addressable market with more Microsoft abilities and greater customer reach than ever before, says WWT leader Bob Olwig.
News
•Jul 17, 2025

What's new

WWT DSEI After-Hours Networking Reception

Join World Wide Technology and partners, for an exclusive event tailored for defence technology leaders, where we will explore the transformative power of artificial intelligence in defence applications.
Experience
•Sep 9, 2025 • 12pm

Partner POV | Key Findings from the Thales 2025 Data Threat Report

The Thales 2025 Data Threat Report highlights a critical juncture in cybersecurity, emphasizing the urgent need for robust data protection amid rapid AI adoption and quantum threats. As organizations grapple with complex cloud environments and evolving compliance demands, a unified, strategic approach to data security becomes essential to safeguard sensitive information and ensure resilience.
Partner Contribution
•Aug 15, 2025

Zero Trust + AI: Accelerate Innovation With Security Built for the AI Era

AI powers innovation and drives efficiency—but also helps bad actors deliver more relentless and effective attacks. Companies need to rethink how they protect their private and public use of AI and how they defend against AI-powered attacks.
Video
•1:00
•Aug 4, 2025

Partner POV | Introducing The Autonomous SOC Maturity Model

The Autonomous SOC envisions a future where AI and automation transform security operations, enhancing human expertise rather than replacing it. By incrementally advancing through a maturity model, organizations can achieve greater efficiency and resilience, navigating the complex cybersecurity landscape with a blend of innovation and strategic human oversight.
Partner Contribution
•Aug 1, 2025

Blackbird.AI Partners With World Wide Technology To Protect Enterprises And Executives From Narrative Attacks

Strategic alliance brings narrative intelligence to global companies to combat misinformation, disinformation and AI-generated deepfakes that cause financial, operational and reputational harm.
News
•Jul 29, 2025

Is Cisco's Cybersecurity Architecture Ready for Agentic AI?

Cisco & Splunk are boosting threat detection as enterprises race to secure autonomous AI agents whilst combating sophisticated cyber attacks powered by AI
News
•Jul 28, 2025

AI Agents: Scaling Your Digital Workforce

Enterprise adoption of AI agents is spiking, with industry surveys showing most large enterprises are already piloting AI agents. But there's a lot of hype out there. In this episode of the AI Proving Ground Podcast, Technical Solutions Architect Ina Poecher and Senior Director of WWT's AI Practice expose widespread "agent-washing," highlight practical but ROI-heavy use cases you can pursue now. Tune in to discover how agentic architecture turns generative AI hype into secure, measurable enterprise AI outcomes — and what's next for multi-agent ecosystems.
Video
•1:36
•Jul 22, 2025

Partner POV | AI Traffic Intelligence: Gain Deep Observability into GenAI and LLM Activity

Learn how Gigamon AI Traffic Intelligence offers real-time insights without deploying agents, ensuring security without disrupting innovation.
Video
•3:59
•Jul 22, 2025

Partner POV | AI Fuels Rise of Hard-to-Detect Bots in Internet Traffic

AI-driven bots are reshaping cybersecurity, with automated traffic surpassing human activity for the first time in a decade. The rise of accessible AI tools has enabled less sophisticated cyber attackers to launch more frequent bot attacks, posing significant challenges for industries reliant on APIs, such as financial services, healthcare, and e-commerce.
Partner Contribution
•Jul 18, 2025

WWT Adds $1 Trillion TAM With Softchoice's Microsoft 'Prowess,' Midmarket Reach And $4B Security Boom

WWT's merger with Softchoice has been 'a match made in heaven' as the company attacks a new $1 trillion total addressable market with more Microsoft abilities and greater customer reach than ever before, says WWT leader Bob Olwig.
News
•Jul 17, 2025

Fostering responsible AI: How WashU is building a smarter approach to risk and governance

When AI usage increased across departments, Washington University in St. Louis needed a way to manage it responsibly without slowing innovation. Learn how WWT helped the university assess its AI risk posture, align stakeholders and build a plan for a scalable governance framework.
Case Study

Veriti and Check Point: Redefining Threat Exposure Management

An overview of Veriti, recently acquired by Check Point, which brings continuous threat exposure management into the security stack. Veriti provides real-time visibility across security tools, identifies misconfigurations and unmitigated threats, and recommends actionable steps to reduce attack surface risk without disrupting operations. This will cover how Veriti aligns with Check Point's prevention-first approach and how it can enhance an organization's overall security posture.
Blog
•Jul 15, 2025

Hack the Future: AI Meets Security

World Wide Technology's Ina Poecher and Ashley Schrage recap a hands-on WWT event where young women in tech explored real-world AI security challenges, learned about prompt injection and experienced the impact of collaborative STEM education.
Blog
•Jul 11, 2025

Partner POV | The AI Arms Race: When Attackers Leverage Cutting-Edge Tech

AI's dual role in cybersecurity is reshaping the landscape, with criminals leveraging advanced AI models for sophisticated attacks. From AI-enhanced phishing to deepfakes, these tools create highly personalized, convincing threats. As AI evolves, its potential for misuse grows, challenging organizations to stay ahead in this escalating cyber arms race.
Partner Contribution
•Jul 11, 2025

Opinion: How to Balance Learning Analytics With Data Privacy

The capacity of learning analytics platforms to collect troves of student data makes them both institutional necessities and liabilities. A handful of best practices can help colleges and universities keep them secure.
News
•Jul 10, 2025

Zenith Live 2025 Unveils Zscaler Agentic AI: Your Digital Kingdom's New Guardians

Zenith Live 2025 unveiled Zscaler's Agentic AI, transforming cybersecurity into a proactive, intelligent defense. With AI heroes like the Rogue, Paladin, Wizard, Cleric and Bard, this strategy combines autonomous systems with human ingenuity to protect digital realms. Which role do you believe is most vital in this AI-driven defense?
Blog
•Jul 8, 2025

Cisco AI Defense Capture the Flag (CTF)

Experience Cisco AI Defense in an interactive Capture the Flag (CTF), designed to showcase how Cisco is securing the future of GenAI.
Advanced Configuration Lab
•257 launches

Bridging AI and Cybersecurity: What Check Point MCP Servers Mean for Enterprise Security

Check Point's new MCP Server enables secure, structured integration between AI tools and Check Point's security infrastructure by exposing firewall policies, objects, and logs through a standardized Model Context Protocol interface. This allows large language models like Claude or GPT to query security environments using natural language, dramatically accelerating tasks such as policy analysis, compliance checks, and incident enrichment without requiring scripts or direct API calls. Deployed on-premises for full control and visibility, the MCP Server empowers security teams to automate workflows while maintaining strong governance and auditability.
Blog
•Jul 1, 2025

Partner POV | Advancing Deep Observability: Gigamon AI Vision Comes to Life

Gigamon unveils its AI-driven strategy, integrating GenAI into its Deep Observability Pipeline with AI Traffic Intelligence and GigaVUE-FM Copilot. These innovations enhance security and management of hybrid cloud infrastructures, addressing visibility gaps and evolving threats. As AI reshapes operations, Gigamon empowers teams with clarity, context, and control for operational excellence.
Partner Contribution
•Jun 27, 2025

The Versatile Data Center Smart Switch: Cisco N9300

The Cisco Nexus N9300 Smart Switch revolutionizes data center infrastructure with its convergence of high-performance switching, network security and application services. Featuring Cisco Silicon One ASICs and a Data Processing Unit, it offers intelligent, service-aware capabilities. Optional Hypershield enhances zero-trust security, making it ideal for AI, hybrid cloud and security-conscious environments.
Blog
•Jun 25, 2025

AI Security

AI security helps harness AI's potential while mitigating emerging threats, ensuring safe, compliant and ethical use across the organization.

128 Followers

At a glance

183Total
52Blogs
49Articles
38Videos
16Events
10Labs
10WWT Research
3Learning Paths
2Briefings
1Assessment
1Case Study
1Playlist
What's related
  • Security
  • AI & Data
  • Applied AI
  • Cybersecurity Risk & Strategy
  • Blog
  • WWT Presents
  • AI Proving Ground
  • ATC
  • Security Operations
  • GenAI
  • Cisco
  • Application & API Security
  • Palo Alto Networks
  • Cisco AI Solutions
  • Data Security
  • Network Security
  • Cyber Resilience
  • Cisco Security
  • Cloud
  • Cloud Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies