Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

31 results found

Strengthening Business and Cyber Resilience: The WWT and NetApp Partnership

In today's rapidly evolving digital landscape, businesses require technology partners that bring innovation, security and agility to the forefront. The partnership between World Wide Technology (WWT) and NetApp exemplifies this synergy, delivering next-generation solutions that align with NetApp's four key pillars for FY26: Modernization, Cloud, Cybersecurity and AI.
Blog
•Jul 14, 2025

Commvault and Dell PowerProtect DD - Better Together

Commvault and Dell Technologies have partnered to provide customers with enhanced, API level integration between Commvault's Backup & Recovery software and Dell's data protection storage hardware products. Commvault is integrating Dell DD Boost backup protocol into their software stack, allowing Commvault users to write directly to Dell PowerProtect DD (PPDD) series appliances using the appliances' native protocol.
Blog
•Jun 11, 2024

Wands at the Ready: Navigating Data Protection and Sovereignty

Welcome to the first installment of our three-part series on Data Sovereignty. In this post, we step into our "Magical Library" to demystify the crucial differences between Data Protection and Data Sovereignty, exploring why understanding these concepts is vital for safeguarding your organization's most sensitive information in an increasingly regulated world.
Blog
•Jul 8, 2025

Thoughts on Backup Retention

Learn more about the merits of keeping backup retention as short as needed to provide recovery ability and keep solutions cost low.
Blog
•Jul 1, 2024

How Machine Learning and Generative AI will Affect Data Protection in 2024 and Beyond

In 2024, the impact of machine learning and generative AI on data protection solutions will be a key focus. Notable examples from Dell, Rubrik and Cohesity demonstrate how these technologies are being incorporated into products.
Blog
•Mar 13, 2024

Secure All Together – Think About "The 3 R's"

In today's digital age, it is crucial to prioritize cybersecurity and focus on the three key areas of risk, resilience and recovery. By evaluating and mitigating risks, building resilience and having a well-defined recovery plan, organizations can enhance their security and ensure business continuity. Collaboration and embracing these principles can create a safer digital world.
Blog
•Aug 8, 2024

Doomsday Prep: How to Keep Your Business Alive During a Ransomware Attack

With 88 percent of organizations facing at least one ransomware attack annually, the focus must shift from just prevention to survival. The solution: Minimum Viable Recovery (MVR) — a practical approach to recovering just enough to keep the business running. This is about achieving Minimum Viable Business, not full restoration.
Blog
•Apr 30, 2025

The Time for Post Quantum Encryption is Now, Not Later

This post is not comprehensive of all encryption and data security practices, but it highlights the impending necessity for post-quantum cryptography adoption. We will take a brief look at why this is a current concern, who has this technology today and why we need to start adoption soon.
Blog
•Nov 11, 2024

Preparing for DORA Compliance with Pure Storage and Commvault?

WWT's take on the new DORA compliance joint solution brief from Pure Storage and Commvault that aims to help customers meet requirements and will aid in your cyber resiliency plan.
Blog
•Dec 10, 2024

WWT's Object Storage Feature and Functionality Testing Methodology

A description of the testing process and methodology how WWT performs testing on object storage features and functionality.
Blog
•Aug 3, 2023

Setting RPO and RTO Based on Risk

Assigning RPO (Recovery Point Objective) and RTO (Recovery Time Objective) based on risk analysis ensures optimal data protection and business continuity. Critical systems require shorter RPO and RTO, balancing cost and risk. This strategic approach minimizes downtime and data loss, safeguarding operations against disasters and cyber threats.
Blog
•Feb 20, 2025

NAS Gateways: Spotlight on Nasuni

Get an overview of the Nasuni product.
Blog
•Mar 8, 2022

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

895 Followers

At a glance

172Total
70Articles
31Blogs
31Videos
10Labs
10Learning Paths
9Case Studies
7Events
2Workshops
1Assessment
1WWT Research
What's related
  • Data Center
  • Security
  • Cohesity
  • Cyber Resilience
  • Commvault
  • ATC
  • Cloud
  • Blog
  • Dell Tech
  • AI & Data
  • Rubrik
  • Cohesity Data Protection
  • Dell Data Protection
  • Primary Storage
  • Cloud Security
  • Cloud Data Management
  • Cohesity Cyber Resilience
  • WWT Presents
  • Applied AI
  • Dell Public Sector

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies