Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Partners

Select a tab

5 results found

Authentication in a Zero Trust Framework

Matt Berry, WWT's Global Field CTO of Cybersecurity, shares how you can reduce risk, cost and complexity with authentication in a zero trust framework.
Video
•16:19
•Apr 7, 2023

The End-User Computing vs. Security Smackdown: Strategies to Emerge Victorious in the Digital Workspace

Tired of the endless tug-of-war between your end-user computing and security teams? Join WWT experts Ivan Wintersteiger, Director of EUC and AIOps (Observability), and Jordan Hildebrand, Global Cyber Practice Director, as they face-off in a discussion about strategies to move past the "us vs. them" mentality. You'll learn the frameworks, communication tactics and assessment methods that enable a harmonious balance between employee experience and security posture.
Video
•1:04
•Jan 28, 2025

Zero Trust Identity: Microsoft Entra ID

Zero Trust Identity: Microsoft Entra ID establishes Entra ID as Microsoft's cloud-based identity and access management service, serving as the central hub for user access. It highlights key capabilities like Single Sign-On (SSO), Multi-Factor Authentication (MFA), and user provisioning, all crucial for explicitly verifying identities in a Zero Trust framework.
Video
•6:48
•Aug 27, 2025

Break the attack chain with Proofpoint

Protect your people from advanced email attacks and identity-based threats. Defend sensitive data from theft, loss and insider threats.
Video
•0:50
•Sep 5, 2023

Forcepoint Trusted Thin Client (TTC)

Forcepoint's Trusted Thin Client (TTC) is an innovative, highly streamlined cross-domain solution that gives you secure, simultaneous access to multiple sensitive and non-sensitive networks through a single device.
Video
•2:17
•May 30, 2023

Identity and Access Management

Make access decisions more manageable and save time and costs through automation.

1073 Followers

At a glance

63Total
20Blogs
16Articles
5Labs
5Learning Paths
5Videos
3Assessments
3Case Studies
2Briefings
2Events
1Workshop
1WWT Research
What's related
  • Security
  • Blog
  • ATC
  • Cisco
  • Cisco Security
  • Okta
  • Cisco Network Security
  • Cybersecurity Risk & Strategy
  • AI Security
  • Security Operations
  • Digital Workspace
  • End-User Computing
  • Endpoint Security
  • What we do
  • Beyond Identity
  • Cisco Identity Services Engine (ISE)
  • CyberArk
  • Network Security
  • Sailpoint Technologies, Inc.
  • Consulting Services

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies