Overview
Explore
Labs
Services
Events
Partners
Select a tab
24 results found
Practical Zero Trust Security with Fortinet Universal ZTNA
Fortinet Universal ZTNA delivers practical Zero Trust security through continuous, context-aware access control, endpoint verification and centralized analytics enabling organizations to protect users and applications across hybrid environments.
Blog
•Jun 24, 2025
Fortinet Security POC – Zero Trust Network Access (ZTNA)
In March 2023, a Fortinet ZTNA proof of concept test (POC) was completed in the WWT Advanced Technology Center. Here, we present a summary of the testing and results.
Blog
•Aug 8, 2023
Bringing Zero Trust to Life: Practical Innovations from Zscaler Zenith Live 2025
Zenith Live 2025 showcased how Zscaler delivers AI-powered tools that transform Zero Trust from strategy into action, offering advanced segmentation and protections to secure cloud, apps and devices while eliminating threats across complex environments
Blog
•Jun 9, 2025
5 Technology Trends Driving Business Value in Insurance
The insurance industry is transforming digitally, fueled by emerging technologies that are reshaping how insurers operate, engage customers and manage risk. These innovations are not just about modernization but also about unlocking real business value.
Blog
•Jul 30, 2025
Bringing Zero Trust to Life With Microsoft
Zero Trust is not a product, but a strategic approach to security. Still, viewing these principles through a vendor's solutions — like Microsoft's — makes them much easier to apply. Microsoft's tools map directly to the seven core pillars of modern Zero Trust. Here's how each pillar is addressed with Microsoft technologies that help bring each concept to life.
Blog
•Jul 16, 2025
Segmentation: A Critical Pillar of Cybersecurity in the Zero Trust Era
As cybersecurity threats increase, organizations are adopting segmentation—a core element of the Zero Trust security model—to better protect sensitive data and critical infrastructure.
Blog
•Apr 23, 2025
Work Securely from Anywhere with Zero Trust
Picture working from a coffee shop, a park or your comfy couch. Your office can be anywhere now, but this flexibility makes protecting company data more challenging. That's why Zero Trust is crucial. In this blog, we'll explain what Zero Trust means, why it matters for secure remote work and share clear examples—especially for those working on the go with different devices.
Blog
•Jul 14, 2025
Zero Trust: Fact or Fiction?
The excitement surrounding Zero Trust has made it challenging to distinguish fact from fiction. Zero Trust taken literally is not feasible, as trust is a fundamental aspect of cybersecurity. However, implementing Zero Trust principles is achievable. At WWT, our Zero Trust Team adopts a practical approach to help organizations separate Zero Trust facts from fiction.
Blog
•Nov 12, 2024
Achieve Zero Trust Segmentation with Illumio: Now Available in WWT's Advanced Technology Center
We are excited to announce the availability of Illumio in WWT's Advanced Technology Center (ATC). This hands-on experience will empower you to seamlessly implement Zero Trust principles and enhance your security posture.
Blog
•Apr 24, 2025
The Versatile Data Center Smart Switch: Cisco N9300
The Cisco Nexus N9300 Smart Switch revolutionizes data center infrastructure with its convergence of high-performance switching, network security and application services. Featuring Cisco Silicon One ASICs and a Data Processing Unit, it offers intelligent, service-aware capabilities. Optional Hypershield enhances zero-trust security, making it ideal for AI, hybrid cloud and security-conscious environments.
Blog
•Jun 25, 2025
The Zero Trust Balancing Act: Navigating the Tightrope to Secure Your Organization
Zero Trust is reshaping cybersecurity, driven by evolving threats and regulatory demands. However, its implementation is challenging, requiring a balance between grand strategy and tactical execution. Organizations must navigate this tightrope to avoid pitfalls and achieve true Zero Trust. Our team offers a step-by-step process to guide this complex journey.
Blog
•Nov 11, 2024
Delivering Modern ZTNA: How Okta and Palo Alto Networks Work Better Together
Okta and Palo Alto Networks synergize to create a robust Zero Trust Network Access (ZTNA) architecture. By integrating identity management and network security, they enable dynamic, policy-driven access across users, applications and devices for continuous validation and enforcement. Discover how these technologies connect to secure modern work environments.
Blog
•Apr 3, 2025