Overview
Explore
Labs
Services
Events
Partners
20 results found
Cisco ISE 802.1x with Cisco Secure Access by Duo MFA
Improving security posture by enforcing strong authentication methods . This scenario utilizes Cisco Secure Access by Duo for Multiple Factor Authentication (MFA) in a Cisco Identity Services Engine (ISE) 802.1x environment.
Video
• 4:01
• Oct 16, 2022
Emerging and International Security Risk: Executive Perspectives
A rapidly evolving threat landscape is putting security leaders and their teams on their heels. Cyber attacks, AI, nation-state bad actors, regulatory changes — the list is growing by the day. Watch WWT's Vice President of Global Cybersecurity Chris Konrad as he hosts an executive discussion with Dave DeWalt (Founder and CEO of NightDragon), Rob Joyce (former Director of Cybersecurity for the NSA) and Kate Kuehn (WWT's Global Head of Cybersecurity Advocacy) as they explore strategies for government collaboration, board preparation and future cybersecurity challenges. They'll provide actionable advice for organizations to enhance their resilience against current and future cyber threats.​
Video
• 1:37
• Nov 19, 2024
Wiz Operating Platform Demo
Learn about Wiz's simply intuitive user interface, built on the Wiz Security graph.
Video
• 10:12
• Oct 30, 2024
Shift Left to Protect APIs with F5 | Partner Spotlight
APIs have become the backbone of modern digital interactions, connecting everything from morning coffee purchases to streaming services. But the rise of API-centric architectures has drastically expanded the attack surface -- over 90 percent of web-based cyberattacks are now targeting API endpoints, exploiting new vulnerabilities often overlooked by security teams – and rendered traditional security measures are no longer sufficient.
Join F5 Field CTO Chuck Herrin and WWT's Head of Global Cyber Strategy Traci Byrne as they talk about the urgent need for more dynamic and comprehensive defense strategies to prevent breaches. Chuck and Traci detail how security teams can "shift left" to better address API risks and vulnerabilities and outline practical steps security leaders can take to bolster their defenses.
Video
• 0:39
• Aug 21, 2024
Partner POV | Enhancing Security with WWT, ExtraHop and Gigamon
The newest Power of 3 offering features channel partner WWT and leading network security company ExtraHop to provide customers with real-time, precise threat detection by integrating the ExtraHop network detection and response (NDR) platform RevealXâ„¢ with the Gigamon Deep Observability Pipeline, sold and serviced by WWT.
Video
• 43:28
• Sep 16, 2024
Elastic Endpoint Security Lab Overview
This video provides a brief overview of the Elastic Endpoint Security Lab and allows users to get a sneak peek before entering the sandbox.
Video
• 1:12
• Sep 9, 2022
Security Monitoring with FortiSIEM in Multi-Tenant Environments | Security Operations
Unified Event Correlation and Risk Management for Modern Networks
Video
• 4:04
• Sep 29, 2023
Partner POV | Gen AI- Powered XDR
Minutes matter — Shut down threat actors and mobilize your response using our open, AI-powered XDR Platform.
Video
• 3:25
• Aug 16, 2024
QRadar XDR Live on CP4S SaaS Platform
See It - SOAR-XDRC- Ransomware
Watch a video demonstration of the IBM QRadar Ransomware use case being delivered
Video
• 41:24
• Apr 14, 2023
Meeting Today's Modern Endpoint Security Requirements
Reduce your cyber risk despite an industry-wide shortage of cybersecurity professionals.
Video
• 1:07
• May 17, 2023
Partner POV | Better with X
Reduce risks across the attack surface with Trellix's innovative solutions.
Video
• 5:30
• Jun 25, 2024
Beat cyber adversaries at their own game with Cisco XDR
With Cisco XDR you'll be better prepared to take on the most sophisticated cyberattacks, and win. All your telemetry correlated. Detections prioritized and contextualized. Automation shutting them down so fast. A good day for you, a bad day for them.
Video
• 1:22
• Jan 2, 2024