Overview
Explore
Labs
Services
Events
Partners
Select a tab
18 results found
Fortinet Security POC – Zero Trust Network Access (ZTNA)
In March 2023, a Fortinet ZTNA proof of concept test (POC) was completed in the WWT Advanced Technology Center. Here, we present a summary of the testing and results.
Blog
•Aug 8, 2023
Achieve Zero Trust Segmentation with Illumio: Now Available in WWT's Advanced Technology Center
We are excited to announce the availability of Illumio in WWT's Advanced Technology Center (ATC). This hands-on experience will empower you to seamlessly implement Zero Trust principles and enhance your security posture.
Blog
•Apr 24, 2025
Segmentation: A Critical Pillar of Cybersecurity in the Zero Trust Era
As cybersecurity threats increase, organizations are adopting segmentation—a core element of the Zero Trust security model—to better protect sensitive data and critical infrastructure.
Blog
•Apr 23, 2025
Delivering Modern ZTNA: How Okta and Palo Alto Networks Work Better Together
Okta and Palo Alto Networks synergize to create a robust Zero Trust Network Access (ZTNA) architecture. By integrating identity management and network security, they enable dynamic, policy-driven access across users, applications and devices for continuous validation and enforcement. Discover how these technologies connect to secure modern work environments.
Blog
•Apr 3, 2025
Guarding the Cyber Fortress: Zero Trust vs. Segmentation
In the realm of cybersecurity, terms like zero trust and segmentation are often intertwined, but they should not be used interchangeably. Zero trust is a comprehensive security strategy based on the principle that no asset or entity is explicitly trusted, whereas segmentation is a tactical approach used within the zero trust framework. Let's explore how segmentation functions as a part of tero trust and why distinguishing between these terms is critical.
Blog
•Apr 23, 2025
SSL Orchestrator Use Case: Secure Web Gateway (SWG) "as a Service"
This article explains how to run and configure Secure Web Gateway (SWG) "as a service" inside the Service Chain for an SSL Orchestrator.
Blog
•Jun 24, 2024
Zero Trust: Fact or Fiction?
The excitement surrounding Zero Trust has made it challenging to distinguish fact from fiction. Zero Trust taken literally is not feasible, as trust is a fundamental aspect of cybersecurity. However, implementing Zero Trust principles is achievable. At WWT, our Zero Trust Team adopts a practical approach to help organizations separate Zero Trust facts from fiction.
Blog
•Nov 12, 2024
3 Critical Steps in Implementing a Mature & Resilient Zero Trust Architecture
In publishing the "Executive Order on Improving the Nation's Cybersecurity" in May, the White House set a 60-day deadline for agencies to develop a plan to implement a Zero Trust Architecture based upon standards and guidance from the National Institute of Standards and Technology (NIST).
Blog
•Apr 12, 2022
The Zero Trust Balancing Act: Navigating the Tightrope to Secure Your Organization
Zero Trust is reshaping cybersecurity, driven by evolving threats and regulatory demands. However, its implementation is challenging, requiring a balance between grand strategy and tactical execution. Organizations must navigate this tightrope to avoid pitfalls and achieve true Zero Trust. Our team offers a step-by-step process to guide this complex journey.
Blog
•Nov 11, 2024
ZTNA: More Than Just an Acronym
Zero Trust Network Access (ZTNA) is not just a buzzword your management is emphasizing; it's a critical design principle that should be integrated into your network security practices.
Blog
•Dec 5, 2024
The Grizzled CyberVet: State of Network Security
Network security has evolved rapidly, with the field now embracing zero trust, AI-driven defenses and integrated platforms. The next five years will see AI, SASE and quantum-resistant cryptography reshape the landscape. Enterprises must consolidate tools, adopt AI automation and prioritize identity-first security to stay ahead of increasingly sophisticated cyber threats. Secure your future now.
Blog
•Feb 18, 2025
Understanding the Cybersecurity Kill Chain: A Simple Guide
As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the cybersecurity kill chain. We simplify and explain this model used by attackers to compromise your digital ecosystem.
Blog
•Nov 6, 2024