About this webinar

Learn about what Zero Trust means and concrete steps you can take to implement it in practice.

Protecting the edge of your network isn’t enough in a world where anyone can access data from anywhere. The principles of Zero Trust turn the traditional perimeter-centric model on its head and focus on securing what matters most: the data.

See how a data-centric approach to security can help you defend against ransomware, APTs, and insider threats.

Headshot_TomRossdale
Tom Rossdale SE Team Leader, Varonis UK Ltd

Tom has worked in IT Security for more than a decade, and joined the Varonis team in 2014. He has held security roles in both enterprise organisations and cyber security vendors, giving him experience in defending against and mitigating insider threats. Tom’s experience in endpoint protection, encryption and mobile device management has led to his passion to protect data from insider threats and cyberattacks.

accent
REQUEST A DEMO

Explore our blog