accent 1 accent 2
Icon-Check@3x
Live CPE Webinar

5 Steps to Zero Trust with Varonis

Wednesday, 10 Feb | 11:00am GMT

Learn about what Zero Trust means and concrete steps you can take to implement it in practice.

Protecting the edge of your network isn’t enough in a world where anyone can access data from anywhere. The principles of Zero Trust turn the traditional perimeter-centric model on its head and focus on securing what matters most: the data.

See how a data-centric approach to security can help you defend against ransomware, APTs, and insider threats.

*One lucky attendee will win a €200 gift card! (or £ equivalent if preferred)

+ 1 CPE

Register Now

About this webinar

We’ll break down how to get to Zero Trust, covering how to:

  • Identify sensitive data with scalable classification
  • Create an audit trail around sensitive data
  • Architect microperimeters by limiting who has access to data
  • Monitor for potential threats
  • Use automation for remediation and response

It’ll be recorded, so if you can’t make it, register and we’ll send you the replay.

Headshot_TomRossdale
Tom Rossdale SE Team Leader, Varonis UK Ltd, Varonis

Tom has worked in IT Security for more than a decade, and joined the Varonis team in 2014. He has held security roles in both enterprise organisations and cyber security vendors, giving him experience in defending against and mitigating insider threats. Tom’s experience in endpoint protection, encryption and mobile device management has led to his passion to protect data from insider threats and cyberattacks.

“We completely eradicated our global access problem (over 40,000 sensitive folders open to everyone) in 17 days without breaking anything. I couldn’t believe it.”

CISO, Major Online Retailer

Want to see Varonis in action?

Request a demo