Varonis Header
  • Product Presentation
  • Management I
  • Cloud Security
  • Data protection / GDPR
  • Data security / DLP / Know-how protection
  • Endpoint Protection
  • Network Security / Patch Management
  • Trend topic

Implement Zero Trust as security strategy with Varonis

Zero Trust, strat. Measures to prevent privacy violations: Varonis' data-oriented approach against ransomware, APTs and insiders

10/8/2020 3:30:00 PM – 10/8/2020 3:45:00 PM

Please log in or register in advance so that you can take part in actions or watch videos about the action!

This action is available to the it-sa 365 community as a video.

Varonis Header
  • Product Presentation
  • Management I

Zero Trust, strat. Measures to prevent privacy violations: Varonis' data-oriented approach against ransomware, APTs and insiders

Language: German

Questions and Answers: Yes

graphical blue background
close

This video is available to the it-sa 365 community. Please register or log in with your login data.

Action description

Like "machine learning" and AI, Zero Trust is one of the buzz words in cybersecurity. With all the hype, it's important for you to understand what Zero Trust actually is: Zero Trust is based on the principle "never trust, always verify" and was developed to fully protect modern digital environments. In a world where anyone can access data from anywhere, it is no longer enough to simply protect the perimeter of the network. Zero Trust's principles therefore turn the traditional perimeter-based model upside down and focus on securing what matters most: the data. Watch the lecture to learn what Zero Trust stands for and what concrete steps are needed to put it into practice. With Varonis, you can rely on a data-oriented security approach that reliably helps to defend against ransomware, APTs and insider threats.

In the webinar we will show the following: Identifying sensitive data with scalable classification / Creating an audit trail around the sensitive data / Creating microperimeters by limiting access to data / Monitoring potential threats / Automation in reaction and damage repair

read more

Speaker