Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

it-sa 365: Header Desktop Varonis
Launch Days Management I

Implement Zero Trust as security strategy with Varonis

Zero Trust, strat. Measures to prevent privacy violations: Varonis' data-oriented approach against ransomware, APTs and insiders

calendar_today Thu, 08.10.2020, 15:30 - 15:45

event_available Digital

Action Video

south_east

Action description

south_east

Speaker

south_east

Product

south_east

Themes

Cloud Security Data protection / GDPR Data security / DLP / Know-how protection Endpoint Protection Network Security / Patch Management Trend topic

Event

This action is part of the event Launch Days

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Like "machine learning" and AI, Zero Trust is one of the buzz words in cybersecurity. With all the hype, it's important for you to understand what Zero Trust actually is: Zero Trust is based on the principle "never trust, always verify" and was developed to fully protect modern digital environments. In a world where anyone can access data from anywhere, it is no longer enough to simply protect the perimeter of the network. Zero Trust's principles therefore turn the traditional perimeter-based model upside down and focus on securing what matters most: the data. Watch the lecture to learn what Zero Trust stands for and what concrete steps are needed to put it into practice. With Varonis, you can rely on a data-oriented security approach that reliably helps to defend against ransomware, APTs and insider threats. In the webinar we will show the following: Identifying sensitive data with scalable classification / Creating an audit trail around the sensitive data / Creating microperimeters by limiting access to data / Monitoring potential threats / Automation in reaction and damage repair ... read more

Language: German

Questions and Answers: Yes

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.