INSIGHT

Insider series: Five zero trust questions every large business needs to ask

Thinking about moving to a zero trust approach to cybersecurity? Our resident networking and cybersecurity experts answer five of the most important questions you need answers to before you can make a decision.

In the last episode of our Insider series we gave you an overview of zero trust: what it is, how it works and why it’s different to what you’re used to. 

This time we’re digging deeper into the various benefits of zero trust, including some pointers on how to make it work for your organisation. 

We caught up with two people who are most definitely in the know – James Booker and Tim Ryan – and asked them some of the most common questions we hear about zero trust:

  1. 1. How does zero trust impact the customer and employee experience?
  2. 2. Why is zero trust so important now?
  3. 3. How do you go about buying zero trust?
  4. 4. Is zero trust possible without a modern network?
  5. 5. What else do organisations need to bear in mind when it comes to zero trust?
  6.  

Want to know the answers to these questions and more?

Fill in the form to watch the full webinar now

Download
today!

Enter your details to watch the webinar.

*Required

  1. First name is required.
  2. Last name is required.
  3. Company name is required.
  4. Phone number is invalid.
  5. Email address is required. Email address is invalid.
  6. By submitting your request, you are providing your consent for Virgin Media Business to contact you to discuss your requirements and Virgin Media Business Services from time to time, including for marketing purposes.*

  7. Please tick 'I Agree' to submit your form.
  8. Further details on how Virgin Media Business will use your data, including details on how to opt-out of further communications, can be found in our privacy policy

 
 

Share this article:

Latest insights

 
 
 
 
 
 

Protect

Integrate security with connectivity so it’s easy and intuitive for you and every employee, reducing the risk of a data breach

 
 
 
 
 
 

Like this article? You may also be interested in these too!