In the early days of information security, implementing a perimeter defense was enough to keep your company safe. But today, with so many points of access, a Zero Trust model is necessary. In this episode of B2B Tech Talk, Keri speaks with Ingram Micro tech consultant, Patrick Smith.
Keri and Patrick discuss:
Follow us on Twitter @IngramTechSol #B2BTechTalk
Sponsored by Ingram Micro Security and Ingram Micro Financial Solutions
Listen to this episode and more like it by subscribing to B2B Tech Talk on Spotify, Apple Podcasts, or Stitcher. You can also listen on our website.