
Security and Compliance Blog
Learn security strategies, compare vendors, and implement best practices to prevent breaches and compliance violations from risky third party communications.
Posts by Tim Freestone

Tim Freestone, Chief Strategy and Marketing Officer, Kiteworks
Tim joined Kiteworks as chief marketing officer in 2021 and brings over 15 years of experience in marketing and marketing leadership, including demand generation, brand strategy, and process and organizational optimization. Tim was previously vice president of marketing at Contrast Security, a scale-up application security company where he built out the marketing organization globally, modernized and mechanized the team's execution, and elevated the company into a world-class brand. Before Contrast, Tim was the vice president of corporate marketing at Fortinet, a multi-billion-dollar, next-generation firewall and cloud security company. In that role, he rebranded Fortinet and built out the comprehensive go-to-market operations for eight solutions encompassing more than 30 products. Prior to Fortinet, he was director of Americas demand, strategy and operations at NetApp where he built out the programmatic demand execution for the Americas and optimized operations to ensure effective lead flow and opportunity creation through sales. Before NetApp, Tim co-founded a marketing services agency where he created and led the execution of hundreds of marketing programs for large and small technology companies. Tim holds a Bachelor’s degree in Political Science and Communication Studies from The University of Montana.


DRM Strategies for Shielding Sensitive Content from AI Large Language Models

Digital Rights Management Software Buyer’s Guide

Managed File Transfer Strategies for Secure Communication Between Government Agencies

Reframing Managed File Transfer’s Role in the Modern Enterprise

Understanding Key Aspects of Data Compliance

Compliance Made Easy: Secure File Transfer Solutions for Professional Services

Emerging Trends in Data Sovereignty

Avoid These Data Sovereignty Pitfalls

5 Steps to Data Sovereignty Success

Data Sovereignty for Financial Services Companies

Secure File Transfer for Manufacturing: Best Practices and Solutions

How to Achieve Intellectual Property Protection with Secure File Transfer

Meet UK Government Standards for Secure File Sharing in the Public Sector
