Illumio webinars
Watch live or on-demand to learn how you can stop ransomware, contain cyberattacks, and reduce risk on your path to Zero Trust
Upcoming webinar
Featured webinars
More webinars
Zero Trust Through Identity-Based Segmentation
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict identity verification and access control for every user or workload offers an alternative that secures data while ensuring it is accessible to those who need it.
But adopting this security model can’t be done overnight, and organizations need to find the best way of implementing it. Join security experts Martin Kuppinger, Principal Analyst at KuppingerCole and Trevor Dearing, EMEA Director of Technology at Illumio as they discuss this challenge and explore the value of network segmentation as a departure point.
Martin Kuppinger will discuss the key elements of Zero Trust and the business benefits – especially in the post-Covid era of increased working from home. He will also look at the most common barriers to implementation, and discuss ways of overcoming them.
Trevor Dearing will share insights from customer implementations of Zero Trust, and explain how how segmenting datacentres, the cloud, or both can provide a departure point. He will analyse the results of a recent survey of enterprise views on Zero Trust, explain the concept of Identity-based segmentation and its security benefits, how this is delivered by the Illumio Core software, and how this supports a Zero Trust approach.
Join this webinar to:
. Get a thorough understanding of the Zero Trust concept and its business benefits
. Learn about the common barriers to Zero Trust implementation and potential solutions
. Discover the short- and long-term benefits of network segmentation
. Learn how segmentation slows attackers and improves regulatory compliance
. Gain the benefit of insights from an enterprise survey on Zero Trust adoption
. Find the answers to your questions about Zero Trust
. Get an overview of Illumio Core’s key capabilities
Illumio & Splunk: An Integrated Approach to Your Zero Trust Journey
Investing in a Zero Trust approach to security helps organizations mitigate cyber threats by improving their preventative controls and enhancing their ability to detect and respond to incidents.
Illumio Core enables customers to see every flow within their environment, understand application dependencies, and enforce context-based micro-segmentation policies. Splunk, with its powerful analytics, alerting, and response capabilities, allows users to ingest the telemetry that Illumio provides, identify anomalous behavior and trigger preventative action. Brought together, Illumio Core and Splunk provide an effective way to protect and defend against the threat of lateral movement.
Join this webinar to understand how customers can take advantage of the Illumio/Splunk integration to:
. Support their move to Zero Trust,
. Enhance their ability to detect and mitigate threats, and
. Improve their overall security posture.
5 Security Design Practices for Your Modern Data Center
Today’s data center network is changing with the adoption of technologies like SDN, HCI, and virtualization that enable greater IT efficiency, programmability, and network agility to enable your business to move faster with the delivery of dynamic workloads anytime, anywhere.
With Illumio, we can help you to rethink your approach to reduce security complexity and better secure your data center fabric while reducing risk and strengthen overall security and availability.
Watch this webinar today where our expert will present how you can design an effective data center security strategy to enable robust protection of your workloads everywhere.
This webinar will cover the following data center and hybrid cloud security topics including:
· Key trends, challenges and recommended security strategies for securing your data center fabric and multi-cloud environment for effective Zero Trust.
· 5 best practices to extend simpler security across your across on-prem data centers and multiple public, private, and hybrid clouds.
Segment in Minutes: Accelerate Your Path to Zero Trust
Accelerate and Simplify your Ability to Enforce Security Policy
We can help to accelerate your Zero Trust Segmentation journey with a new approach to how you manage your segmentation security policy. Illumio Core allows your organization to safely create security policy at scale on time, simplify cloud migrations, and expand the scope of your Zero Trust Architecture.
Join us to hear how Illumio Core will help guide you on your journey to Zero Trust success.
- Use segmentation to achieve your Zero Trust strategy quickly and securely
- Progressively deploy security across the hybrid cloud
- Build security policies at scale for the computing environment that can make the difference
between success and failure
- Eliminate security silos to help you reduce risk, lower cost, and save time to deploy for Zero Trust
Zero Trust: Practical Steps to go from Strategy to Reality
Zero Trust is a security strategy and framework based on the concept that you must never trust, always verify. Learn practical ways to implement Zero Trust with confidence. Align to Forrester’s framework for Zero Trust and minimize your attack surface, improve visibility, reduce complexity and cost, and strengthen your overall security to protect your business from data loss and cyber breaches.
Micro-Segmentation and Compliance
Industry regulators and standards bodies are increasingly mandating micro-segmentation as a necessary control in company networks in order to limit the ability of attackers to move laterally. In this presentation we cover the basics of micro-segmentation, understand how effective this control is in hindering attackers, look at what has driven change in compliance requirements, and wrap up by looking at a specific mandate and how micro-segmentation can be used to achieve it.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?