Illumio webinars
Watch live or on-demand to learn how you can stop ransomware, contain cyberattacks, and reduce risk on your path to Zero Trust
Upcoming webinar
Featured webinars
All webinars
Ransomware Happens. We Stop It From Spreading: Take Action to Contain Ransomware
In the last installment of our three-part series, “Ransomware Happens. We Stop It From Spreading,” we offer best practices for containing ransomware — fast.
Sadly, even if you can identify ransomware — it’s often difficult to stop it from spreading. Most organizations don’t have the ability to quickly shut down affected ports without major disruption or the firewalls simply aren’t close enough to reduce spread very much. In this session, we will discover the proactive (before breach) and reactive (after breach) capabilities that stop malicious code from spreading and isolate critical systems from infection.
Join us for this information-packed webinar to learn how to:
● Shut down network communication on unnecessary, risky and typically abused ports
● Reduce the spread of attacks and ransomware by integrating real-time Illumio data into your SIEM/SOAR during SecOps investigations
● Surgically severing network communications to isolate unaffected high-value applications and infected systems
Ransomware Happens. We Stop It From Spreading: Assess Your Vulnerabilities
In part two of our three-part series, “Ransomware Happens. We Stop It From Spreading,” we discuss one often overlooked catalyst for network breaches: technical debt.
Unwanted and outdated services that are still active are notorious for inviting in threat actors. But you can limit your breach exposure and improve your digital defenses by pinpointing the applications and systems most at risk. And Illumio can help.
Join us for this new webinar to learn how. During this in-depth discussion, you’ll discover how to:
● Block risky ports and non-compliant data flows commonly abused by ransomware and other cyberattacks
● Focus on the most vulnerable applications and workloads
● Restrict applications exhibiting excessive communications or interacting with the internet or command and control servers
Ransomware Happens. We Stop It From Spreading: How to Gain Risk-Based Visibility
In our new three-part series, “Ransomware Happens. We Stop It From Spreading,” Illumio offers simple approaches for mitigating the damage ransomware and other cyberattacks can have across your hybrid cloud network, data estate and endpoints.
In this first webinar of the series, learn how to visualize communications across your applications, devices and the cloud, to better understand your systems at risk, and easily enforce least privilege access to prevent the spread of breaches.
You’ll discover how to:
● Gain the visibility required to quickly identify applications whose workloads that are creating unnecessary security risks
● Identify in/out of scope systems and flows in compliance environments
● Find deprecated services and see how legacy unpatched systems can be reached
● Reduce internal friction between departments — and forge tighter collaboration across NetOps, SecOps, and DevOps
Zero Trust: Help or Hype?
Zero Trust promises to mitigate the serious security challenges brought about by cloud migration and other digital transformation initiatives — but do you actually know what it is? Many security professionals are still confused, according to our new “Current State of Zero Trust in the United Kingdom” study.
Join this information-packed webinar to learn all about our findings, including how organizations in the United Kingdom are approaching Zero Trust and the biggest challenges they’re facing. Plus, receive timely, practical advice you can use to start or continue along your Zero Trust journey.
You’ll be able to listen to us cover key findings, supported by survey data including:
• Why there is an inconsistency of understanding Zero Trust.
• How to achieve buy-in from internal stakeholders for your Zero Trust project.
• Adopt a Zero Trust strategy to solve for specific problems and accelerate projects like digital transformation.
• Learn how segmentation fits in with Zero Trust and how to use it better.
See Your Risks. Take Simple Steps to Stop Ransomware.
Preventing a cyber breach is nearly impossible. Traditional detection and response security technologies are no longer enough. It only takes one open door to expose your entire network.
Illumio makes it quick and easy for you to see your vulnerabilities and take simple steps to protect your organization. Benefit from our risk-based visibility into application communications and our radically simple policy creation.
Join Katey Wood, Director of Product Marketing at Illumio, for an in-depth discussion about how organizations can quickly and easily gain the visibility they need to protect themselves from ransomware and other cyberattacks.
You'll learn how to:
• Capture critical insights in as little as an hour by automatically mapping all communications across your applications, devices and their interactions with the Internet.
• Improve your digital defenses and limit your breach exposure by pinpointing the applications and systems that are most at risk.
• Contain ransomware and other cyberattacks proactively and during an incident by blocking unsafe network communications and integrating Illumio data into SecOps.
Automated Enforcement Advances: Protect Against Ransomware & Cyberattacks
Attackers are continuing to successfully set off cyber disasters across the globe. Organizations that focus solely on detection and response find that they can’t detect or respond fast enough. Cyberattacks and ransomware break through perimeters and then leverage common ports to stay undetected until they have spread throughout an organization.
Illumio Core has new advancements that allows organizations to protect their key assets from Cyberattacks and Ransomware in minutes - across multi cloud, containers, hybrid and on-premises environments.
Join Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio to learn about how these new innovations can help you:
• Immediately enforce security policy across your organization to protect high-value assets.
• Dramatically reduce the risk of supply-chain attacks like the recent Kaseya ransomware.
• Scale as needed to enforce more than 100,000 workloads in cloud, hybrid, and on-premises environments.
• Get real-time visibility and insights to create, enforce, and test security policy.
• Monitor workloads in and out of applications hosted in public clouds to simplify and secure cloud migrations and automate multi-cloud security.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?