Illumio webinars
Watch live or on-demand to learn how you can stop ransomware, contain cyberattacks, and reduce risk on your path to Zero Trust
Upcoming webinar
Featured webinars
All webinars
Network Segmentation Without a Single Firewall Rule
To prevent malware epidemics that are designed to move laterally, Stowe Australia needed stronger data center segmentation, limiting the spread of breaches by blocking unauthorized East-West traffic and reducing lateral movement.
While already segmented into coarse zones through the WAN with firewalls, Stowe’s IT team, led by Karl Houseman, sought a higher degree of granularity. Listen to this on-demand webinar where Karl and Illumio's Andrew Kay cover:
• How Stowe avoided manually programming firewalls with a solution that they had up and running in a day.
• How to prevent unauthorized hopping between branches, servers, and applications on a flat network.
• What happens when you pit Illumio against leading firewall vendors in a live Segmentation Showdown demonstration
Reducing Security Complexity While Accelerating ACI Fabric Deployment
Today’s data centers are becoming more dynamic than ever to securely deliver workloads everywhere – across on-prem data centers and multi-cloud environments. Cisco ACI fabric enables greater IT efficiency, programmability, and network agility to enable your business to move faster. But with Illumio, you can rethink your approach to securing your ACI fabric across environments while reducing risk, business disruptions, and breaches.
Hear our experts present how to deploy a simpler approach to strengthen overall security and accelerate your ACI fabric deployment. They discuss how you can take advantage of hybrid cloud security topics including:
• Key trends, challenges, and recommended security strategies for securing your ACI fabric environment
• An overview of ACI and Illumio security technologies, architectures, and technology deep dive
• Best practices and use cases to extend simpler security across your ACI fabric
How to Secure National Assets with Segmentation
Federal Government IT leaders are challenged with three big pain points: modernising IT infrastructure by migrating to public clouds; improving cyber resiliency; and, more recently, securely and reliably enabling employees to work remotely
Watch this webinar with industry security experts and Illumio thought leaders to learn how segmentation is a proven mitigating strategy that allows you to gain visibility across distributed environments, shut down the attack surface, and reduce exposure of your most critical assets.
You'll learn:
• How to prevent lateral movement attacks and secure your high value assets;
• How a Zero Trust model is sustainable for federal government;
• How government leaders can patch systems and contain holes with vulnerability maps;
• What Common Criteria ‘Certifications and Regulations’ need to be met; and
• ‘Must-do’ steps peers have taken to validate solutions that meet their requirements.
Operationalizing an Effective PCI Segmentation Architecture
PCI DSS requires 100% compliance at all times. But maintaining compliance and executing the recommendations on scoping and segmentation can be difficult.
Watch as PCI segmentation expert, Vivian Tero, explains the current state of PCI compliance, shares customer insights on critical capabilities for effective PCI segmentation, and demonstrates key Illumio capabilities.
Zero Trust for the Endpoint
With remote work, the home office has effectively become a local, unmonitored extension of the corporate network – with more risk and less visibility or control.
In this ActualTech Media Ecocast, see how Zero Trust for the endpoint with Illumio Edge helps IT quickly parse activity and contain ransomware by default, with Illumio Director of Product Marketing Katey Wood.
Watch to learn how to:
• Quickly deploy Zero Trust endpoint segmentation that protects even against zero-day threats.
• Gain real-time visibility and create policies to stop unauthorized traffic.
• Prevent the spread of ransomware on endpoints – on or off the network.
• Contain ransomware and malware to a single endpoint – even if it hasn't been detected yet.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?