/
Zero Trust Segmentation

Zero Trust for the New World

Much has changed since our CTO PJ Kirner last sat down with Forrester’s Dr. Chase Cunningham to discuss strategies for getting started with Zero Trust (if you missed that video, check it out here).

While the remote work movement is nothing new, the shift to a work-from-anywhere workforce means a new wave of security concerns for users and employers alike. A Zero Trust approach to security, with Zero Trust Segmentation as a foundational component, is more relevant than ever.

PJ and Chase reunited (from their respective coasts) to check in on how Zero Trust priorities have evolved in the past year and more recently. Tune in to the video to hear about:

  • Key lessons learned from Zero Trust deployments
  • How Zero Trust priorities are evolving to address the realities of our new world
  • Why it’s time to extend Zero Trust and micro-segmentation to the endpoint

Don't miss:

[2:31] What we can learn from early Zero Trust implementations
[5:42] How Illumio customers are executing micro-segmentation for Zero Trust  
[10:12] Why use micro-segmentation to mitigate ransomware
[13:13] How to use Zero Trust to secure remote work environments
[16:32] What to look for in a Zero Trust solution
[20:56] How to extend Zero Trust micro-segmentation to the edge

“[Organizations] have to approach the problem differently. And the way that they do is they understand: My enterprise was relatively secure before. I thought I had a handle on it, I knew what I needed to take care of. Now I have this endpoint issue, so I have to find a way to bridge between those two things and take care of my users in the wilds of the internet and my core infrastructure. So if you can do those two things and you can apply the same controls at both areas with the same efficacy, you’re enabling Zero Trust.” – Dr. Chase Cunningham

To learn more, check out our page on Zero Trust security.

Related topics

No items found.

Related articles

What You Need to Enforce Zero Trust Policy – Quickly and Securely
Zero Trust Segmentation

What You Need to Enforce Zero Trust Policy – Quickly and Securely

Learn what you need to enforce a Zero Trust policy at your organization.

3 Qualities to Look For in a Zero Trust Segmentation Platform
Zero Trust Segmentation

3 Qualities to Look For in a Zero Trust Segmentation Platform

The best way to protect against cyberattacks spreading throughout your network is to deploy Zero Trust Segmentation, enforcing access controls that block the pathways breaches like ransomware depend on.

Operationalizing the Biden Administration's Cybersecurity Executive Order with Zero Trust
Zero Trust Segmentation

Operationalizing the Biden Administration's Cybersecurity Executive Order with Zero Trust

Ready to operationalize President Biden's cybersecurity executive order with Zero Trust? Read this blog to find out how.

No items found.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?