Hi [[ session.user.profile.firstName ]]

5 Security Design Practices for Your Modern Data Center

Today’s data center network is changing with the adoption of technologies like SDN, HCI, and virtualization that enable greater IT efficiency, programmability, and network agility to enable your business to move faster with the delivery of dynamic workloads anytime, anywhere.

With Illumio, we can help you to rethink your approach to reduce security complexity and better secure your data center fabric while reducing risk and strengthen overall security and availability.

Watch this webinar on-demand now where our experts will present how you can design an effective data center security strategy to enable robust protection of your workloads everywhere.

This webinar will cover the following data center and hybrid cloud security topics including:
• Key trends, challenges and recommended security strategies for securing your data center fabric and multi-cloud environment for effective Zero Trust
•5 best practices to extend simpler security across your across on-prem data centers and multiple public, private, and hybrid clouds
Recorded May 7 2021 44 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sam Rastogi, Product Marketing Director and Christer Swartz, Principle Technical Marketing Engineer
Presentation preview: 5 Security Design Practices for Your Modern Data Center

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Fast-track the Cybersecurity Executive Order with Zero Trust Segmentation Recorded: Jun 1 2021 43 mins
    Vivian Tero, Senior Product Marketing Manager, Federal, Illumio
    The Roadmap to Build your Zero Trust action plan in 60 days with Illumio

    Zero Trust Security is no longer just an option for federal agencies, it is a must have.

    The Biden administration issued a long-awaited cybersecurity executive order on May 12, 2021 that requires federal agencies to develop an implementation plan for a Zero Trust security architecture.

    Requirements for federal agencies to implement a Zero Trust Architecture include:
    • Adopt Zero Trust as a security strategy
    • Improve the security and integrity of the software supply chain
    • Develop a plan to implement a Zero Trust Architecture, in line with NIST guidance within 60 days

    Illumio can help fast-track your Agency’s Zero Trust Architecture

    As a Zero Trust Segmentation leader in the Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020 report, we have the solution to help you deliver on your Executive Order Zero Trust action plan.

    Join us for this webinar to learn the details to get you started. We will cover how to:
    • Understand the Executive Order Zero Trust implementation requirements
    • Achieve Zero Trust Architecture deliverables with Illumio Zero Trust Segmentation
    • Adapt NIST 800-207 components and approaches for your organization

    Discover how Illumio can help you fast-track your Executive Order timelines and plan your path to a Zero Trust Architecture.

    “This new Executive Order acknowledges that we fundamentally need to change the way we think about cyber resiliency – and it starts with Zero Trust.” states Andrew Rubin, CEO, Illumio.
  • Zero Trust Is Not No Trust Recorded: May 28 2021 24 mins
    Raghu Nandakumara – Field CTO, Illumio
    In this session we will explore a Zero Trust approach to security and what can often make it seem an obtainable objective, before focussing on strategies that can make it digestible and achievable, and ultimately lead to a constant measurable improvement in an organisation's cyber risk exposure.
  • Building a Zero Trust Strategy. Why it is easier to protect before a breach. Recorded: May 28 2021 31 mins
    Michael Adjei – Systems Engineer, Illumio
    In this session, learn how Illumio helps you solve the threat of lateral movement.  Using Micro-segmentation as a compensating control.
  • The Building Blocks - How Zero Trust meets Illumio Recorded: May 28 2021 30 mins
    Adam Brady – Director, Systems Engineering, Illumio
    In this session, learn how Illumio Core was built from the ground up with the central tenet of a default-deny policy model including:

    - How visibility and Application Dependency Mapping allow for a Zero-Trust network policy to be built
    - Host-based segmentation - and the inherent Zero Trust Advantages
    - Illumio Policy and it's Zero Trust implications
    - Selective Enforcement/Boundaries - and how they can be used to more easily achieve Zero Trust
  • Achieving Success: A Practical Guide to executing Zero Trust Recorded: May 28 2021 31 mins
    Russell Goodwin -Field CTO, EMEA, Illumio
    In this session we will show how to plan your deployment to ensure success and how automation can help achieve success at scale.
  • Zero Trust in Healthcare: The Cyber Immune System Booster Recorded: May 28 2021 24 mins
    Soo Yi Youn – Director Cyber Security Operations, Highmark
    Zero Trust is a concept and an outcome born from examining your organization’s gaps in security and risk posture and identifying where to apply controls that enforce least privilege and the greatest levels of visibility and segregation.

    As a security leader in healthcare, I examined Zero Trust through the lens of how we’ve managed the COVID19 pandemic and identified parallels between Zero Trust and modern disease management. We take medication, wear masks and wash our hands, and use other controls like vaccines to prevent the spread of a virus.

    That is actually a common use case of Zero Trust security – designing controls to prevent an unauthorized asset/resource & minimizing impact from an intruder or infection by preventing lateral movement. Humanity will always be battling disease, just like organizations will always have threat actors and adversaries attempting to breach controls. In this presentation, we’ll use concepts from disease management to explain Zero Trust security, and the practical business outcomes, security improvements and metrics you need to boost your own organization’s cyber immune system.
  • A Real-World View on Zero Trust Recorded: May 28 2021 15 mins
    Richard Brinson – CISO, Savanti  and Trevor Dearing, Product Marketing Director, Illumio
    What does Zero Trust really mean to a CISO on a day-to-day basis?

    Richard Brinson, CISO, Savanti discusses with Trevor Dearing, Illumio how priorities are agreed in organisations.
  • Paving the Road to Zero Trust from the Data Centers to Clouds to the Edge Recorded: May 25 2021 64 mins
    Matt Glenn, VP of Product Management, Illumio and Guest Speaker, David Holmes, Senior Analyst, Forrester Research
    Many organizations are now adopting the Zero Trust security mindset of “never trust, always verify” to segment internal networks and prevent the spread of breaches. As your applications move across multiple on-prem and multiple clouds and your users transition to a distributed work-from-anywhere model, Zero Trust must be extended across the enterprise to reduce the attack surface. As a result, micro-segmentation has become a foundational component for Zero Trust. As your operating models evolve, the need for a holistic Zero Trust approach is even more urgent.

    Join Illumio’s VP of Product Management, Matt Glenn and guest speaker, David Holmes, Senior Analyst at Forrester Research to learn how to design and implement an effective strategy for end-to-end Zero Trust from endpoints to data centers and the cloud.

    In this webinar you will learn:

    • What is the current state of Zero Trust and how has it evolved?
    • Best practices and design considerations to achieve end-to-end Zero Trust
    • Live Demonstration from Illumio to see how it works for effective Zero Trust Segmentation




    Forrester and Forrester Wave™ are trademarks of Forrester Research, Inc.
  • Zero Trust: Practical Steps to go from Strategy to Reality Recorded: May 25 2021 32 mins
    Sam Rastogi, Product Marketing Director, Illumio
    Zero Trust is a security strategy and framework based on the concept that you must never trust, always verify. Learn practical ways to implement Zero Trust with confidence. Align to Forrester’s framework for Zero Trust and minimize your attack surface, improve visibility, reduce complexity and cost, and strengthen your overall security to protect your business from data loss and cyber breaches.
  • Zero Trust for the Endpoint: Control the Conversation Recorded: May 19 2021 45 mins
    Illumio Director of Product Marketing, Katey Wood and Director of IT, Matt Parsons
    With remote work, the home office has effectively become a local, unmonitored extension of the corporate network – with more risk and less visibility or control.

    In this webinar, see how Zero Trust for the endpoint with Illumio Edge helps IT quickly parse activity and contain ransomware by default, with Illumio Director of Product Marketing Katey Wood and Director of IT Matt Parsons.

    Watch to learn how to:

    • Quickly deploy Zero Trust endpoint segmentation that protects even against zero-day threats.
    • Gain real-time visibility and create policies to stop unauthorized traffic.
    • Prevent the spread of ransomware on endpoints – on or off the network.
  • Securing Remote Endpoints in a Hybrid Workforce Recorded: May 18 2021 42 mins
    Katey Wood, Director of Product Marketing and Nagi SriRanga, Technical Marketing Engineer
    Watch now as we review Illumio’s Security Risks 2021 endpoint security survey report on how businesses are protecting employee endpoints, on or off the corporate network. You’ll also be able to listen to us cover other key topics including…

    • What security visibility and control does IT have into endpoints on ungoverned home networks?
    • Considerations for preventing the spread of ransomware like Ryuk, and even Zero Day threats, into mass infections
    • Where Zero Trust security fits in a hybrid model as employees – and their endpoints – start returning to the campus network
  • See and Stop Lateral Movement with Crowdstrike and Illumio Recorded: May 17 2021 44 mins
    Katey Wood, Director of Product Marketing, Neil Patel, Sr. Technical Marketing Engineer, Christian Rencken
    CrowdStrike’s unified endpoint and workload protection provides defense-in-depth, now coupled with Illumio Edge for a Zero Trust approach to proactively prevent attacker lateral movement and the spread of ransomware.

    Watch this webinar to:

    • Understand more about the lateral movement exhibited by ransomware that drives high-profile breaches.
    • See and understand potential lateral movement–or legitimate business traffic—and use this security visibility to address attacks or better understand business needs by allow-listing a truly legitimate, necessary service.
    • Learn how the CrowdStrike Falcon agent now calls on Illumio’s endpoint Zero Trust for threat containment to limit the cyber risk associated with major cyberattacks.
  • Illumio Customer Stories: A Year in Review & What's Next? Recorded: May 16 2021 61 mins
    Trevor Dearing, Soo Yi-Thompson, Director, Cybersecurity, Highmark, Madhuri Manikonda, Director, IT Network, ServiceNow
    If you’re wondering how to secure your organization, there’s no better time to hear directly from two Illumio customers about how they successfully protect their sensitive data with micro-segmentation.

    Join us for an hour of informative and candid conversations with our Director of Product Marketing, Trevor Dearing, who will be speaking with...

    • Soo Yi-Thompson - Director, Cybersecurity, Highmark
    • Madhuri Manikonda - Director, IT Network and Communication Services, ServiceNow
  • How to Stop Crippling Breaches with End-to-End Segmentation Recorded: May 14 2021 50 mins
    Neil Patel, Sr. Technical Marketing Engineer and Dan Gould, Product Marketing
    Segmentation and visibility across your endpoints, data center, and cloud are critical to stopping ransomware and attacker lateral movement.

    In this webinar, Neil Patel, Sr. Technical Marketing Engineer, unpacks why and demos how to use Illumio Core and Illumio Edge for end-to-end segmentation.

    Watch to learn how to:

    • Achieve end-to-end segmentation without infrastructure restrictions or impact on application performance.
    • Gain real-time visibility across environments and create policies to stop unauthorized traffic.
    • Proactively prevent the spread of ransomware on endpoints – on or off the network.
  • Introducing Illumio Edge: Bringing Zero Trust To The Endpoint Recorded: May 13 2021 60 mins
    Bobby Guhasarkar, CMO and Neil Patel, Sr. Technical Marketing Engineer
    The ‘new normal’ of work-from-anywhere has made effective endpoint protection more critical than ever. With the rise of quick-propagating ransomware, the remote workforce can be the weakest link to mass malware infections. To bridge the gap, Illumio is proud to bring its leadership in Zero Trust to the endpoint, the first product of its kind: Illumio Edge.

    Join our upcoming webinar to discover how to contain threats to a single infected machine by default, before other tools can even detect and respond.
  • Enabling End-to-End Zero Trust in a Distributed World Recorded: May 12 2021 62 mins
    Sam Rastogi, Product Marketing Director and Matt Glenn, SVP Product Management
    Join Illumio, the company recently featured as a Zero Trust Wave Leader by Forrester, to learn how to deploy end-to-end Zero Trust segmentation from endpoints to datacenters and the cloud.

    In this webinar you will learn:

    • What is Zero Trust and why it’s more important than ever
    • How Illumio aligns to Forrester’s ZTX framework
    • Best practices to achieve end-to-end Zero Trust
  • Simplify & Automate Workload Security with Illumio and Palo Alto Networks Recorded: May 11 2021 58 mins
    Sam Rastogi, Product Marketing Director, Christer Swartz, Technical Marketing Engineer, Harish Chakravarthy
    See the following when you watch this webinar:

    • Key challenges and customer requirements to secure today's workloads.
    • An overview of the Illumio and Palo Alto Network's solution, integration use cases, and integrated architectures for effective micro-segmentation and Zero Trust.
    • Live demonstration and best practices to reduce complexity and help you better operationalize dynamic security policies for workloads in Panorama and in Palo Alto Networks NGFWs.
  • CrowdStrike and Illumio: Ransomware That Can't Move, Can't Spread Recorded: May 9 2021 44 mins
    Michael Sentonas, CTO, CrowdStrike and Andrew Rubin, CEO, Illumio
    Attacks that drive headlines have one thing in common: lateral movement. This is when ransomware or attackers, after gaining initial access, spread through an environment to reach C-suite users, reach data center crown jewels or ransom endpoints.

    Lateral movement is what turns an attack on a single endpoint into a huge breach. And like it or not, it is the secret ingredient of successful ransomware and attacks.

    Watch On-Demand to:
    • Understand more about the lateral movement exhibited by ransomware that drives high-profile breaches.
    • Learn how CrowdStrike’s ecosystem now calls on Illumio’s endpoint Zero Trust for threat containment.
    • See how Illumio Edge for CrowdStrike stops lateral movement like never before, using your Falcon agent.
  • Zero Trust in the real world: ein erster Schritt in die Praxis (auf Deutsch) Recorded: May 8 2021 47 mins
    Alex Goller, System Engineer, Illumio & Oliver Keizers, Regional Director, Illumio
    Zero Trust ist ein Sicherheits-Framework, das auf der Annahme basiert, dass man auch in der IT-Sicherheit nicht vertrauen und stets kontrollieren sollte.

    Lernen Sie praktische Ansätze kennen um Zero Trust zu implementieren. Orientieren Sie Sich dabei an das Framework von Forrester Research und minimieren Sie die Angriffsoberfläche, verbessern Sie die Sichtbarkeit, reduzieren Sie Zeitaufwand und Kosten und stärken Sie Ihre Gesamtsicherheit um Ihr Unternehmen vor Datenabfluss und Sicherheits-Vorfällen zu schützen.
  • 5 Security Design Practices for Your Modern Data Center Recorded: May 7 2021 44 mins
    Sam Rastogi, Product Marketing Director and Christer Swartz, Principle Technical Marketing Engineer
    Today’s data center network is changing with the adoption of technologies like SDN, HCI, and virtualization that enable greater IT efficiency, programmability, and network agility to enable your business to move faster with the delivery of dynamic workloads anytime, anywhere.

    With Illumio, we can help you to rethink your approach to reduce security complexity and better secure your data center fabric while reducing risk and strengthen overall security and availability.

    Watch this webinar on-demand now where our experts will present how you can design an effective data center security strategy to enable robust protection of your workloads everywhere.

    This webinar will cover the following data center and hybrid cloud security topics including:
    • Key trends, challenges and recommended security strategies for securing your data center fabric and multi-cloud environment for effective Zero Trust
    •5 best practices to extend simpler security across your across on-prem data centers and multiple public, private, and hybrid clouds
A leader in Zero Trust Segmentation
Illumio, the pioneer and market leader of Zero Trust Segmentation, stops breaches from becoming cyber disasters. Illumio Core and Illumio Edge automate policy enforcement to stop cyberattacks and ransomware from spreading across applications, containers, clouds, data centers, and endpoints. By combining intelligent visibility to detect threats with security enforcement achieved in minutes, Illumio enables the world’s leading organizations to strengthen their cyber resiliency and reduce risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 5 Security Design Practices for Your Modern Data Center
  • Live at: May 7 2021 7:25 pm
  • Presented by: Sam Rastogi, Product Marketing Director and Christer Swartz, Principle Technical Marketing Engineer
  • From:
Your email has been sent.
or close