Hi [[ session.user.profile.firstName ]]

Paving the Road to Zero Trust from the Data Centers to Clouds to the Edge - APAC

Many organizations are now adopting the Zero Trust security mindset of “never trust, always verify” to segment internal networks and prevent the spread of breaches. As your applications move across multiple on-prem and multiple clouds and your users transition to a distributed work-from-anywhere model, Zero Trust must be extended across the enterprise to reduce the attack surface. As a result, micro-segmentation has become a foundational component for Zero Trust. As your operating models evolve, the need for a holistic Zero Trust approach is even more urgent.

Join Illumio’s VP of Product Management, Matt Glenn and guest speaker, David Holmes, Senior Analyst at Forrester Research to learn how to design and implement an effective strategy for end-to-end Zero Trust from endpoints to data centers and the cloud.

In this webinar you will learn:

• What is the current state of Zero Trust and how has it evolved?
• Best practices and design considerations to achieve end-to-end Zero Trust
• Live Demonstration from Illumio to see how it works for effective Zero Trust Segmentation




Forrester and Forrester Wave™ are trademarks of Forrester Research, Inc.
Recorded Jul 8 2021 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Matt Glenn, VP of Product Management, Illumio and Guest Speaker, David Holmes, Senior Analyst, Forrester Research
Presentation preview: Paving the Road to Zero Trust from the Data Centers to Clouds to the Edge - APAC

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Ransomware Happens. We Stop It From Spreading: Take Action to Contain Ransomware Oct 13 2021 5:00 pm UTC 30 mins
    Katey Wood, Director of Product Marketing, Illumio
    In the last installment of our three-part series, “Ransomware Happens. We Stop It From Spreading,” we offer best practices for containing ransomware — fast.

    Sadly, even if you can identify ransomware — it’s often difficult to stop it from spreading. Most organizations don’t have the ability to quickly shut down affected ports without major disruption or the firewalls simply aren’t close enough to reduce spread very much. In this session, we will discover the proactive (before breach) and reactive (after breach) capabilities that stop malicious code from spreading and isolate critical systems from infection.

    Join us for this information-packed webinar to learn how to:
    ● Shut down network communication on unnecessary, risky and typically abused ports
    ● Reduce the spread of attacks and ransomware by integrating real-time Illumio data into your SIEM/SOAR during SecOps investigations
    ● Surgically severing network communications to isolate unaffected high-value applications and infected systems
  • Ransomware Happens. We Stop It From Spreading: Assess Your Vulnerabilities Oct 6 2021 5:00 pm UTC 30 mins
    Nathanael Iversen, Chief Evangelist
    In part two of our three-part series, “Ransomware Happens. We Stop It From Spreading,” we discuss one often overlooked catalyst for network breaches: technical debt.

    Unwanted and outdated services that are still active are notorious for inviting in threat actors. But you can limit your breach exposure and improve your digital defenses by pinpointing the applications and systems most at risk. And Illumio can help.

    Join us for this new webinar to learn how. During this in-depth discussion, you’ll discover how to:
    ● Block risky ports and non-compliant data flows commonly abused by ransomware and other cyberattacks
    ● Focus on the most vulnerable applications and workloads
    ● Restrict applications exhibiting excessive communications or interacting with the internet or command and control servers
  • Ransomware Happens. We Stop It From Spreading: How to Gain Risk-Based Visibility Sep 30 2021 5:00 pm UTC 30 mins
    Katey Wood, Director of Product Marketing, Illumio
    In our new three-part series, “Ransomware Happens. We Stop It From Spreading,” Illumio offers simple approaches for mitigating the damage ransomware and other cyberattacks can have across your hybrid cloud network, data estate and endpoints.

    In this first webinar of the series, learn how to visualize communications across your applications, devices and the cloud, to better understand your systems at risk, and easily enforce least privilege access to prevent the spread of breaches.

    You’ll discover how to:
    ● Gain the visibility required to quickly identify applications whose workloads that are creating unnecessary security risks
    ● Identify in/out of scope systems and flows in compliance environments
    ● Find deprecated services and see how legacy unpatched systems can be reached
    ● Reduce internal friction between departments — and forge tighter collaboration across NetOps, SecOps, and DevOps
  • Zero Trust: Help or Hype? Sep 29 2021 9:00 am UTC 60 mins
    Trevor Dearing, EMEA Director of Technology, Illumio
    Zero Trust promises to mitigate the serious security challenges brought about by cloud migration and other digital transformation initiatives — but do you actually know what it is? Many security professionals are still confused, according to our new “Current State of Zero Trust in the United Kingdom” study.

    Join this information-packed webinar to learn all about our findings, including how organizations in the United Kingdom are approaching Zero Trust and the biggest challenges they’re facing. Plus, receive timely, practical advice you can use to start or continue along your Zero Trust journey.

    You’ll be able to listen to us cover key findings, supported by survey data including:
    • Why there is an inconsistency of understanding Zero Trust.
    • How to achieve buy-in from internal stakeholders for your Zero Trust project.
    • Adopt a Zero Trust strategy to solve for specific problems and accelerate projects like digital transformation.
    • Learn how segmentation fits in with Zero Trust and how to use it better.
  • See Your Risks. Take Simple Steps to Stop Ransomware. Recorded: Sep 16 2021 38 mins
    Katey Wood, Director of Product Marketing, Illumio
    Preventing a cyber breach is nearly impossible. Traditional detection and response security technologies are no longer enough. It only takes one open door to expose your entire network.

    Illumio makes it quick and easy for you to see your vulnerabilities and take simple steps to protect your organization. Benefit from our risk-based visibility into application communications and our radically simple policy creation.

    Join Katey Wood, Director of Product Marketing at Illumio, for an in-depth discussion about how organizations can quickly and easily gain the visibility they need to protect themselves from ransomware and other cyberattacks.

    You'll learn how to:
    • Capture critical insights in as little as an hour by automatically mapping all communications across your applications, devices and their interactions with the Internet.
    • Improve your digital defenses and limit your breach exposure by pinpointing the applications and systems that are most at risk.
    • Contain ransomware and other cyberattacks proactively and during an incident by blocking unsafe network communications and integrating Illumio data into SecOps.
  • See Your Risks. Take Simple Steps to Stop Ransomware. Recorded: Sep 16 2021 38 mins
    Katey Wood, Director of Product Marketing, Illumio
    Preventing a cyber breach is nearly impossible. Traditional detection and response security technologies are no longer enough. It only takes one open door to expose your entire network.

    Illumio makes it quick and easy for you to see your vulnerabilities and take simple steps to protect your organization. Benefit from our risk-based visibility into application communications and our radically simple policy creation.

    Join Katey Wood, Director of Product Marketing at Illumio, for an in-depth discussion about how organizations can quickly and easily gain the visibility they need to protect themselves from ransomware and other cyberattacks.

    You'll learn how to:
    • Capture critical insights in as little as an hour by automatically mapping all communications across your applications, devices and their interactions with the Internet.
    • Improve your digital defenses and limit your breach exposure by pinpointing the applications and systems that are most at risk.
    • Contain ransomware and other cyberattacks proactively and during an incident by blocking unsafe network communications and integrating Illumio data into SecOps.
  • See Your Risks. Take Simple Steps to Stop Ransomware. Recorded: Sep 15 2021 38 mins
    Katey Wood, Director of Product Marketing, Illumio
    Preventing a cyber breach is nearly impossible. Traditional detection and response security technologies are no longer enough. It only takes one open door to expose your entire network.

    Illumio makes it quick and easy for you to see your vulnerabilities and take simple steps to protect your organization. Benefit from our risk-based visibility into application communications and our radically simple policy creation.

    Join Katey Wood, Director of Product Marketing at Illumio, for an in-depth discussion about how organizations can quickly and easily gain the visibility they need to protect themselves from ransomware and other cyberattacks.

    You'll learn how to:
    • Capture critical insights in as little as an hour by automatically mapping all communications across your applications, devices and their interactions with the Internet.
    • Improve your digital defenses and limit your breach exposure by pinpointing the applications and systems that are most at risk.
    • Contain ransomware and other cyberattacks proactively and during an incident by blocking unsafe network communications and integrating Illumio data into SecOps.
  • Ransomware stoppen. Überall. Jetzt. Recorded: Sep 14 2021 37 mins
    Alex Goller - Regional Sales Engineer, Illumio
    Motivierte Angreifer finden immer einen Weg in Ihr Netzwerk. Sie bewegen sich seitlich und versuchen, geistiges Eigentum oder sensible Kundendaten zu stehlen. So kann aus einem kleinen Sicherheitsvorfall ein folgenschwerer Angriff werden.
    Und deshalb ist die End-to-End-Segmentierung wichtiger denn je.
    In diesem Webinar erfahren Sie, wie Sie:

    - eine End-to-End-Segmentierung ohne Einschränkungen der Infrastruktur oder Auswirkungen auf die Anwendungsleistung erreichen
    - Echtzeit-Transparenz über Umgebungen hinweg erlangen und Richtlinien erstellen, um nicht autorisierten Datenverkehr zu stoppen
    - Proaktiv die Verbreitung von Ransomware auf Endpunkten verhindern - im oder außerhalb des Netzwerks
  • Illumio & Splunk: An Integrated Approach to Your Zero Trust Journey (AMS) Recorded: Sep 2 2021 67 mins
    Raghu Nandakumara- Field CTO, Illumio & James Young-Security Strategist, Splunk
    Illumio & Splunk recording to play on demand
  • Illumio & Splunk: An Integrated Approach to Your Zero Trust Journey - EMEA Recorded: Sep 2 2021 67 mins
    Raghu Nandakumara- Field CTO, Illumio & James Young-Security Strategist, Splunk
    Illumio & Splunk recording to play on demand
  • Automated Enforcement Advances: Protecting Against Ransomware and Cyberattacks Recorded: Aug 31 2021 45 mins
    Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio
    Attackers are continuing to successfully set off cyber disasters across the globe. Organizations that focus solely on detection and response find that they can’t detect or respond fast enough. Cyberattacks and ransomware break through perimeters and then leverage common ports to stay undetected until they have spread throughout an organization.

    Illumio Core has new advancements that allows organizations to protect their key assets from Cyberattacks and Ransomware in minutes - across multi cloud, containers, hybrid and on-premises environments.

    Join Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio to learn about how these new innovations can help you:

    • Immediately enforce security policy across your organization to protect high-value assets.
    • Dramatically reduce the risk of supply-chain attacks like the recent Kaseya ransomware.
    • Scale as needed to enforce more than 100,000 workloads in cloud, hybrid, and on-premises environments.
    • Get real-time visibility and insights to create, enforce, and test security policy.
    • Monitor workloads in and out of applications hosted in public clouds to simplify and secure cloud migrations and automate multi-cloud security.
  • Automated Enforcement Advances: Protect Against Ransomware & Cyberattacks - EMEA Recorded: Aug 31 2021 45 mins
    Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio
    Attackers are continuing to successfully set off cyber disasters across the globe. Organizations that focus solely on detection and response find that they can’t detect or respond fast enough. Cyberattacks and ransomware break through perimeters and then leverage common ports to stay undetected until they have spread throughout an organization.

    Illumio Core has new advancements that allows organizations to protect their key assets from Cyberattacks and Ransomware in minutes - across multi cloud, containers, hybrid and on-premises environments.

    Join Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio to learn about how these new innovations can help you:

    • Immediately enforce security policy across your organization to protect high-value assets.
    • Dramatically reduce the risk of supply-chain attacks like the recent Kaseya ransomware.
    • Scale as needed to enforce more than 100,000 workloads in cloud, hybrid, and on-premises environments.
    • Get real-time visibility and insights to create, enforce, and test security policy.
    • Monitor workloads in and out of applications hosted in public clouds to simplify and secure cloud migrations and automate multi-cloud security.
  • 5 Security Best Practices For Your Modern Data Center In A Multi-Cloud World Recorded: Aug 30 2021 24 mins
    Sam Rastogi, Product Marketing Director, Illumio
    The shift to Cloud and hybrid cloud transformation is enabling the business to move faster with the deployment of on-demand workloads anytime, anywhere across multiple data centers, private clouds, public clouds, and hybrid clouds. However, we are seeing a rise in high profile breaches and organizations are increasingly targeted by hackers who are launching dangerous ransomware and malware threats that can quickly spread inside on-prem and multi-cloud environments resulting in business impact and data loss.

    With Illumio, we can help you to rethink your approach to reduce security complexity and better secure your data center fabrics as well as multiple public clouds, private clouds, and hybrid clouds while reducing risk and strengthen overall security and availability.
    Attend this presentation where our expert will present how you can design an effective hybrid cloud security strategy to enable robust protection of your workloads everywhere.

    This presentation will cover the following data center and hybrid cloud security topics including:
    · Key trends, challenges and recommended security strategies for securing your next-gen data center and multi-cloud environment for effective Zero Trust
    · 5 best practices to extend simpler security across your across on-prem data centers and multiple public, private, and hybrid clouds
  • Visibility und Zero Trust Segmentation (German) Recorded: Aug 17 2021 35 mins
    Alex Goller - Regional Sales Engineer, Illumio
    Visibilität ist ein Eckpfeiler in jeder Zero Trust Strategie. Haben Sie den Überblick in Ihrem Datencenter haben oder ist Ihre Infrastruktur über die letzten Jahre immer komplexer geworden? Der Wechsel von rein On-Premise zu Hybrid- und/oder Cloud-Umgebungen hat viele neue Anforderungen an die Sicherheit Ihrer Infrastruktur geschaffen. Aber nur was Sie sehen, können Sie auch effektiv schützen. Wie zeigen Ihnen wie.
  • Automated Enforcement Advances: Protecting Against Ransomware and Cyberattacks Recorded: Aug 12 2021 45 mins
    Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio
    Attackers are continuing to successfully set off cyber disasters across the globe. Organizations that focus solely on detection and response find that they can’t detect or respond fast enough. Cyberattacks and ransomware break through perimeters and then leverage common ports to stay undetected until they have spread throughout an organization.

    Illumio Core has new advancements that allows organizations to protect their key assets from Cyberattacks and Ransomware in minutes - across multi cloud, containers, hybrid and on-premises environments.

    Join Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio to learn about how these new innovations can help you:

    • Immediately enforce security policy across your organization to protect high-value assets.
    • Dramatically reduce the risk of supply-chain attacks like the recent Kaseya ransomware.
    • Scale as needed to enforce more than 100,000 workloads in cloud, hybrid, and on-premises environments.
    • Get real-time visibility and insights to create, enforce, and test security policy.
    • Monitor workloads in and out of applications hosted in public clouds to simplify and secure cloud migrations and automate multi-cloud security.
  • Automated Enforcement Advances: Protecting Against Ransomware and Cyberattacks Recorded: Aug 12 2021 46 mins
    Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio
    Attackers are continuing to successfully set off cyber disasters across the globe. Organizations that focus solely on detection and response find that they can’t detect or respond fast enough. Cyberattacks and ransomware break through perimeters and then leverage common ports to stay undetected until they have spread throughout an organization.

    Illumio Core has new advancements that allows organizations to protect their key assets from Cyberattacks and Ransomware in minutes - across multi cloud, containers, hybrid and on-premises environments.

    Join Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio to learn about how these new innovations can help you:

    • Immediately enforce security policy across your organization to protect high-value assets.
    • Dramatically reduce the risk of supply-chain attacks like the recent Kaseya ransomware.
    • Scale as needed to enforce more than 100,000 workloads in cloud, hybrid, and on-premises environments.
    • Get real-time visibility and insights to create, enforce, and test security policy.
    • Monitor workloads in and out of applications hosted in public clouds to simplify and secure cloud migrations and automate multi-cloud security.
  • Automated Enforcement Advances: Protecting Against Ransomware and Cyberattacks Recorded: Aug 11 2021 45 mins
    Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio
    Attackers are continuing to successfully set off cyber disasters across the globe. Organizations that focus solely on detection and response find that they can’t detect or respond fast enough. Cyberattacks and ransomware break through perimeters and then leverage common ports to stay undetected until they have spread throughout an organization.

    Illumio Core has new advancements that allows organizations to protect their key assets from Cyberattacks and Ransomware in minutes - across multi cloud, containers, hybrid and on-premises environments.

    Join Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio to learn about how these new innovations can help you:

    • Immediately enforce security policy across your organization to protect high-value assets.
    • Dramatically reduce the risk of supply-chain attacks like the recent Kaseya ransomware.
    • Scale as needed to enforce more than 100,000 workloads in cloud, hybrid, and on-premises environments.
    • Get real-time visibility and insights to create, enforce, and test security policy.
    • Monitor workloads in and out of applications hosted in public clouds to simplify and secure cloud migrations and automate multi-cloud security.
  • 5 Security Design Practices for Your Modern Data Center - EMEA Recorded: Aug 10 2021 48 mins
    Sam Rastogi, Product Marketing Director, Illumio and Christer Swartz, Principal Technical Marketing Engineer, Illumio
    Today’s data center network is changing with the adoption of technologies like SDN, HCI, and virtualization that enable greater IT efficiency, programmability, and network agility to enable your business to move faster with the delivery of dynamic workloads anytime, anywhere.

    With Illumio, we can help you to rethink your approach to reduce security complexity and better secure your data center fabric while reducing risk and strengthen overall security and availability.

    Watch this webinar today where our expert will present how you can design an effective data center security strategy to enable robust protection of your workloads everywhere.

    This webinar will cover the following data center and hybrid cloud security topics including:
    · Key trends, challenges and recommended security strategies for securing your data center fabric and multi-cloud environment for effective Zero Trust.
    · 5 best practices to extend simpler security across your across on-prem data centers and multiple public, private, and hybrid clouds.
  • Guide to Micro-Segmentation and Compliance - EMEA Recorded: Aug 5 2021 25 mins
    Raghu Nandakumara- Field CTO, Illumio
    Industry regulators and standards bodies are increasingly mandating micro-segmentation as a necessary control in company networks in order to limit the ability of attackers to move laterally.

    In this presentation we'll discuss:
    - Everything you need to know about micro-segmentation
    - How effective this control is in hindering attackers
    - What has driven change in compliance requirements
    - A specific mandate and how micro-segmentation can be used to achieve it.
  • Mikrosegmentierung erfolgreich umsetzen (auf Deutsch) EMEA Recorded: Aug 5 2021 57 mins
    Oliver Keizers, Illumio & Alex Goller, Illumio
    In unserem Webinar erfahren Sie, wie Sie Betriebsabläufe vereinfachen und die Security Ihres Unternehmens verbessern können. Netzwerke dienen dazu, Objekte miteinander zu verbinden. Sicherheit bedeutet, Objekte zu isolieren. Finden Sie die perfekte Balance zwischen Konnektivität und Sicherheit mit einem innovativen Ansatz zur Mikro-Segmentierung.

    Webinar-Highlights

    • Verringern Sie Sicherheitsrisiken, indem Sie Sicherheitsmaßnahmen näher an dem umsetzen, was gesichert werden soll: der Applikation.
    • Verbessern Sie Ihre Agilität in allen Umgebungen (physisch, Cloud, virtualisiert und Container)
    • Nehmen Sie Änderungen an Segmentierungsrichtlinien ohne Auswirkungen auf das Netzwerk vor
A leader in Zero Trust Segmentation
Illumio, the pioneer and market leader of Zero Trust Segmentation, stops breaches from becoming cyber disasters. Illumio Core and Illumio Edge automate policy enforcement to stop cyberattacks and ransomware from spreading across applications, containers, clouds, data centers, and endpoints. By combining intelligent visibility to detect threats with security enforcement achieved in minutes, Illumio enables the world’s leading organizations to strengthen their cyber resiliency and reduce risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Paving the Road to Zero Trust from the Data Centers to Clouds to the Edge - APAC
  • Live at: Jul 8 2021 12:00 am
  • Presented by: Matt Glenn, VP of Product Management, Illumio and Guest Speaker, David Holmes, Senior Analyst, Forrester Research
  • From:
Your email has been sent.
or close