Hi [[ session.user.profile.firstName ]]

Zero Trust for the Endpoint - APAC

With remote work, the home office has effectively become a local, unmonitored extension of the corporate network – with more risk and less visibility or control.

In this ActualTech Media Ecocast, see how Zero Trust for the endpoint with Illumio Edge helps IT quickly parse activity and contain ransomware by default, with Illumio Director of Product Marketing Katey Wood.

Watch to learn how to:
• Quickly deploy Zero Trust endpoint segmentation that protects even against zero-day threats.
• Gain real-time visibility and create policies to stop unauthorized traffic.
• Prevent the spread of ransomware on endpoints – on or off the network.
• Contain ransomware and malware to a single endpoint – even if it hasn't been detected yet.
Recorded Jul 19 2021 19 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Katey Wood, Director of Product Marketing, Illumio
Presentation preview: Zero Trust for the Endpoint - APAC

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Illumio CloudSecure: Cloud-Native Security Made Easy Nov 18 2021 11:00 am UTC 45 mins
    Sam Rastogi, Director, Product Marketing, Illumio and Jeff Francis, Principle Technical Marketing Engineer, Illumio
    The cloud is here to stay. And so are its security risks.

    Unfortunately, many organizations are underestimating the cyberthreats from the cloud. At the same time, legacy tools lack critical capabilities for achieving true — and easy — cloud-native security.

    With these challenges in mind, Illumio created CloudSecure, the first agentless visibility and control solution for cloud-native applications across hybrid and multi-cloud environments.

    Join us for this special product launch webinar where you'll learn how CloudSecure:
    • Eliminates your cloud security blind spots.
    • Provides deep insights into application behavior.
    • Makes it possible to easily reduce cloud risk and enforce effective security.

    The webinar will feature a live demo and Q&A with our product experts. If you can't attend, register anyway and we'll send you the recording. Or find out more by visiting the CloudSecure product page.
  • Illumio CloudSecure: Cloud-Native Security Made Easy Nov 18 2021 12:00 am UTC 45 mins
    Sam Rastogi, Director, Product Marketing, Illumio and Jeff Francis, Principle Technical Marketing Engineer, Illumio
    The cloud is here to stay. And so are its security risks.

    Unfortunately, many organizations are underestimating the cyberthreats from the cloud. At the same time, legacy tools lack critical capabilities for achieving true — and easy — cloud-native security.

    With these challenges in mind, Illumio created CloudSecure, the first agentless visibility and control solution for cloud-native applications across hybrid and multi-cloud environments.

    Join us for this special product launch webinar where you'll learn how CloudSecure:
    • Eliminates your cloud security blind spots.
    • Provides deep insights into application behavior.
    • Makes it possible to easily reduce cloud risk and enforce effective security.

    The webinar will feature a live demo and Q&A with our product experts. If you can't attend, register anyway and we'll send you the recording. Or find out more by visiting the CloudSecure product page.
  • Illumio CloudSecure: Cloud-Native Security Made Easy Nov 17 2021 7:00 pm UTC 45 mins
    Sam Rastogi, Director, Product Marketing, Illumio and Jeff Francis, Principle Technical Marketing Engineer, Illumio
    The cloud is here to stay. And so are its security risks.

    Unfortunately, many organizations are underestimating the cyberthreats from the cloud. At the same time, legacy tools lack critical capabilities for achieving true — and easy — cloud-native security.

    With these challenges in mind, Illumio created CloudSecure, the first agentless visibility and control solution for cloud-native applications across hybrid and multi-cloud environments.

    Join us for this special product launch webinar where you'll learn how CloudSecure:
    • Eliminates your cloud security blind spots.
    • Provides deep insights into application behavior.
    • Makes it possible to easily reduce cloud risk and enforce effective security.

    The webinar will feature a live demo and Q&A with our product experts. If you can't attend, register anyway and we'll send you the recording. Or find out more by visiting the CloudSecure product page.
  • Fast Path to Reducing Ransomware Risk with Illumio Recorded: Oct 25 2021 26 mins
    Paul Dant, Director, Cybersecurity Product Strategy, Illumio
    See Your Risks. Take Simple Steps to Stop Ransomware

    Modern ransomware is one of the most significant cybersecurity threats to critical services, compute environments, and user endpoints today. While breaches may be inevitable, total infection is not. Zero Trust frameworks and the principle of least privilege effectively reduce ransomware risk so that a breach doesn't become a cyber disaster. But where do you start?

    Join us to hear the techniques commonly used in ransomware attacks to understand why they succeed and how Illumio can stop them, ensuring cyber incidents don’t become cyber disasters.

    You will learn:

    • Essential steps to stop ransomware from spreading to its ultimate target
    • Strategies to thwart attacks from the start at the endpoint
    • What Zero Trust Segmentation capabilities are crucial for automated, scalable protection
  • Ransomware Happens. We Stop It From Spreading: Take Action to Contain Ransomware Recorded: Oct 13 2021 27 mins
    Katey Wood, Director of Product Marketing, Illumio
    In the last installment of our three-part series, “Ransomware Happens. We Stop It From Spreading,” we offer best practices for containing ransomware — fast.

    Sadly, even if you can identify ransomware — it’s often difficult to stop it from spreading. Most organizations don’t have the ability to quickly shut down affected ports without major disruption or the firewalls simply aren’t close enough to reduce spread very much. In this session, we will discover the proactive (before breach) and reactive (after breach) capabilities that stop malicious code from spreading and isolate critical systems from infection.

    Join us for this information-packed webinar to learn how to:
    ● Shut down network communication on unnecessary, risky and typically abused ports
    ● Reduce the spread of attacks and ransomware by integrating real-time Illumio data into your SIEM/SOAR during SecOps investigations
    ● Surgically severing network communications to isolate unaffected high-value applications and infected systems
  • Ransomware Happens. We Stop It From Spreading: Assess Your Vulnerabilities Recorded: Oct 6 2021 23 mins
    Nathanael Iversen, Chief Evangelist
    In part two of our three-part series, “Ransomware Happens. We Stop It From Spreading,” we discuss one often overlooked catalyst for network breaches: technical debt.

    Unwanted and outdated services that are still active are notorious for inviting in threat actors. But you can limit your breach exposure and improve your digital defenses by pinpointing the applications and systems most at risk. And Illumio can help.

    Join us for this new webinar to learn how. During this in-depth discussion, you’ll discover how to:
    ● Block risky ports and non-compliant data flows commonly abused by ransomware and other cyberattacks
    ● Focus on the most vulnerable applications and workloads
    ● Restrict applications exhibiting excessive communications or interacting with the internet or command and control servers
  • Ransomware Happens. We Stop It From Spreading: How to Gain Risk-Based Visibility Recorded: Sep 30 2021 26 mins
    Nathanael Iversen, Chief Evangelist
    In our new three-part series, “Ransomware Happens. We Stop It From Spreading,” Illumio offers simple approaches for mitigating the damage ransomware and other cyberattacks can have across your hybrid cloud network, data estate and endpoints.

    In this first webinar of the series, learn how to visualize communications across your applications, devices and the cloud, to better understand your systems at risk, and easily enforce least privilege access to prevent the spread of breaches.

    You’ll discover how to:
    ● Gain the visibility required to quickly identify applications whose workloads that are creating unnecessary security risks
    ● Identify in/out of scope systems and flows in compliance environments
    ● Find deprecated services and see how legacy unpatched systems can be reached
    ● Reduce internal friction between departments — and forge tighter collaboration across NetOps, SecOps, and DevOps
  • Zero Trust: Help or Hype? Recorded: Sep 29 2021 39 mins
    Trevor Dearing, EMEA Director of Technology, Illumio
    Zero Trust promises to mitigate the serious security challenges brought about by cloud migration and other digital transformation initiatives — but do you actually know what it is? Many security professionals are still confused, according to our new “Current State of Zero Trust in the United Kingdom” study.

    Join this information-packed webinar to learn all about our findings, including how organizations in the United Kingdom are approaching Zero Trust and the biggest challenges they’re facing. Plus, receive timely, practical advice you can use to start or continue along your Zero Trust journey.

    You’ll be able to listen to us cover key findings, supported by survey data including:
    • Why there is an inconsistency of understanding Zero Trust.
    • How to achieve buy-in from internal stakeholders for your Zero Trust project.
    • Adopt a Zero Trust strategy to solve for specific problems and accelerate projects like digital transformation.
    • Learn how segmentation fits in with Zero Trust and how to use it better.
  • See Your Risks. Take Simple Steps to Stop Ransomware. Recorded: Sep 16 2021 38 mins
    Katey Wood, Director of Product Marketing, Illumio
    Preventing a cyber breach is nearly impossible. Traditional detection and response security technologies are no longer enough. It only takes one open door to expose your entire network.

    Illumio makes it quick and easy for you to see your vulnerabilities and take simple steps to protect your organization. Benefit from our risk-based visibility into application communications and our radically simple policy creation.

    Join Katey Wood, Director of Product Marketing at Illumio, for an in-depth discussion about how organizations can quickly and easily gain the visibility they need to protect themselves from ransomware and other cyberattacks.

    You'll learn how to:
    • Capture critical insights in as little as an hour by automatically mapping all communications across your applications, devices and their interactions with the Internet.
    • Improve your digital defenses and limit your breach exposure by pinpointing the applications and systems that are most at risk.
    • Contain ransomware and other cyberattacks proactively and during an incident by blocking unsafe network communications and integrating Illumio data into SecOps.
  • See Your Risks. Take Simple Steps to Stop Ransomware. Recorded: Sep 16 2021 38 mins
    Katey Wood, Director of Product Marketing, Illumio
    Preventing a cyber breach is nearly impossible. Traditional detection and response security technologies are no longer enough. It only takes one open door to expose your entire network.

    Illumio makes it quick and easy for you to see your vulnerabilities and take simple steps to protect your organization. Benefit from our risk-based visibility into application communications and our radically simple policy creation.

    Join Katey Wood, Director of Product Marketing at Illumio, for an in-depth discussion about how organizations can quickly and easily gain the visibility they need to protect themselves from ransomware and other cyberattacks.

    You'll learn how to:
    • Capture critical insights in as little as an hour by automatically mapping all communications across your applications, devices and their interactions with the Internet.
    • Improve your digital defenses and limit your breach exposure by pinpointing the applications and systems that are most at risk.
    • Contain ransomware and other cyberattacks proactively and during an incident by blocking unsafe network communications and integrating Illumio data into SecOps.
  • See Your Risks. Take Simple Steps to Stop Ransomware. Recorded: Sep 15 2021 38 mins
    Katey Wood, Director of Product Marketing, Illumio
    Preventing a cyber breach is nearly impossible. Traditional detection and response security technologies are no longer enough. It only takes one open door to expose your entire network.

    Illumio makes it quick and easy for you to see your vulnerabilities and take simple steps to protect your organization. Benefit from our risk-based visibility into application communications and our radically simple policy creation.

    Join Katey Wood, Director of Product Marketing at Illumio, for an in-depth discussion about how organizations can quickly and easily gain the visibility they need to protect themselves from ransomware and other cyberattacks.

    You'll learn how to:
    • Capture critical insights in as little as an hour by automatically mapping all communications across your applications, devices and their interactions with the Internet.
    • Improve your digital defenses and limit your breach exposure by pinpointing the applications and systems that are most at risk.
    • Contain ransomware and other cyberattacks proactively and during an incident by blocking unsafe network communications and integrating Illumio data into SecOps.
  • Ransomware stoppen. Überall. Jetzt. Recorded: Sep 14 2021 37 mins
    Alex Goller - Regional Sales Engineer, Illumio
    Motivierte Angreifer finden immer einen Weg in Ihr Netzwerk. Sie bewegen sich seitlich und versuchen, geistiges Eigentum oder sensible Kundendaten zu stehlen. So kann aus einem kleinen Sicherheitsvorfall ein folgenschwerer Angriff werden.
    Und deshalb ist die End-to-End-Segmentierung wichtiger denn je.
    In diesem Webinar erfahren Sie, wie Sie:

    - eine End-to-End-Segmentierung ohne Einschränkungen der Infrastruktur oder Auswirkungen auf die Anwendungsleistung erreichen
    - Echtzeit-Transparenz über Umgebungen hinweg erlangen und Richtlinien erstellen, um nicht autorisierten Datenverkehr zu stoppen
    - Proaktiv die Verbreitung von Ransomware auf Endpunkten verhindern - im oder außerhalb des Netzwerks
  • Illumio & Splunk: An Integrated Approach to Your Zero Trust Journey (AMS) Recorded: Sep 2 2021 67 mins
    Raghu Nandakumara- Field CTO, Illumio & James Young-Security Strategist, Splunk
    Illumio & Splunk recording to play on demand
  • Illumio & Splunk: An Integrated Approach to Your Zero Trust Journey - EMEA Recorded: Sep 2 2021 67 mins
    Raghu Nandakumara- Field CTO, Illumio & James Young-Security Strategist, Splunk
    Illumio & Splunk recording to play on demand
  • Automated Enforcement Advances: Protecting Against Ransomware and Cyberattacks Recorded: Aug 31 2021 45 mins
    Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio
    Attackers are continuing to successfully set off cyber disasters across the globe. Organizations that focus solely on detection and response find that they can’t detect or respond fast enough. Cyberattacks and ransomware break through perimeters and then leverage common ports to stay undetected until they have spread throughout an organization.

    Illumio Core has new advancements that allows organizations to protect their key assets from Cyberattacks and Ransomware in minutes - across multi cloud, containers, hybrid and on-premises environments.

    Join Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio to learn about how these new innovations can help you:

    • Immediately enforce security policy across your organization to protect high-value assets.
    • Dramatically reduce the risk of supply-chain attacks like the recent Kaseya ransomware.
    • Scale as needed to enforce more than 100,000 workloads in cloud, hybrid, and on-premises environments.
    • Get real-time visibility and insights to create, enforce, and test security policy.
    • Monitor workloads in and out of applications hosted in public clouds to simplify and secure cloud migrations and automate multi-cloud security.
  • Automated Enforcement Advances: Protect Against Ransomware & Cyberattacks - EMEA Recorded: Aug 31 2021 45 mins
    Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio
    Attackers are continuing to successfully set off cyber disasters across the globe. Organizations that focus solely on detection and response find that they can’t detect or respond fast enough. Cyberattacks and ransomware break through perimeters and then leverage common ports to stay undetected until they have spread throughout an organization.

    Illumio Core has new advancements that allows organizations to protect their key assets from Cyberattacks and Ransomware in minutes - across multi cloud, containers, hybrid and on-premises environments.

    Join Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio to learn about how these new innovations can help you:

    • Immediately enforce security policy across your organization to protect high-value assets.
    • Dramatically reduce the risk of supply-chain attacks like the recent Kaseya ransomware.
    • Scale as needed to enforce more than 100,000 workloads in cloud, hybrid, and on-premises environments.
    • Get real-time visibility and insights to create, enforce, and test security policy.
    • Monitor workloads in and out of applications hosted in public clouds to simplify and secure cloud migrations and automate multi-cloud security.
  • 5 Security Best Practices For Your Modern Data Center In A Multi-Cloud World Recorded: Aug 30 2021 24 mins
    Sam Rastogi, Product Marketing Director, Illumio
    The shift to Cloud and hybrid cloud transformation is enabling the business to move faster with the deployment of on-demand workloads anytime, anywhere across multiple data centers, private clouds, public clouds, and hybrid clouds. However, we are seeing a rise in high profile breaches and organizations are increasingly targeted by hackers who are launching dangerous ransomware and malware threats that can quickly spread inside on-prem and multi-cloud environments resulting in business impact and data loss.

    With Illumio, we can help you to rethink your approach to reduce security complexity and better secure your data center fabrics as well as multiple public clouds, private clouds, and hybrid clouds while reducing risk and strengthen overall security and availability.
    Attend this presentation where our expert will present how you can design an effective hybrid cloud security strategy to enable robust protection of your workloads everywhere.

    This presentation will cover the following data center and hybrid cloud security topics including:
    · Key trends, challenges and recommended security strategies for securing your next-gen data center and multi-cloud environment for effective Zero Trust
    · 5 best practices to extend simpler security across your across on-prem data centers and multiple public, private, and hybrid clouds
  • Visibility und Zero Trust Segmentation (German) Recorded: Aug 17 2021 35 mins
    Alex Goller - Regional Sales Engineer, Illumio
    Visibilität ist ein Eckpfeiler in jeder Zero Trust Strategie. Haben Sie den Überblick in Ihrem Datencenter haben oder ist Ihre Infrastruktur über die letzten Jahre immer komplexer geworden? Der Wechsel von rein On-Premise zu Hybrid- und/oder Cloud-Umgebungen hat viele neue Anforderungen an die Sicherheit Ihrer Infrastruktur geschaffen. Aber nur was Sie sehen, können Sie auch effektiv schützen. Wie zeigen Ihnen wie.
  • Automated Enforcement Advances: Protecting Against Ransomware and Cyberattacks Recorded: Aug 12 2021 45 mins
    Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio
    Attackers are continuing to successfully set off cyber disasters across the globe. Organizations that focus solely on detection and response find that they can’t detect or respond fast enough. Cyberattacks and ransomware break through perimeters and then leverage common ports to stay undetected until they have spread throughout an organization.

    Illumio Core has new advancements that allows organizations to protect their key assets from Cyberattacks and Ransomware in minutes - across multi cloud, containers, hybrid and on-premises environments.

    Join Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio to learn about how these new innovations can help you:

    • Immediately enforce security policy across your organization to protect high-value assets.
    • Dramatically reduce the risk of supply-chain attacks like the recent Kaseya ransomware.
    • Scale as needed to enforce more than 100,000 workloads in cloud, hybrid, and on-premises environments.
    • Get real-time visibility and insights to create, enforce, and test security policy.
    • Monitor workloads in and out of applications hosted in public clouds to simplify and secure cloud migrations and automate multi-cloud security.
  • Automated Enforcement Advances: Protecting Against Ransomware and Cyberattacks Recorded: Aug 12 2021 46 mins
    Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio
    Attackers are continuing to successfully set off cyber disasters across the globe. Organizations that focus solely on detection and response find that they can’t detect or respond fast enough. Cyberattacks and ransomware break through perimeters and then leverage common ports to stay undetected until they have spread throughout an organization.

    Illumio Core has new advancements that allows organizations to protect their key assets from Cyberattacks and Ransomware in minutes - across multi cloud, containers, hybrid and on-premises environments.

    Join Matt Glenn, SVP of Product Management and Nathanael Iversen, Chief Evangelist at Illumio to learn about how these new innovations can help you:

    • Immediately enforce security policy across your organization to protect high-value assets.
    • Dramatically reduce the risk of supply-chain attacks like the recent Kaseya ransomware.
    • Scale as needed to enforce more than 100,000 workloads in cloud, hybrid, and on-premises environments.
    • Get real-time visibility and insights to create, enforce, and test security policy.
    • Monitor workloads in and out of applications hosted in public clouds to simplify and secure cloud migrations and automate multi-cloud security.
A leader in Zero Trust Segmentation
Illumio, the pioneer and market leader of Zero Trust Segmentation, stops breaches from becoming cyber disasters. Illumio Core and Illumio Edge automate policy enforcement to stop cyberattacks and ransomware from spreading across applications, containers, clouds, data centers, and endpoints. By combining intelligent visibility to detect threats with security enforcement achieved in minutes, Illumio enables the world’s leading organizations to strengthen their cyber resiliency and reduce risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Zero Trust for the Endpoint - APAC
  • Live at: Jul 19 2021 12:00 am
  • Presented by: Katey Wood, Director of Product Marketing, Illumio
  • From:
Your email has been sent.
or close