Achieving Success: A Practical Guide to Executing Zero Trust - APAC

Logo
Presented by

Russell Goodwin -Field CTO, EMEA, Illumio

About this talk

Focusing primarily on perimeter security and firewalls is no longer enough. Many organizations are now adopting the Zero Trust security mindset of “never trust, always verify” to segment internal networks and prevent the spread of breaches. Join us to learn the next step towards Zero Trust security to architect optimal micro-segmentation controls with automated policy creation to reduce risk and deployment complexity. - Define and automate the right level of Zero Trust segmentation controls (from environmental separation to process level) across endpoints and East-West traffic. - Identify and map segmentation policies based on the exploitability of vulnerabilities and use segmentation as a compensating control when you can't patch. - Visualize and test policies before enforcement to ensure you don’t break applications while provisioning security at birth in cloud-native applications.
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (149)
Subscribers (9446)
Illumio, the Zero Trust Segmentation company, prevents breaches from spreading and turning into cyber disasters. Illumio protects critical applications and valuable digital assets with proven segmentation technology purpose-built for the Zero Trust security model. Illumio ransomware mitigation and segmentation solutions see risk, isolate attacks, and secure data across cloud-native apps, hybrid and multi-clouds, data centers, and endpoints, enabling the world’s leading organizations to strengthen their cyber resiliency and reduce risk.