Achieving Success: A Practical Guide to Executing Zero Trust - APAC

Presented by

Russell Goodwin -Field CTO, EMEA, Illumio

About this talk

Focusing primarily on perimeter security and firewalls is no longer enough. Many organizations are now adopting the Zero Trust security mindset of “never trust, always verify” to segment internal networks and prevent the spread of breaches. Join us to learn the next step towards Zero Trust security to architect optimal micro-segmentation controls with automated policy creation to reduce risk and deployment complexity. - Define and automate the right level of Zero Trust segmentation controls (from environmental separation to process level) across endpoints and East-West traffic. - Identify and map segmentation policies based on the exploitability of vulnerabilities and use segmentation as a compensating control when you can't patch. - Visualize and test policies before enforcement to ensure you don’t break applications while provisioning security at birth in cloud-native applications.

Related topics:

About this channel

Illumio
Upcoming talks (4)
On-demand talks (73)
Subscribers (4202)
Illumio, the pioneer and market leader of Zero Trust Segmentation, stops breaches from becoming cyber disasters. Illumio Core and Illumio Edge automate policy enforcement to stop cyberattacks and ransomware from spreading across applications, containers, clouds, data centers, and endpoints. By combining intelligent visibility to detect threats with security enforcement achieved in minutes, Illumio enables the world’s leading organizations to strengthen their cyber resiliency and reduce risk.