InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Segmentation for Public Cloud Applications to Contain Attacks

Presented by

Tony Bailey, Product Marketing Director, and Jeff Stauffer, Senior Technical Product Manager

About this talk

Cloud security is a top concern for organizations as they increasingly adopt cloud computing services to enhance their agility and scalability. Cloud service providers ensure the security of the cloud infrastructure itself, but organizations are responsible for securing their data and applications within the cloud. This division of responsibility can create confusion and gaps in security practices.   Perimeter, identity and access, and runtime protection security are crucial, but they are not sufficient on their own. Segmentation acts as a second layer of defense, fortifying the security of individual assets within the network. It helps in limiting the "blast radius" in case of a breach, making it harder for attackers to traverse the network and gain access to sensitive data or critical applications.  In this webinar, we'll cover why segmentation using traffic flow telemetry and context-based labeling is critical for a strong segmentation approach to contain attacks. In addition, we will provide a demo walkthrough of CloudSecure to show it in action.
Illumio

Illumio

10627 subscribers163 talks
The Zero Trust Segmentation Company
Illumio, the Zero Trust Segmentation company, prevents breaches from spreading and turning into cyber disasters. Illumio protects critical applications and valuable digital assets with proven segmentation technology purpose-built for the Zero Trust security model. Illumio ransomware mitigation and segmentation solutions see risk, isolate attacks, and secure data across cloud-native apps, hybrid and multi-clouds, data centers, and endpoints, enabling the world’s leading organizations to strengthen their cyber resiliency and reduce risk. 
Related topics