Segmentation for Public Cloud Applications to Contain Attacks

Logo
Presented by

Tony Bailey, Product Marketing Director, and Jeff Stauffer, Senior Technical Product Manager

About this talk

Cloud security is a top concern for organizations as they increasingly adopt cloud computing services to enhance their agility and scalability. Cloud service providers ensure the security of the cloud infrastructure itself, but organizations are responsible for securing their data and applications within the cloud. This division of responsibility can create confusion and gaps in security practices.   Perimeter, identity and access, and runtime protection security are crucial, but they are not sufficient on their own. Segmentation acts as a second layer of defense, fortifying the security of individual assets within the network. It helps in limiting the "blast radius" in case of a breach, making it harder for attackers to traverse the network and gain access to sensitive data or critical applications.  In this webinar, we'll cover why segmentation using traffic flow telemetry and context-based labeling is critical for a strong segmentation approach to contain attacks. In addition, we will provide a demo walkthrough of CloudSecure to show it in action.

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (135)
Subscribers (8632)
Illumio, the Zero Trust Segmentation company, prevents breaches from spreading and turning into cyber disasters. Illumio protects critical applications and valuable digital assets with proven segmentation technology purpose-built for the Zero Trust security model. Illumio ransomware mitigation and segmentation solutions see risk, isolate attacks, and secure data across cloud-native apps, hybrid and multi-clouds, data centers, and endpoints, enabling the world’s leading organizations to strengthen their cyber resiliency and reduce risk.