Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Networking
    • The Edge
    • Virtualization
    • Converged Infrastructure
  • Data Security ▼
    • Backup & Recovery
    • Cybersecurity
    • Application Security
  • Cloud ▼
    • Private Cloud
    • Public Cloud
    • Hybrid Cloud
  • Storage ▼
    • Software Defined Storage
    • Object Storage
    • Physical Storage
  • DevOps ▼
    • Analytics
    • Applications
    • Open Source

Illumio: Stop the Spread, Contain the Chaos

Truth in IT
05/06/2025
21
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at Rsac 2025. There's lots and lots of stuff going on here in the cybersecurity space. Lots of stories to tell about what's new, what's trending, what's the new things that people need to be looking out for? What are the new features they can take advantage of? I've got Trevor here from Illumio, Illumio and Trevor. Let's just start a little bit by what does Illumio do? It's sort of a really high level in this landscape. Yeah. So we, um, we work with organizations to make sure that if they have an attack, it doesn't turn into a disaster. So, you know, I mean, the reality is, you know, we did some research with the Ponemon Institute and, you know, they sort of came back that 58% of the organizations surveyed had to halt operations due to a ransomware attack. And that's, you know, in this day and age, that's ridiculous. So what we do is we help them contain that attack to prevent it, you know, stopping stopping them being able to do their business. Okay. So, uh, is this a rapid response thing or something that's reactive? Is it something how do people know that they're having a ransomware attack, even to begin with and get you involved. Well, I mean, there's several, several layers to that. Um, you know, so there's a lot of technology out there that helps you detect and attack. Um, you know, even if you detect an attack, you need to do something about it. So what we do is we apply zero trust principles, which controls exactly what can communicate with what. So you're, you know, you're obfuscating, obfuscating the rest of your environment to the attacker so they can only go down certain routes and paths. And if we you know, that can be detected quite easily because it's, you know, a much smaller thing. Um, and then what we do is we put policy in place to, to prevent that. Then moving on further and, uh, and stopping it from, you know, getting to the most critical resources. So, so really kind of implementing a response plan that can automatically take off. Yeah. So so you're effectively, um, really following the cybersecurity framework. So we're identifying where potential risks are. We're we're protecting and mitigating against those risks. And then when, um, you know, when an attack is detected, then we can dynamically change the policy to react to that attack and prevent it sort of getting to those critical assets. Attacks are always evolving, as we're seeing here at the show. Like the the threat envelope is always changing, and where the threat is coming from is always changing, too. And you guys are able to keep up with that. Yeah, absolutely. I mean, the reality is that a lot of attacks are successful because of unpatched systems, because of weak passwords, because of, you know, lateral movement, because of open, high risk ports. So, you know, so we actually help people do the fundamentals. So if you can do the fundamentals well, you can, you know, solve half the problem. All right. Looking at the RSA RSA key show broadly there's a lot of like themes and trends going on here. What would you sort of pick out and call out and say something you've noticed. Well obviously I you know so I is replaced zero trust on everyone's everyone's. But actually last year I think it was OT. And this year I so there's there's all of that going on. But I think you know the overall the overall shift is is around. You know there's a danger that there's too much shiny stuff here. So are things going oh we can Analyze the posture of third parties and and things like that. When you know when it's things that people don't really need to do, what they need to do is solve the fundamentals. So, so there's there's on one side people who are saying, yeah, you know, fix the basic problems. And then the other side saying, well, we've got this new shiny thing and, and I, you know, I think there is a danger that going down the shiny route too much is sort of, you know, the law of diminishing returns applies because you're never going to you're never, ever going to hit 100% ability to stop, you know, to prevent an attack. So you have to sort of shift the focus onto mitigating what happens when it when you do have an attack. All right. So let's talk about that. If, if the threat landscape is always changing and evolving and the tooling is always coming along looking shinier and shinier, but if you keep trying to stay too far ahead, you're never getting to the fundamentals. What would be your best advice for someone who's to sort of say, all right, I need to tackle the biggest chunk of that as I can. Where would you start? I'd say take a breath, pause, look at, look at the threats you have. You know, for instance, there's always the challenge with things like digital transformation. So, you know, everyone has become overexcited with being able to connect lots of things ot things into into Ethernet switches. And they've gone, oh yeah, we can use VLANs and all that. Yeah. Don't do that. Buy another Ethernet switch. Keep it. You know do the basics. Keep those networks completely separate. Do some at least hardware hygiene. Yeah. Do hardware hygiene. Network hygiene. Do all of that stuff first. Don't get sucked into the latest funky things. Do the basics first. Yeah. Good. If someone wants to learn a little bit more about Illumio and your approach and your advice, what would what would you recommend they look at? So visit Illumio. Com. There's a lot of resources there. Um there's a lot of information. You know, we keep it very rich in quite detailed content. Um, there's demos, there's videos, there's all sorts of things that are available or just contact us. RSAC. They've got a great orange booth here. Uh, check, check it out if you're coming on by. Otherwise. Uh Illumio.com. Thank you very much. Yeah. Great.

Illumio focuses on containing cyberattacks before they become business disasters. Leveraging zero trust segmentation and dynamic policy response, they help enterprises mitigate ransomware spread and protect critical assets. While some chase shiny new features, Illumio reminds us that doing the basics right—like network hygiene and segmentation—is still the most effective strategy. Their advice? Don’t just prevent breaches—prepare to limit the blast radius when one hits.

Categories:
  • » Technology Communities » Data Security » Backup & Recovery
  • » Small World Big Data
  • » Technology Communities » Data Security » Cybersecurity
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • illumio
  • zero
  • trust
  • ransomware
  • containment
  • lateral
  • movement
  • network
  • segmentation
  • incident
  • response
  • cyber
  • hygiene
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Illumio: Stop the Spread, Contain the Chaos

            Upcoming Spotlight Events

            • Jun
              24

              Agentic AI Ransomware: What You Need to Know

              06/24/202513:00:00 ET
              More events

              Upcoming 360 View Events

              • May
                22

                360View: AI Powered Innovation in the Enterprise

                05/22/202512:00:00 ET
                • Jun
                  18

                  360View: The Data Resilience Imperative – Securing, Scaling & Optimizing Enterprise Data

                  06/18/202512:00:00 ET
                  • Jul
                    24

                    360View: API Security & the Expanding Attack Surface

                    07/24/202512:00:00 ET
                    More events

                    Upcoming Industry Events

                    • May
                      29

                      Dispelling Misconceptions Surrounding API Security

                      05/29/202513:00:00 ET
                      More events
                      Truth in IT
                      • Advertise
                      • About Us
                      • Terms of Service
                      • Privacy Policy
                      • Contact Us
                      • Be Our Guest
                      • Preference Management
                      Desktop version
                      Standard version