/
Cyber Resilience

Illumio Authorized as a CVE Numbering Authority (CNA)

CVE Numbering Authority (CNA) Logo

In today's security landscape, it’s more important than ever for organizations to be transparent about security issues and build security processes that go beyond minimal requirements.

That’s why Illumio has worked with the Common Vulnerabilities and Exposures (CVE) program to be authorized as a CVE Numbering Authority (CNA). This designation helps Illumio be transparent about security issues reported in our products and services, streamline our disclosure process, and ultimately better protect our customers.

What is the CVE Program?

The CVE Program is a collaborative effort with hundreds of organizations around the world to help security professionals identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.

When organizations find a security vulnerability in their product or service, the vulnerability is assigned a CVE Record. CVE partners publish CVE Records to communicate a consistent description of vulnerabilities. This ensures cybersecurity professionals are discussing the same issue so they can coordinate their efforts to prioritize and address the vulnerabilities.

Why is the program important?

Since the CVE Program began in 1999, more than 150,000 vulnerabilities have been identified and cataloged by the program, including more than 17,000 since 2020 alone. Thousands of security professionals have pooled their security research efforts to help identify and patch vulnerabilities.

With the number of cyberattacks ever-increasing, it’s important that organizations like Illumio join CVE Program partners to provide accurate, timely, and transparent security information that helps protect customers.

To learn more about how your organization can join the CVE Program, visit the program’s website.

Contact Illumio today to stop the spread of ransomware and breaches with Illumio Zero Trust Segmentation (ZTS).

Related topics

No items found.

Related articles

Global Cloud Detection and Response Report: Q&A on the Human Side of Cloud Security Gaps
Cyber Resilience

Global Cloud Detection and Response Report: Q&A on the Human Side of Cloud Security Gaps

Explore the human cost behind the stats in the 2025 Cloud Detection and Response Report, including context gaps, alert fatigue, and how AI observability can help.

Is Network Security Dead?
Cyber Resilience

Is Network Security Dead?

Get insight into how the idea of deperimeterization, posed by the Jericho Forum in 2004, is shifting cybersecurity strategy via Zero Trust.

Assume Breach: Best Practices in Cyber Resilience
Cyber Resilience

Assume Breach: Best Practices in Cyber Resilience

To assume breach means taking on an adversary mindset. Here’s what that means for how you think about security investments in people, processes, and technology.

Illumio Zero Trust Segmentation Delivers Provable Risk Reduction and ROI
Segmentation

Illumio Zero Trust Segmentation Delivers Provable Risk Reduction and ROI

Read how Illumio Zero Trust Segmentation delivers 111% ROI based on the new Forrester TEI study.

How Brooks Uses Illumio to Stop Ransomware from Running Rampant
Ransomware Containment

How Brooks Uses Illumio to Stop Ransomware from Running Rampant

See why Brooks chose Illumio Zero Trust Segmentation to ensure reliability for their retail and ecommerce businesses.

5 Must-Know Insights from Zero Trust Pioneer Chase Cunningham
Segmentation

5 Must-Know Insights from Zero Trust Pioneer Chase Cunningham

Chase Cunningham, also known as Dr. Zero Trust, shares his thoughts in this Zero Trust Leadership Podcast episode.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?