/
Cyber Resilience

Illumio Authorized as a CVE Numbering Authority (CNA)

In today's security landscape, it’s more important than ever for organizations to be transparent about security issues and build security processes that go beyond minimal requirements.

That’s why Illumio has worked with the Common Vulnerabilities and Exposures (CVE) program to be authorized as a CVE Numbering Authority (CNA). This designation helps Illumio be transparent about security issues reported in our products and services, streamline our disclosure process, and ultimately better protect our customers.

What is the CVE Program?

The CVE Program is a collaborative effort with hundreds of organizations around the world to help security professionals identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.

When organizations find a security vulnerability in their product or service, the vulnerability is assigned a CVE Record. CVE partners publish CVE Records to communicate a consistent description of vulnerabilities. This ensures cybersecurity professionals are discussing the same issue so they can coordinate their efforts to prioritize and address the vulnerabilities.

Why is the program important?

Since the CVE Program began in 1999, more than 150,000 vulnerabilities have been identified and cataloged by the program, including more than 17,000 since 2020 alone. Thousands of security professionals have pooled their security research efforts to help identify and patch vulnerabilities.

With the number of cyberattacks ever-increasing, it’s important that organizations like Illumio join CVE Program partners to provide accurate, timely, and transparent security information that helps protect customers.

To learn more about how your organization can join the CVE Program, visit the program’s website.

Contact Illumio today to stop the spread of ransomware and breaches with Illumio Zero Trust Segmentation (ZTS).

Related topics

No items found.

Related articles

Operationalizing Zero Trust – Step 5: Design the Policy
Cyber Resilience

Operationalizing Zero Trust – Step 5: Design the Policy

Learn about an important step on your organization's Zero Trust journey; Design the policy.

What Is a Domain Controller?
Cyber Resilience

What Is a Domain Controller?

A domain controller responds to security authentication requests and verifies users on the domain of a computer network. Here’s how it secures a network domain.

A Manufacturing CISO’s 4 Tips on Proactive Breach Containment with Illumio
Cyber Resilience

A Manufacturing CISO’s 4 Tips on Proactive Breach Containment with Illumio

Learn manufacturing CISO Jamie Rossato's tips for organizations looking to proactively secure against breaches with Illumio ZTS.

Illumio Zero Trust Segmentation Delivers Provable Risk Reduction and ROI
Zero Trust Segmentation

Illumio Zero Trust Segmentation Delivers Provable Risk Reduction and ROI

Read how Illumio Zero Trust Segmentation delivers 111% ROI based on the new Forrester TEI study.

How Brooks Uses Illumio to Stop Ransomware from Running Rampant
Ransomware Containment

How Brooks Uses Illumio to Stop Ransomware from Running Rampant

See why Brooks chose Illumio Zero Trust Segmentation to ensure reliability for their retail and ecommerce businesses.

5 Must-Know Insights from Zero Trust Pioneer Chase Cunningham
Zero Trust Segmentation

5 Must-Know Insights from Zero Trust Pioneer Chase Cunningham

Chase Cunningham, also known as Dr. Zero Trust, shares his thoughts in this Zero Trust Leadership Podcast episode.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?