Jeff Stauffer

Senior Technical Product Manager

Authored content

How to Secure Against the New TCP Port 135 Security Vulnerability
Cyber Resilience

How to Secure Against the New TCP Port 135 Security Vulnerability

A way to exploit TCP port 135 to execute remote commands introduced a port 445 vulnerability, making it necessary to secure port 135 to ensure TCP security.

Hybrid Network Security: Illumio vs. CSPM and CWPP Vendors
Partners & Integrations

Hybrid Network Security: Illumio vs. CSPM and CWPP Vendors

Don't be limited by CSPM and CWPP vendors. Choose Illumio to see and secure your hybrid network.

How Using Labels and Tags Can Simplify Cloud Migration and Zero Trust Segmentation
Zero Trust Segmentation

How Using Labels and Tags Can Simplify Cloud Migration and Zero Trust Segmentation

Moving applications to the cloud brings with it an array of advantages, such as cost, agility and most importantly, the regaining of your broom closet for actual cleaning supplies.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?