All Resources

Filter tool icon


Asset Type


Looking For




Don't Break the Bank: How Financial Institutions Can Achieve Compliance Quickly and at Scale

Compliance regulations such as SWIFT and GDPR can be daunting. Vijay Chauhan shares his experiences as a financial services security practitioner and highlights how Illumio helps the world’s largest financial institutions solve regulatory challenges at scale.


Zero Trust, Zero Fuss

Watch this webinar to learn how Illumio's Adaptive Security Platform can help you achieve Zero Trust security quickly and at a lower cost than traditional network security approaches.


The NIS Directive: How Illumio Can Help

The EU's NIS Directive recommends OES measures to prevent and minimise breach impacts. Learn how Illumio's Adaptive Security Platform helps OES achieve those outcomes more quickly, safely, and cost-effectively than other segmentation options.


Fire Your Firewall for Better Segmentation

It is no secret that attackers move laterally to find and exfiltrate data. To combat this, we segment data centers with complex, expensive firewalls, for better or worse. But there is a better way.


How & Why to Decouple Security from the Network in Your SDN Environment

With the increasing adoption of virtualization and hybrid cloud, the pressures to maintain network resiliency and performance continue to rise. Learn how decoupling security segmentation from the network helps you achieve both of these goals.


Breach-Ready Law Firm Security with Micro-Segmentation

Law firms must control sensitive client data, ensure systems are protected in case of a breach, and document regulatory compliance on demand. Micro-segmentation innovations can secure a firm's systems and allow them to confidently respond to audits.


How to Secure Your Crown Jewel Applications with Micro-Segmentation

Breaches are inevitable--are your high value assets adequately secured? Identify your own crown jewel assets, then discover why and how large enterprises are protecting their applications with micro-segmentation and learn the 5 key steps they use.


Reduce Your Attack Surface, Marginalize the Breach

Learn how to reduce your data center and cloud attack surface to decrease exposure, limit an attacker's mobility, and minimize the impact of a breach by identifying and protecting your high-value assets and vulnerabilities.


Micro-Segmentation 101

Companies of all sizes are struggling to ensure their network is truly secure using aging firewall security systems. Micro-segmentation, when implemented correctly, offers the security needed and provides tremendous application visibility.


How to Build a Rock-Solid Micro-Segmentation Strategy

Everyone today is talking about micro-segmentation, but there’s relatively little discussion about what it is (and is not) and how to use it to effectively improve the security inside your data center and cloud. Until now.

Viewing 11 - 20 of 23