Latest news with #Illumio


Zawya
4 days ago
- Business
- Zawya
Redington offers Illumio Segmentation to stop breaches from becoming cyber disasters
Dubai, United Arab Emirates — Redington, a leading technology aggregator and innovation powerhouse across emerging markets, today announced a new distribution partnership with Illumio, the breach containment company. The partnership will see Redington work with Illumio to evolve its channel strategy, drive partner enablement, and accelerate go-to-market momentum for Illumio Segmentation, helping organizations across the region reduce risk, contain attacks, and stop cyberattacks from turning into cyber disasters. Despite record spending on cybersecurity, the volume, cost, and impact of cyberattacks continue to rise. Ransomware and other threats bypass perimeter defenses, with attackers exploiting vulnerabilities in hybrid and multi-cloud environments to move across networks and reach critical data, assets, and infrastructure. Illumio Segmentation proactively protects critical assets, contains attacks, and enhances cyber resilience. By applying the principles of Zero Trust to stop lateral movement across multi-cloud and hybrid infrastructure, it enables organizations to protect critical resources and prevent the spread of cyberattacks. 'Our partnership with Illumio reflects Redington's continued commitment to bringing the most advanced and relevant cybersecurity solutions to our partners and customers,' said Dharshana Kosgalage, Executive Vice President, Technology Solutions Group, Redington. 'In today's threat landscape, Zero Trust Segmentation is no longer optional—it's essential. Through our extensive channel ecosystem, we will accelerate access to this critical technology, enabling partners to drive real cyber resilience for their customers.' Recognized as a leader in The Forrester Wave™: Microsegmentation Solutions, Q3 2024 report, Illumio Segmentation is proven to strengthen cyber resilience and reduce the impact of attacks. A Forrester Total Economic ImpactTM report shows Illumio reduces the blast radius of attacks by 66%, saving $1.8 million in decreased risk exposure. Ransomware emulations from Bishop Fox also show Illumio stops attacks from spreading nearly four times faster than detection and response capabilities alone. 'Breaches today are inevitable, but disasters don't have to be,' said Sam Tayan, Director of Sales for Middle East, Turkey and Africa (META) at Illumio. 'Illumio Segmentation provides a simple and effective way to contain threats, minimize risk, and build resilience, so that organizations can thrive without fear of cyber disasters. We're thrilled to partner with Redington to jointly deliver value to customers and empower them to stay agile in the face of today's cyberthreats.' Illumio Segmentation sits alongside Illumio Insights as part of the Illumio Platform, the first cybersecurity platform dedicated to containing breaches built on an AI security graph. Illumio Insights is an AI-powered cloud detection and response (CDR) offering that helps organizations quickly identify risks and detect threats. With both Insights and Segmentation, security teams can shrink the attack surface, detect threats, and contain breaches in real time. To ensure the successful adoption of Illumio Segmentation, Redington is going beyond basic enablement—arming its channel partners with deep technical training, strategic advisory, and hands-on deployment support. By blending cybersecurity expertise with real-world application scenarios, Redington is helping partners not only sell Illumio, but also become trusted advisors in breach containment, accelerating business growth and elevating their value in the cybersecurity ecosystem. About Redington Redington is a thriving technology solutions provider with over US$11 billion in revenues, with a network of 450+ international brands across 40 markets in the IT space. Redington was ranked 7th globally by renowned research firm Canalys based on 2023 revenues. It is projected to be one of the fastest-growing distributors in the world. Redington not only bridges the gap between innovation and adoption; it masterfully navigates and dissolves the complexities of technology friction—the multifaceted challenges that emerge as technology evolves and integrates into various markets. Addressing key market, technology, and knowledge frictions, Redington empowers businesses to thrive in complex and evolving landscapes. By transforming these frictions into opportunities, we drive profound technological impact and accessibility. Redington ensures seamless distribution across IT/ITeS, Telecom, Lifestyle, and Solar sectors in regions including India, South East Asia, the Middle East, Africa, and Turkey. Redington Media Contact: Janees Reghelini Senior Communications and Media Manager Redington MEA Email:


Channel Post MEA
4 days ago
- Business
- Channel Post MEA
Redington Signs Distribution Partnership With Illumio For Containing Breaches
Redington has announced a new distribution partnership with Illumio, the breach containment company. The partnership will see Redington work with Illumio to evolve its channel strategy, drive partner enablement, and accelerate go-to-market momentum for Illumio Segmentation, helping organizations across the region reduce risk, contain attacks, and stop cyberattacks from turning into cyber disasters. Despite record spending on cybersecurity, the volume, cost, and impact of cyberattacks continue to rise. Ransomware and other threats bypass perimeter defenses, with attackers exploiting vulnerabilities in hybrid and multi-cloud environments to move across networks and reach critical data, assets, and infrastructure. Illumio Segmentation proactively protects critical assets, contains attacks, and enhances cyber resilience. By applying the principles of Zero Trust to stop lateral movement across multi-cloud and hybrid infrastructure, it enables organizations to protect critical resources and prevent the spread of cyberattacks. 'Our partnership with Illumio reflects Redington's continued commitment to bringing the most advanced and relevant cybersecurity solutions to our partners and customers,' said Dharshana Kosgalage, Executive Vice President, Technology Solutions Group, Redington. 'In today's threat landscape, Zero Trust Segmentation is no longer optional—it's essential. Through our extensive channel ecosystem, we will accelerate access to this critical technology, enabling partners to drive real cyber resilience for their customers.' Recognized as a leader in The Forrester Wave™: Microsegmentation Solutions, Q3 2024 report, Illumio Segmentation is proven to strengthen cyber resilience and reduce the impact of attacks. A Forrester Total Economic ImpactTM report shows Illumio reduces the blast radius of attacks by 66%, saving $1.8 million in decreased risk exposure. Ransomware emulations from Bishop Fox also show Illumio stops attacks from spreading nearly four times faster than detection and response capabilities alone. 'Breaches today are inevitable, but disasters don't have to be,' said Sam Tayan, Director of Sales for Middle East, Turkey and Africa (META) at Illumio. 'Illumio Segmentation provides a simple and effective way to contain threats, minimize risk, and build resilience, so that organizations can thrive without fear of cyber disasters. We're thrilled to partner with Redington to jointly deliver value to customers and empower them to stay agile in the face of today's cyberthreats.' Illumio Segmentation sits alongside Illumio Insights as part of the Illumio Platform, the first cybersecurity platform dedicated to containing breaches built on an AI security graph. Illumio Insights is an AI-powered cloud detection and response (CDR) offering that helps organizations quickly identify risks and detect threats. With both Insights and Segmentation, security teams can shrink the attack surface, detect threats, and contain breaches in real time. To ensure the successful adoption of Illumio Segmentation, Redington is going beyond basic enablement—arming its channel partners with deep technical training, strategic advisory, and hands-on deployment support. By blending cybersecurity expertise with real-world application scenarios, Redington is helping partners not only sell Illumio, but also become trusted advisors in breach containment, accelerating business growth and elevating their value in the cybersecurity ecosystem. 0 0
Yahoo
03-04-2025
- Business
- Yahoo
Vertosoft Named Illumio's Newest Software Distributor for the Public Sector, Enhancing Cybersecurity Capabilities
LEESBURG, VIRGINIA / / April 3, 2025 / Vertosoft is thrilled to announce that they have been named as Illumio's newest software distributor for the public sector. With this newly formed partnership, Illumio Zero Trust Segmentation (ZTS), part of Illumio's breach containment platform, will be readily available to the public sector through Vertosoft's direct contracts as well through their partner network. The addition of Illumio's ZTS solution to Vertosoft's cybersecurity portfolio reinforces Vertosoft's commitment to helping the public sector contain breaches and enhance their security posture in support of their missions. "We are excited to partner with Illumio and deliver unmatched visibility and threat containment across agencies' infrastructures through their Zero Trust Segmentation solution." said Josh Slattery, Vice President of Tech Sales at Vertosoft. "Illumio's advanced cybersecurity capabilities align perfectly with Vertosoft's mission of delivering secure infrastructure to the public sector, ensuring that we can safeguard our nation's digital assets effectively." "Segmentation ensures that everyday attacks don't escalate into mission-impacting breaches," said Todd Palmer, Senior Vice President of Global Partner Sales and Alliances at Illumio. "Illumio Zero Trust Segmentation offers a straightforward and effective way to contain threats, minimize risk, and build resilience. We're thrilled to partner with Vertosoft to jointly deliver value to the public sector and empower them to stay agile against today's cyberthreats." Illumio's ZTS solution is designed to stop the spread of breaches and provide comprehensive visibility across hybrid attack surfaces. Offering unparalleled visibility, consistent enforcement, and enhanced cyber resilience, enabling government agencies to perform their missions despite increasing adversary attacks. With the Government Cloud achieving FedRAMP® Authorization to Operate at the Moderate Impact Level, Illumio ensures mission success through modern breach containment. By reducing unnecessary lateral movement across multi-cloud and hybrid infrastructures, protecting critical resources and preventing the spread of cyberattacks. Eliminating blind spots, preventing lateral movement, ringfencing high-value assets, and ensuring continuous protection, Illumio helps the public sector move securely to the cloud and control information sharing. About Vertosoft At Vertosoft we are a trusted, value-driven distributor of innovative technology solutions. Our experienced team and tailored services equip our channel partners and suppliers with the tools, contracts, and secure systems needed to succeed in the public sector market. Visit for more information. Visit for more information. Contact Information Mary Dawson Digital Marketing Managerinfo@ Nicole Bongianino Channel Marketing SOURCE: Vertosoft View the original press release on ACCESS Newswire Sign in to access your portfolio


The Independent
29-01-2025
- Business
- The Independent
Prepare to be breached: the radical cyber-security strategy that might save your business
Illumio is a Business Reporter client Illumio's Mario Espinoza on why the future of digital defence is about containment, not prevention. If you're struggling to keep cyber-attacks out of your network, Illumio Chief Product Officer Mario Espinoza has some advice you might not expect from a security vendor: admit that you can't. 'The breach is going to happen no matter what,' he says. Today's IT environments are just too complex to prevent them, he argues; the attacks too advanced; the technical flaws too numerous. And, above all, people are just too prone to human error. The sooner security leaders shift their mindset away from trying to prevent breaches to containing them, the better off we'll all be. 'If you're a sensible organisation, you're going to accept that,' says Espinoza. 'Now the question becomes, how do you prevent the attacker from moving to other parts of your organisation?' The answer? Zero Trust. As the term implies, Zero Trust is a security model based on the principle of 'never trust, always verify'. Unlike traditional security focused on protecting the network perimeter (a 'moat and castle' approach), Zero Trust assumes that every connection is a potential threat. Resources are protected no matter where the connection is coming from, inside or outside the security perimeter (if there's even such a thing as a perimeter anymore). 'Zero Trust protects you before the attacks happen.' Espinoza says. Microsegmentation is one of the key pillars of Zero Trust. Rather than having one big open space protected by a perimeter, microsegmentation divides the environment into very small zones around individual workloads. For years, even those who agreed with Zero Trust in principle found it hard to use in practice. Deployment was slow and costly. And when the network environment changed, the IT team had to readjust firewall rules and other controls – manually, in most cases. Keeping up grew even harder with the rise of hybrid environments, where workloads constantly spin up and down in the cloud, on virtual machines and within containers. Today's IT teams typically manage a complex mix of on-premises data centres, multiple cloud providers, remote workers, IoT devices and operational technology. In the eyes of many security leaders, the downsides of trying the new approach outweighed any potential upside. But that's changing, thanks to two converging trends. First, cyber-threats have only multiplied in the 15 years since Zero Trust creator John Kindervag first introduced the concept of Zero Trust. Breaches have grown so frequent that only the largest qualify as news. And every headline serves as another reminder that old security models aren't working anymore (if they ever did). The second trend was a more hopeful one: modern Zero Trust tools have become easier to use, with AI and automation helping to simplify the process. 'It's not as if people just now realised how effective containment is,' Espinoza says. 'But the technology has evolved.' In the process, Zero Trust has gone from ambitious theory to security canon. In 2021, the White House issued Executive Order 14028, which mandated Zero Trust adoption across all federal agencies. (Government departments are at various stages of deployment.) The tech sector has quickly lined up behind the idea. Most market research firms now urge clients to adopt Zero Trust and microsegmentation into their cyber-defences. All major cloud platforms now integrate Zero Trust principles into their security offerings. And all of the major infrastructure players are integrating Zero Trust capabilities into their core products. Perhaps most remarkably, corporate giants such as JP Morgan Chase and Bank of America – usually loath to air their defence strategies – have publicly documented their Zero Trust journeys. According to research firm MarketsandMarkets, the global Zero Trust security market will more than double from 2022 levels to $60.7 billion by 2027. And Forrester Research, where Kindervag introduced the concept of Zero Trust, says more than 60 per cent of enterprises are already deploying or expanding their Zero Trust efforts. Enter AI One of the biggest shifts in the threat landscape is the rise of AI-powered social engineering attacks, Espinoza says. Attackers are already using it to create highly convincing phishing attempts and even clone voices for impersonation attacks. These attacks will only get more effective, spurring security leaders to shift to a strategy of containment. 'The weakest link today is the human at the keyboard,' he says. 'Hacking the human is so easy. It ensures that the breach is going to happen no matter what.' The rise of security graphs Espinoza says security leaders should start thinking about new approaches, such as security graphs. Rather than looking at individual workloads in isolation, a security graph might analyse traffic patterns between different parts of an IT infrastructure to spot potential threats. Such approaches have been proposed before. But given the massive amount of data involved – think terabytes and petabytes – they haven't been practical. Now, innovations in data processing and AI are finally putting them within reach. The way forward For those looking to adopt Zero Trust, Espinoza recommends starting with visibility rather than jumping straight to deploying controls. Seeing vulnerabilities and potential attack paths is valuable in itself. And mapping out how data moves across the environment lays the groundwork for setting Zero Trust policies. As threats evolve and IT environments become more and more complex, this shift towards containment will only snowball, he said. Prevention and detection are still important. But they are no longer enough on their own to protect against today's threats. Espinoza admits that these new approaches won't reduce the number of attacks. But they can greatly limit their impact, he contends. 'We can make attackers' lives much more difficult. With proper containment, an attack won't become a cyber-disaster.'