logo
#

Latest news with #IllumioInsights

Redington Signs Distribution Partnership With Illumio For Containing Breaches
Redington Signs Distribution Partnership With Illumio For Containing Breaches

Channel Post MEA

time4 days ago

  • Business
  • Channel Post MEA

Redington Signs Distribution Partnership With Illumio For Containing Breaches

Redington has announced a new distribution partnership with Illumio, the breach containment company. The partnership will see Redington work with Illumio to evolve its channel strategy, drive partner enablement, and accelerate go-to-market momentum for Illumio Segmentation, helping organizations across the region reduce risk, contain attacks, and stop cyberattacks from turning into cyber disasters. Despite record spending on cybersecurity, the volume, cost, and impact of cyberattacks continue to rise. Ransomware and other threats bypass perimeter defenses, with attackers exploiting vulnerabilities in hybrid and multi-cloud environments to move across networks and reach critical data, assets, and infrastructure. Illumio Segmentation proactively protects critical assets, contains attacks, and enhances cyber resilience. By applying the principles of Zero Trust to stop lateral movement across multi-cloud and hybrid infrastructure, it enables organizations to protect critical resources and prevent the spread of cyberattacks. 'Our partnership with Illumio reflects Redington's continued commitment to bringing the most advanced and relevant cybersecurity solutions to our partners and customers,' said Dharshana Kosgalage, Executive Vice President, Technology Solutions Group, Redington. 'In today's threat landscape, Zero Trust Segmentation is no longer optional—it's essential. Through our extensive channel ecosystem, we will accelerate access to this critical technology, enabling partners to drive real cyber resilience for their customers.' Recognized as a leader in The Forrester Wave™: Microsegmentation Solutions, Q3 2024 report, Illumio Segmentation is proven to strengthen cyber resilience and reduce the impact of attacks. A Forrester Total Economic ImpactTM report shows Illumio reduces the blast radius of attacks by 66%, saving $1.8 million in decreased risk exposure. Ransomware emulations from Bishop Fox also show Illumio stops attacks from spreading nearly four times faster than detection and response capabilities alone. 'Breaches today are inevitable, but disasters don't have to be,' said Sam Tayan, Director of Sales for Middle East, Turkey and Africa (META) at Illumio. 'Illumio Segmentation provides a simple and effective way to contain threats, minimize risk, and build resilience, so that organizations can thrive without fear of cyber disasters. We're thrilled to partner with Redington to jointly deliver value to customers and empower them to stay agile in the face of today's cyberthreats.' Illumio Segmentation sits alongside Illumio Insights as part of the Illumio Platform, the first cybersecurity platform dedicated to containing breaches built on an AI security graph. Illumio Insights is an AI-powered cloud detection and response (CDR) offering that helps organizations quickly identify risks and detect threats. With both Insights and Segmentation, security teams can shrink the attack surface, detect threats, and contain breaches in real time. To ensure the successful adoption of Illumio Segmentation, Redington is going beyond basic enablement—arming its channel partners with deep technical training, strategic advisory, and hands-on deployment support. By blending cybersecurity expertise with real-world application scenarios, Redington is helping partners not only sell Illumio, but also become trusted advisors in breach containment, accelerating business growth and elevating their value in the cybersecurity ecosystem. 0 0

Rethinking Threat Detection In A Decentralized World
Rethinking Threat Detection In A Decentralized World

Forbes

time14-04-2025

  • Business
  • Forbes

Rethinking Threat Detection In A Decentralized World

Cybersecurity professionals have been playing catch-up for far too long. As infrastructure grows more dynamic, distributed, and complex, our tools and strategies have remained fragmented—split across cloud-native silos, network perimeters, and isolated threat detection platforms. And while the industry loves to talk about "visibility," most security teams still operate with a partial and often outdated view of what's actually happening across their environments. But that's changing—thanks in large part to a fundamental shift in how we interpret and respond to risk. Hybrid and multi-cloud environments have become the new normal. Organizations run workloads across AWS, Azure, Google Cloud, and on-prem data centers—all while managing sprawling APIs, ephemeral containers, and third-party integrations. The result is a security visibility crisis. Traditional Network Detection and Response tools can't scale across cloud providers. Cloud-native application protection platforms, meanwhile, offer great telemetry—if you're entirely in the cloud. But most enterprises aren't. And even when these platforms work as advertised, they often lack the context needed to act. 'There are really two fundamental issues here,' explains John Oltsik, analyst in residence at SiliconANGLE and theCUBE. 'One is real-time visibility across all associated assets and components. The other is the ability to add context—such as an asset's location, vulnerability, business value, etc. This visibility and context really requires massive scale and superior analytics.' As Mario Espinoza, Chief Product Officer at Illumio, put it: 'A breach doesn't have to become a cyber disaster. But you can't stop what you can't see—and you can't contain what you don't understand.' In short, detection isn't enough. To mount an effective defense, you need to understand what's happening—and why it matters. Let's break it down: And here's the hard truth: even the best-prevention strategy eventually fails. Breaches are inevitable. The real question is—what happens next? The answer is the AI security graph, a data model that maps every workload, resource, and connection across the environment—on-prem and in the cloud. Think of it as a living, evolving blueprint of your organization's digital nervous system. By layering AI on top of this graph, organizations can detect previously invisible patterns, such as stealthy lateral movement or anomalous traffic between systems that should never be communicating. This isn't just theoretical. Illumio Insights brings the AI security graph to life. Espinoza explains it this way: 'The attacker sees your network as a graph. Until now, defenders have been stuck thinking in lists. We're changing that.' Espinoza explained to me that Illumio Insights ingests billions of flows across hybrid and multi-cloud environments, in real time, without the need for agents or invasive infrastructure changes. The platform analyzes that data to identify blast radius, high-value targets under attack, and even obscure threats like shadow LLM activity or policy violations that expose critical workloads. 'We compress what could be hundreds of thousands of flows into a single, meaningful insight,' Espinoza notes. 'Instead of overwhelming the SOC with alerts, we deliver a distilled view of what's actually going on—and what needs to happen next.' This approach doesn't just reduce alert fatigue. It has the potential to fundamentally changes the nature of incident response. Analysts no longer need to sift through raw logs or stitch together disjointed alerts. They simply get an immediate, contextualized picture—with the ability to act on it instantly. According to Espinoza, one of the most powerful features of Illumio Insights is its integration with Illumio Segmentation. With a single click, security teams can dynamically quarantine compromised systems—restricting communication without disrupting operations. Espinoza calls it "surgical enforcement." 'You might see a suspicious machine,' he explains, 'but instead of shutting it down entirely and risking business disruption, you isolate the threat by disabling just the risky communication paths. It's like neurosurgery instead of amputation.' That level of precision is critical in sensitive environments like manufacturing, energy, and healthcare—where taking a system offline isn't just inconvenient, it's potentially catastrophic. Perhaps most compelling is the flexibility that Illumio Insights offers. Organizations can deploy it in read-only mode for observability, integrate it into existing SIEM and SOAR workflows, or let it autonomously take action based on pre-approved rules. And as Espinoza shared, many customers who start with observability quickly ask to move into enforcement once they 'see the full picture.' Interestingly, while segmentation was originally positioned as a proactive Zero Trust control, it's the incident responders and threat hunters who have driven adoption of Insights. "They saw the gold mine in the graph,' Espinoza says. 'They didn't want to wait for a segmentation strategy—they wanted visibility and insights now.' According to Oltsik, the real differentiator is how Illumio connects detection to enforcement in a seamless loop. 'The beauty with Illumio is that it connects this detection and analysis with remediation capabilities. So, when Insights detects malicious traffic, security teams can further segment networks to prevent any further damage. This is an element of cyber-resilience—the ability to recover quickly from a cyberattack while minimizing damages.' Illumio isn't stopping with network flows. Espinoza also hinted at a future where Illumio Insights connects with other graphs—like Microsoft's and CrowdStrike's—to offer even deeper context and automation. The vision is clear: to arm defenders with tools that not only match, but surpass, the sophistication of modern attackers. 'This is how we turn the tide,' he says. 'Security at a system level. Defense that understands the environment better than the adversary does.' Organizations need something that is both profound and practical: a unified, intelligent view of the environment that empowers security teams to detect, understand, and contain threats—before they spiral into full-blown crises. Because in a world where attackers think in graphs, it's time defenders started doing the same.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store