Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

4/18/2016
02:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Former NSC Director of Cybersecurity Policy Leads Illumio Cyber Assessment Program

Program Designed to Identify Attack Surface and Secure High-Value Assets Inside Data Centers and Clouds

SUNNYVALE, CA--(Marketwired - Apr 18, 2016) - Illumio, the Adaptive Security Company, today announced the launch of its Attack Surface Assessment Program (ASAP). Illumio ASAP gives enterprises MRI-like visibility inside the data center and cloud by providing a map of high-value assets and open communications pathways between applications. It then enables organizations to understand -- and radically reduce -- the attack surface of their high-value assets.

In a computing era where an average of 96 percent of systems have been breached (FireEye, Maginot Revisited, 2015), Illumio ASAP addresses the security gap inside the data center and cloud created by network segmentation technologies. It is designed for organizations who want to proactively identify and eliminate existing risks inside their data center and cloud associated with the lateral spread of attacks. ASAP's network- and application-level visibility enables IT Security teams to identify unknown traffic between development and production environments, as well as communication pathways that make high-value applications vulnerable to attackers.

"Once an attacker is inside a data center or cloud, their 'dwell time' -- the period they can scan a compromised network for high-value data before being detected -- can be upwards of 100-200 days," said Doug Cahill, ESG. "Technologies like the Illumio Attack Surface Assessment Program can give organizations additional visibility that can help them restrict attackers' ability to conduct network reconnaissance or eliminate infrastructure vulnerabilities before they can ever be exploited."

The development of Illumio ASAP was led by Nathaniel Gleicher, Head of Cybersecurity Strategy for Illumio and former Director for Cybersecurity Policy for the National Security Council at the White House.

"Because network segmentation tools tend to be coarse grained and incredibly complex to deploy at scale, the interior geography of most data centers is still fairly open," said Gleicher. "This large attack surface favors attackers, because once they get in they can quickly move to high-value targets, and be extremely difficult to identify and contain. Illumio ASAP is designed to rebalance the playing field between defenders and attackers."

Illumio ASAP Benefits
Illumio ASAP highlights the servers and communications flows that attackers are most likely to target in their search for high-value assets. The custom Illumio assessment report gives organizations a draft plan for eliminating the attack surface inside their data centers and clouds by using adaptive segmentation to harden their security posture.

Additional Resources

About Illumio
Illumio delivers adaptive security for every computing environment, protecting the 80 percent of data center and cloud traffic missed by the perimeter. The company's Adaptive Security Platform™ visualizes application traffic and delivers continuous, scalable, and dynamic policy and enforcement to every bare-metal server, VM, container, and VDI within data centers and public clouds. Using Illumio, enterprises such as Morgan Stanley, Plantronics, NTT, Salesforce, King Entertainment, NetSuite, and Creative Artists Agency have achieved secure application and cloud migration, environmental segmentation, compliance, and high-value application protection from breaches and threats with no changes to applications or infrastructure. For more information, visit www.illumio.com or follow @Illumio.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-34812
PUBLISHED: 2021-06-18
Use of hard-coded credentials vulnerability in php component in Synology Calendar before 2.4.0-0761 allows remote attackers to obtain sensitive information via unspecified vectors.
CVE-2021-34808
PUBLISHED: 2021-06-18
Server-Side Request Forgery (SSRF) vulnerability in cgi component in Synology Media Server before 1.8.3-2881 allows remote attackers to access intranet resources via unspecified vectors.
CVE-2021-34809
PUBLISHED: 2021-06-18
Improper neutralization of special elements used in a command ('Command Injection') vulnerability in task management component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to execute arbitrary code via unspecified vectors.
CVE-2021-34810
PUBLISHED: 2021-06-18
Improper privilege management vulnerability in cgi component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to execute arbitrary code via unspecified vectors.
CVE-2021-34811
PUBLISHED: 2021-06-18
Server-Side Request Forgery (SSRF) vulnerability in task management component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to access intranet resources via unspecified vectors.