Visibility and Ransomware Isolation
This workshop will give you a greater understanding of how to isolate ransomware to prevent it from infecting your entire infrastructure.
What you'll do:
Start with a brief primer on Illumio. The rest of the time is all yours to get hands-on experience at your own pace — with step-by-step instructions to help you along.
- Identify potential risks in the network: Build a map to visualize and understand communications between application workloads.
- Block high-risk ports used by ransomware: Use Illumio’s Enforcement Boundaries to shut down common ransomware propagation pathways.
- Separate and secure disparate computing environments: Quickly prevent communication between Production and Development environments.
What you need:
Participants must have a laptop that is compatible with Zoom.