Securing your network in every direction with zero trust
Why Zero Trust is essential to protecting modern networks


With ransomware attacks on the rise and breaches now costing organizations on average $4.45 million, IT leaders are turning towards Zero Trust solutions to strengthen resilience. Netskope and Illumio invite you to attend this exciting webinar event highlighting how they're partnering to help you protect against breaches and build cyber resilience.
To kick off the webinar, you'll hear from Illumio's Chief Evangelist, John Kindervag, and Netskope's Field CTO, Steve Riley, as they discuss the evolution of network security as organizations have transformed their environments in the hybrid, multi-cloud era. John and Steve, both former analysts at Forrester and Gartner respectively, will explain why Zero Trust is essential to protecting modern networks and how Zero Trust Segmentation (ZTS) and Zero Trust Network Access (ZTNA) are essential and complementary components of your Zero Trust strategy.
After this discussion, you'll join a conversation between Haider Jarral, Lead Technologist at Illumio, and Gary Jenkins, Principal Solutions Architect at Netskope, about how the Illumio and Netskope integration enables network and security teams to create Zero Trust policies that consistently secure access at an organization's perimeter and within its hybrid, multi-cloud infrastructure.
What you'll learn:
- Learn more about the origin of Zero Trust and understand the fundamentals of how to implement this strategy in your IT environment, while demystifying some of the common misconceptions about Zero Trust
- Understand why both Zero Trust Segmentation (ZTS) and Zero Trust Network Access (ZTNA) are essential to a successful Zero Trust strategy
- Discover the benefits that the Netskope and Illumio integration can offer your organization, including increased visibility and greater security across a hybrid, multi-cloud environment
Watch now
Provided by Illumio
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Zyxel XGS1935-52HP review
Reviews Plenty of Gigabit ports and a fair power budget makes this switch a great choice for SMBs with big PoE+ deployment plans
-
Passwords are a problem: why device-bound passkeys can be the future of secure authentication
Industry insights AI-driven cyberthreats demand a passwordless future…
-
MSPs beware – these two ransomware groups are ramping up attacks and have claimed hundreds of victims
News The Akira and Lynx ransomware groups are focusing on small businesses and MSPs using stolen or purchased admin credentials
-
The UK’s ‘chronic shortage of cyber professionals’ is putting the country at risk
News While high-profile attacks grab headlines, a security researcher warns the UK's "chronic shortage of cyber professionals" is left unaddressed by government, industry, and academia.
-
Credential theft has surged 160% in 2025
News AI-powered phishing and the growth of Malware as a Service means hackers are compromising more accounts than ever
-
US federal judiciary agency hit by 'escalated cyber attacks' which exposed highly sensitive data
News The agency says it plans to step up cybersecurity capabilities in the wake of the incident
-
Nearly one-third of ransomware victims are hit multiple times, even after paying hackers
News Many ransomware victims are being hit more than once, largely thanks to fragmented security tactics
-
Millions of Dell laptops are are at risk thanks to a Broadcom chip vulnerability – and more than 100 device models are impacted
News Widely used in high-security environments, the PCs are vulnerable to attacks allowing the theft of sensitive data
-
Cybersecurity teams are wasting time, money, and effort dealing with tool sprawl and ‘multi-vendor ecosystems’
News Tool sprawl is a problem that just won't go away for security teams
-
AI breaches aren’t just a scare story any more – they’re happening in real life
News IBM research shows proper AI access controls are leading to costly data leaks