As ransomware attacks reign supreme, security teams must implement modern approaches to protecting dynamic, hybrid IT environments. Ransomware will get in — but with technology like Illumio's Zero Trust Segmentation, breaches don't equate to a cyber disaster for your organization. Just how effective is Zero Trust Segmentation in detecting and containing a ransomware attack? Red team specialists from Bishop Fox conducted emulated attacks to measure the effectiveness of Illumio Core against active ransomware threats, using common tactics, techniques and procedures (TTPs).
This report details how Bishop Fox validated Illumio's Zero Trust Segmentation in rendering attackers ineffective in less than 10 minutes and complements endpoint detection and response (EDR) solutions.
The goals of the ransomware simulation engagement included:
- Determining realistic metrics to measure the effectiveness of the Illumio Core product against a ransomware attack
- Develop an attack methodology based on real threat actors’ tactics, techniques, and procedures (TTPs) to attack the test environment
- Execute attack emulations on the test environment based on the developed methodology to gradually measure the effectiveness of Illumio Core in detecting and responding to a ransomware attack
For more information on Bishop Fox Ransomware Simulations, please visit our service page.