Illumio Blog
December 6, 2018

The Forrester Wave™ for Zero Trust

Vice President of Product Management

Matthew is a 20-year industry veteran with experience in five successful start-ups. He is responsible for Illumio’s product lines and product strategy.

Illumio believes that the Zero Trust approach to cybersecurity is a strong one: "never trust, always verify” – trust nothing inside or outside your perimeter; verify everything trying to connect to your systems and your high-value assets. As I travel around the world meeting with customers, I hear the words "Zero Trust" more and more. After speaking with Dr. Chase Cunningham of Forrester about the "why" of Zero Trust, I personally bought in. Tactics and technologies can come and go, but a philosophy (and strategy) implies long-term guiding principles that customers can apply to product purchasing trade-offs – and to this end, Zero Trust provides long-term guidance rather than a specific product recommendation.

Read more »
December 5, 2018

Most Innovative Company of the Year

Sr. Content Marketing Manager

Innovation: 1 percent inspiration, 99 percent perspiration. At Illumio, innovation is born out of hard work and the drive to solve our customer’s data center and cloud security problems. Our employees, customers, and partners are integral to our innovation momentum. We’re proud to share some news on that front: Illumio has been named a Best in Biz Awards silver winner in the Most Innovative Company of the Year category.

Read more »
November 30, 2018

China Is the Top Long-Term Threat in Cyberspace

Head of Cybersecurity Strategy

Jonathan is a seasoned cybersecurity strategist. He's been at the forefront of international security policy and now leads Illumio's public cybersecurity policy engagements and research.

This article was originally published on nextgov.com

China is rising in economic and military might and presents the greatest long-term challenge to U.S. national interests—including in cyberspace. Three weeks ago, the current U.S. national security advisor, John Bolton, for the first time publicly attributed the hack of the Office of Personnel Management to China.

China is investing in military cyberspace forces and today’s cyber theft could be tomorrow’s influence operation or disruptive attack on infrastructure. So what should the United States do to prepare for the rise of Chinese power in cyberspace?

Read more »

cybersecurity

November 13, 2018

What Happens When the U.S. Starts to ‘Defend Forward’ in Cyberspace?

Head of Cybersecurity Strategy

Jonathan is a seasoned cybersecurity strategist. He's been at the forefront of international security policy and now leads Illumio's public cybersecurity policy engagements and research.

This article was originally published on defenseone.com

A couple of weeks ago, the U.S. Defense Department took the first step in executing its new “defend forward” doctrine in cyberspace. The Pentagon telegraphed this step in its new cyber strategy, which told Russia, China, and others that if they continue to conduct cyberspace operations against U.S. interests, the U.S. will push back by targeting their military cyberspace infrastructure and disrupting their operations.

Read more »

cybersecurity

November 7, 2018

It's a Bird, It's a Plane, It's...Supercluster!

Director of Product Management

Tim is an accomplished product management leader with 16 years of experience in enterprise software and networking. He leads platform product management for Illumio Policy Compute Engine.

Large organizations often have data centers located in different geographic regions. Distributed data centers allow these organizations to locate their applications close to their customers and employees, comply with data residency requirements, and provide disaster recovery for their critical business applications. The adoption of public cloud is making it even easier for organizations of all sizes to distribute their workloads across multiple regions. For example, AWS now spans 18 geographic regions around the world.   

We’re excited to introduce PCE Supercluster to provide full visibility, centralized and federated management, and consistent enforcement of micro-segmentation policies across multi-region infrastructure – at very large scale. This post explores the key requirements for securing multi-region infrastructure and why we designed PCE Supercluster with a federated architecture. 

Read more »

cybersecurity