Illumio Blog
October 18, 2019

"We should have done this years ago": A History of Decoupling

Sr. Product Marketing Manager

Katey focuses on go-to-market strategy including voice of the customer. She has over a decade of enterprise IT experience working with global regulators, financial services, and Fortune 100 corporations.

Breaking up isn’t always hard to do. Sometimes things run their course, and a relationship outlives its usefulness. Our only regret is not realizing it sooner!

Remember toll plazas?

We used to have to pay tolls in cash to collectors at checkpoints on highway and bridges. It was a terrible bottleneck. Highways are there to get you where you need to go quickly. Tollbooth checkpoints are the opposite of quick. They just slow everyone down.

Read more »

cybersecurity

September 30, 2019

Divide and Conquer: Why It's Time to Unlock Security From the Network

Sr. Product Marketing Manager

Katey focuses on go-to-market strategy including voice of the customer. She has over a decade of enterprise IT experience working with global regulators, financial services, and Fortune 100 corporations.

Network segmentation is a well-known approach to network security and has been lauded as a way to improve security and reduce your attack surface. At Illumio, we talk a lot about the value of our product being the best solution for segmentation because our software actually allows network and security teams to “decouple” – that is, allow the security segmentation policy to be independent of network infrastructure and constraints.

But you might ask yourself: why is that important? Here’s your Decoupling 101.

Read more »

cybersecurity

September 18, 2019

Better Containing Threats in a Containerized World

Sr. Product Marketing Manager

Katey focuses on go-to-market strategy including voice of the customer. She has over a decade of enterprise IT experience working with global regulators, financial services, and Fortune 100 corporations.

It is a DevOps world – and the rest of us are just living in it.  While this isn’t the case entirely, it can feel this way given how often we hear about DevOps, microservices, and containers.

Truth be told, it was clear in 2015 when we began securing Docker containers that DevOps and the continuous software delivery process was already bringing tremendous business and technical value. Containers break applications into more manageable pieces for more efficient software development that gets new applications and features into the hands of users and customers quickly.  

Read more »

cybersecurity

June 7, 2019

Measure It, Master It: The Illumio Attack Surface Quiz

Sr. Product Marketing Manager

Katey focuses on go-to-market strategy including voice of the customer. She has over a decade of enterprise IT experience working with global regulators, financial services, and Fortune 100 corporations.

"Reduce your attack surface..." 

"Minimize the blast radius..."

Marketers use these doomsday metaphors to scare seasoned security pro's from day-to-day paranoia into action! 

Read more »

cybersecurity

May 17, 2019

Paying the Inaction Tax: Building a Case for Compliance with Segmentation

Sr. Product Marketing Manager

Katey focuses on go-to-market strategy including voice of the customer. She has over a decade of enterprise IT experience working with global regulators, financial services, and Fortune 100 corporations.

We’ve talked about how to prepare your organization to start ringfencing crown jewel applications – the people and process legs of the stool to address critical risks in securing your applications.

But why is segmentation important in the first place? If there is no specific compliance obligation, vulnerability issue, or failed PEN test, why should your business spend money on controls to ringfence its applications against the spread of breach? What exactly is the inaction tax for an organization with "status quo security"?

Read more »

cybersecurity