Illumio believes that the Zero Trust approach to cybersecurity is a strong one: "never trust, always verify” – trust nothing inside or outside your perimeter; verify everything trying to connect to your systems and your high-value assets. As I travel around the world meeting with customers, I hear the words "Zero Trust" more and more. After speaking with Dr. Chase Cunningham of Forrester about the "why" of Zero Trust, I personally bought in. Tactics and technologies can come and go, but a philosophy (and strategy) implies long-term guiding principles that customers can apply to product purchasing trade-offs – and to this end, Zero Trust provides long-term guidance rather than a specific product recommendation.
The very public SWIFT breaches and the SWIFT consortium’s reaction have been a canary in a coal mine, setting many regional governments in motion to look at the ramifications of ‘wide open’ payment systems and driving the development of the new SWIFT Customer Security Controls Framework in the past year.
Read more »
The Jedi Mind Trick: Originally from the movie "Star Wars." In it, Jedi master Obi-Wan Kenobi displays how the Force can have an influence over people. It’s generally used when one causes another to perform a totally uncharacteristic action – like someone trying to protect the network when they really want to protect their applications.Read more »
This blog post takes you through an example scenario of how Illumio’s multi-dimensional labeling allows organizations to generate micro-segmentation policies by aligning policy creation with their organizational structure – one of the most unique capabilities of the Illumio Adaptive Security Platform.
Read more »
The need for segmentation as security strategy has evolved quite a bit. From the early days of networks to the complex data center and cloud environments of today, the approach organizations take to segmentation hasn’t kept pace. Anyone trying to use traditional segmentation approaches to address new security challenges will quickly discover it falls short of meeting both expectations and security requirements.
However, this hasn’t stopped vendors and some organizations from trying to fit the proverbial square networking peg into the round security hole. Spoiler alert: it just won’t fit.
What you really need is Security Segmentation.