Illumio Blog
Find me on:
December 6, 2018

The Forrester Wave™ for Zero Trust

Vice President of Product Management

Matthew is a 20-year industry veteran with experience in five successful start-ups. He is responsible for Illumio’s product lines and product strategy.

Illumio believes that the Zero Trust approach to cybersecurity is a strong one: "never trust, always verify” – trust nothing inside or outside your perimeter; verify everything trying to connect to your systems and your high-value assets. As I travel around the world meeting with customers, I hear the words "Zero Trust" more and more. After speaking with Dr. Chase Cunningham of Forrester about the "why" of Zero Trust, I personally bought in. Tactics and technologies can come and go, but a philosophy (and strategy) implies long-term guiding principles that customers can apply to product purchasing trade-offs – and to this end, Zero Trust provides long-term guidance rather than a specific product recommendation.

Read more »
July 24, 2018

Challenges in Global Banking – The SWIFT of the Iceberg

Vice President of Product Management

Matthew is a 20-year industry veteran with experience in five successful start-ups. He is responsible for Illumio’s product lines and product strategy.

The very public SWIFT breaches and the SWIFT consortium’s reaction have been a canary in a coal mine, setting many regional governments in motion to look at the ramifications of ‘wide open’ payment systems and driving the development of the new SWIFT Customer Security Controls Framework in the past year. 

Read more »
October 20, 2017

"You Must Protect the Network..." and Other Jedi Mind Tricks

Vice President of Product Management

Matthew is a 20-year industry veteran with experience in five successful start-ups. He is responsible for Illumio’s product lines and product strategy.

The Jedi Mind Trick: Originally from the movie "Star Wars." In it, Jedi master Obi-Wan Kenobi displays how the Force can have an influence over people. It’s generally used when one causes another to perform a totally uncharacteristic action – like someone trying to protect the network when they really want to protect their applications.

Read more »

Adaptive Security

September 18, 2017

How to Align Micro-Segmentation Policy Creation With Your Organization

Vice President of Product Management

Matthew is a 20-year industry veteran with experience in five successful start-ups. He is responsible for Illumio’s product lines and product strategy.

This blog post takes you through an example scenario of how Illumio’s multi-dimensional labeling allows organizations to generate micro-segmentation policies by aligning policy creation with their organizational structure one of the most unique capabilities of the Illumio Adaptive Security Platform.

Read more »

Adaptive Security

April 6, 2017

Network vs. Security Segmentation – Don’t back your Winnebago into the compact car spot

Vice President of Product Management

Matthew is a 20-year industry veteran with experience in five successful start-ups. He is responsible for Illumio’s product lines and product strategy.

The need for segmentation as security strategy has evolved quite a bit. From the early days of networks to the complex data center and cloud environments of today, the approach organizations take to segmentation hasn’t kept pace. Anyone trying to use traditional segmentation approaches to address new security challenges will quickly discover it falls short of meeting both expectations and security requirements.

However, this hasn’t stopped vendors and some organizations from trying to fit the proverbial square networking peg into the round security hole. Spoiler alert: it just won’t fit.

What you really need is Security Segmentation.

Read more »

Adaptive Security, Illumio News