/
Zero Trust Segmentation

How Cathay Pacific Fast-Tracked Segmentation and Compliance Success with Illumio

"Attacker sophistication just keeps improving ‚ How do you make it difficult for them?"

With this question looming over General Manager of Infrastructure, Operations, and Security, Kerry Peirse, Cathay Pacific determined to implement a Zero Trust security strategy and redouble its focus on segmentation to prevent the lateral movement of attackers and malware.

Kerry and team sought to make life difficult for attackers with a micro-segmentation solution that makes life easier for the organization. This led Cathay to Illumio Core and Illumio Edge for end-to-end Zero Trust and micro-segmentation.

Time is of the essence in matters of  lateral movement protection and PCI compliance, and Illumio's simpler approach to micro-segmentation put Cathay on a fast track to success: ‚"Our overall implementation time was less than three months, which is very fast. If you try and do that on a network-based level, you're talking 12, 18 months."

Hear their story in this video with Kerry Peirse, General Manager of Infrastructure, Operations, and Security. Kerry recounts:

  • Cathay's requirements for segmenting their critical systems and protecting vast troves of customer data.
  • How Illumio proved indispensable while chasing down an attack.
  • The added value to the organization that goes above and beyond any product capabilit

To learn more about Cathay's story from Head of Infrastructure Engineering, YC Chan, read on here.

Related topics

Related articles

Zero Trust is Not Hard...If You’re Pragmatic
Zero Trust Segmentation

Zero Trust is Not Hard...If You’re Pragmatic

In this series, get step-by-step recommendations for building out your organization's Zero Trust model.

Forbes Recognizes Illumio as Top Cloud Company
Zero Trust Segmentation

Forbes Recognizes Illumio as Top Cloud Company

Hear from Illumio CEO Andrew Rubin about how this accomplishment was made possible.

Getting Segmentation Right With Structured Policy Control
Zero Trust Segmentation

Getting Segmentation Right With Structured Policy Control

In any organization, it’s inevitable that at least one endpoint device is going to be breached by attackers. But if the organization has Zero Trust Segmentation security in place, the breach can be confined to that initial endpoint, regardless of whether that endpoint is a laptop, desktop, server, or even a virtual machine.

No items found.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?