/
Zero Trust Segmentation

How Ixom Got Instant Visibility and Control in 2 Days With Illumio

Struggling to scale firewall strategy in a “cloud-first” organization? As we’ve discussed, applying network segmentation using traditional manual firewalling methods can be an exercise in frustration – especially for systems not on the network.

But don’t take our word for it! When industrial chemical manufacturer Ixom determined to segment mission-critical systems across the globe with default-deny policy, its experts chose SaaS-based Illumio as an alternative to complicated and inadequate traditional network segmentation – and deployed in two days.

Hear their story in this video with CIO Rowan Start and Cloud & Security Architect Greg Leibel as they discuss:

  • The challenges and opportunities of their cloud-first strategy
  • Limitations of attempting segmentation by subnets
  • The ultimate solution: unprecedented visibility and control of their most vulnerable and critical systems – implemented in just two days  
  • The ultimate reward: confidence that they're "managing risk better and can provide much more innovative solutions" to their business

"When we first put in our cloud data centers, we implemented the native cloud segmentation by subnets and it didn't give us the visibility or the granularity. With Illumio, we managed to implement controls on those Windows firewalls so quickly and so easily and provide visibility we never knew we could get."

Related topics

Related articles

5 Zero Trust Takeaways From Former Federal CIO Gary Barlet
Zero Trust Segmentation

5 Zero Trust Takeaways From Former Federal CIO Gary Barlet

Learn why Gary Barlet, Federal Field CTO at Illumio, sees Zero Trust a new way to approach cybersecurity altogether, not just a new way to manage old security problems.

3 Things You Should Be Looking For at RSA Conference 2024
Zero Trust Segmentation

3 Things You Should Be Looking For at RSA Conference 2024

Get insight into how you should be thinking about AI security risks, cloud security, and cybersecurity ROI at RSA Conference 2024.

What is the Principle of Least Privilege?
Zero Trust Segmentation

What is the Principle of Least Privilege?

The principle of least privilege (PoLP) allows the user to perform their job or required functions and nothing else.

No items found.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?