/
Zero Trust Segmentation

How Ixom Got Instant Visibility and Control in 2 Days With Illumio

Struggling to scale firewall strategy in a “cloud-first” organization? As we’ve discussed, applying network segmentation using traditional manual firewalling methods can be an exercise in frustration – especially for systems not on the network.

But don’t take our word for it! When industrial chemical manufacturer Ixom determined to segment mission-critical systems across the globe with default-deny policy, its experts chose SaaS-based Illumio as an alternative to complicated and inadequate traditional network segmentation – and deployed in two days.

Hear their story in this video with CIO Rowan Start and Cloud & Security Architect Greg Leibel as they discuss:

  • The challenges and opportunities of their cloud-first strategy
  • Limitations of attempting segmentation by subnets
  • The ultimate solution: unprecedented visibility and control of their most vulnerable and critical systems – implemented in just two days  
  • The ultimate reward: confidence that they're "managing risk better and can provide much more innovative solutions" to their business

"When we first put in our cloud data centers, we implemented the native cloud segmentation by subnets and it didn't give us the visibility or the granularity. With Illumio, we managed to implement controls on those Windows firewalls so quickly and so easily and provide visibility we never knew we could get."

Related topics

Related articles

6 Microsegmentation Requirements for Modern Applications
Zero Trust Segmentation

6 Microsegmentation Requirements for Modern Applications

A great deterrent for hackers, organizations are implementing microsegmentation as an essential part of a defense-in-depth security ecosystem.

Learnings From 3 Recent Cyberattacks Point to Zero Trust Segmentation
Zero Trust Segmentation

Learnings From 3 Recent Cyberattacks Point to Zero Trust Segmentation

Recent cybersecurity incidents like those impacting MITRE, the Danish energy infrastructure, and the British Library are reminders of how important network segmentation is in reducing the impact of breaches and ransomware attacks.

Why Threat Detection Needs Zero Trust Segmentation
Zero Trust Segmentation

Why Threat Detection Needs Zero Trust Segmentation

Why MSSPs should offer Zero Trust segmentation as a service in addition to threat detection technology.

No items found.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?