/
Zero Trust Segmentation

How Ixom Got Instant Visibility and Control in 2 Days With Illumio

Struggling to scale firewall strategy in a “cloud-first” organization? As we’ve discussed, applying network segmentation using traditional manual firewalling methods can be an exercise in frustration – especially for systems not on the network.

But don’t take our word for it! When industrial chemical manufacturer Ixom determined to segment mission-critical systems across the globe with default-deny policy, its experts chose SaaS-based Illumio as an alternative to complicated and inadequate traditional network segmentation – and deployed in two days.

Hear their story in this video with CIO Rowan Start and Cloud & Security Architect Greg Leibel as they discuss:

  • The challenges and opportunities of their cloud-first strategy
  • Limitations of attempting segmentation by subnets
  • The ultimate solution: unprecedented visibility and control of their most vulnerable and critical systems – implemented in just two days  
  • The ultimate reward: confidence that they're "managing risk better and can provide much more innovative solutions" to their business

"When we first put in our cloud data centers, we implemented the native cloud segmentation by subnets and it didn't give us the visibility or the granularity. With Illumio, we managed to implement controls on those Windows firewalls so quickly and so easily and provide visibility we never knew we could get."

Related topics

Related articles

How ServiceNow Segments Across Azure and AWS With Illumio
Zero Trust Segmentation

How ServiceNow Segments Across Azure and AWS With Illumio

Learn more about how ServiceNow got up and running with micro-segmentation in this blog post.

Operationalizing Zero Trust – Step 1: Identify What to Protect
Zero Trust Segmentation

Operationalizing Zero Trust – Step 1: Identify What to Protect

As technology was deployed on a small scale, ad hoc solutions were manageable, and more productive than trying to pursue economies of scale or seek to engineer strategic solutions that could be relevant across the board.

Why a Zero Trust Strategy Requires Both ZTS and ZTNA
Zero Trust Segmentation

Why a Zero Trust Strategy Requires Both ZTS and ZTNA

Get top expert insights on building a Zero Trust framework using Zero Trust Network Access (ZTNA) and Zero Trust Segmentation (ZTS).

No items found.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?