Adaptive Segmentationmicro-segmentation September 7, 2021

Gartner Hype Cycle for Network Security, 2021: Identity-Based Segmentation Ready for Adoption — Now

Sam Rastogi, Product Marketing Director

Right now, Illumio can help keep your network secure. And according to IT research and advisory firm Gartner, the same insight is being captured.

In fact, the latest Gartner Research Hype Cycle report on network security recognizes Illumio as a sample vendor for identity-based segmentation (also referred to as micro-segmentation). That, Gartner explains, means identity-based segmentation is now mature and approaching full mainstream adoption.

In other words, now’s the time to learn how Illumio’s innovative approach can help you quickly take advantage of this critical network security technology.

The Gartner® Hype Cycle™ provides a graphic representation of the maturity and adoption of various technologies and applications. It also shows how those technologies can help to solve real business problems and exploit new opportunities.

Underlying the Hype Cycle is a simple but powerful idea: All new technologies must progress through four phases: the innovation trigger, inflated expectations, trough of disillusionment, and slope of enlightenment. Only then can they arrive at the fifth and final phase: the plateau of productivity. That’s when mainstream adoption takes off.

Courtesy of Gartner, here’s a look, with identity-based segmentation appearing in the fourth phase.

gartner-hype-cycle-network-security

Source: Gartner, Hype Cycle for Network Security, 2021; Shipl Handa, Pete Shoard, 14 July 2021.

Security through segmentation

Illumio’s micro-segmentation approach to Zero Trust security — which Gartner calls “identity-based segmentation” — is shown by Gartner in the fourth phase, the slope of enlightenment. Here, a technology is piloted by leading organizations, and how it can benefit enterprises appears and becomes widely understood.

That describes Illumio’s approach pretty well. By creating and enabling micro-perimeters around like applications and data, Illumio can protect your organization from the spread of ransomware, malware and other attacks.

Real-world customers are securing their networks with Illumio now. They include such well-known organizations as Salesforce, Morgan Stanley, BNP Paribas and Oracle NetSuite.

Getting granular

As Gartner explains, identity-based segmentation creates more granular and dynamic policies than traditional network segmentation. Most traditional approaches, such as legacy network firewalls, present operational challenges to securing east-west traffic across data centers and multi-cloud environments. Once attacks penetrate the network perimeter, they can move laterally, infecting hundreds or even thousands of other devices on the network.

Illumio makes it easy to stop lateral movement by giving you granular control over identity attributes. These can include workloads, systems, infrastructure and users. For any given time, you can limit who has access to what data, systems and applications. In the event that your organization is breached, you can isolate ransomware and cyberattacks by blocking access to other devices on your network, limiting the ability to wreak havoc.

Other benefits

With Illumio’s Zero Trust segmentation, you can also enforce consistent segmentation policies across your organization’s on-premises and cloud-based workloads. That can include workloads hosting containers to meet regulatory requirements.

Illumio also offers rich application communication mapping that empowers you to identify where communication paths among systems are safe and secure.

Check out the Illumio Core overview to learn more about how it uniquely delivers intelligent visibility, a radically simple policy engine, and automated segmentation and enforcement in minutes.

Download the Gartner Hype Cycle for Network Security 2021 report for additional valuable insights on why identity-based segmentation should be a priority for your network security strategy, including key recommendations for evaluating solutions.

Gartner Disclaimer: Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Gartner and Hype Cycle are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved

Adaptive Segmentationmicro-segmentation
Share this post: