illumio_Blog_Logo_2019-01
December 23, 2019

3 Cybersecurity Predictions for 2020

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

With the decade rapidly coming to a close, I’ve been reflecting on 2019, a year wrought with massive, public breaches that illustrated hacker sophistication unlike anything we’ve ever seen before. Collection #1 exposed over 770 million unique email addresses and over 21 million passwords, the Capital One breach affected nearly 106 million U.S. and Canadian residents, and 540 million Facebook user records were exposed on AWS. And that’s just the tip of the iceberg. 

Read more »

Cloud Computing, Adaptive Security, Data Center Operations

April 2, 2019

How To Mitigate Risk In A Flat Network - An Attacker's Paradise

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

This article was originally published on Forbes.com.

Flat networks have become so prevalent because they are typically simple to architect, cheap to construct and easy to operate and maintain. However, it turns out that malicious actors love flat networks, too. That's because once a single host on a flat network has been compromised, the integrity of the rest of the network starts to resemble a house of cards. Once an enterprise is penetrated, the flat network delivers the uninvited and unwelcome guest unfettered network access to scan, identify and target high-value assets. Unfortunately, many organizations fail to mitigate or even fully recognize these risks.

Read more »

Cloud Computing, Adaptive Security, Data Center Operations

January 11, 2019

Cybersecurity in 2019 - CTO Predictions

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

It's that time of year again so I took some time to reflect back on 2018 and what we can expect to ring true in 2019. I've boiled it down to two predictions. The first takes an introspective view into the organizations we're all ultimately tasked with protecting. The second takes an outward-facing view that acknowledges that enterprises are part of a broader business ecosystem, and with that comes upstream and downstream risk. 

Read more »

Cloud Computing, Adaptive Security, Data Center Operations, cybersecurity

December 13, 2018

Illumio ASP on AWS Marketplace: Making Cloud Security Easier than Ever

Sr. Director of Product Marketing

With the sheer number of security products on the market today, AWS Marketplace, a one-stop cloud shop, makes it easy to find and acquire the solutions that are best for your needs. We are excited to announce that the Adaptive Security Platform (ASP) is now available on AWS Marketplace.   

Read more »

Adaptive Security, Illumio News

March 9, 2018

Illumio Integrates with Splunk to Improve Security Operations Response Time

Head of Product Marketing

Chris helps customers understand benefits of and connect with Illumio solutions. He heads up the product marketing and technical marketing teams at Illumio.

Illumio adaptive micro-segmentation technology is quickly becoming a foundational part of the security stack and an essential tool to protect applications running in data center and cloud environments. As we see customers roll out the Illumio Adaptive Security Platform (ASP) to protect more parts of their application environments, we also see them extend Illumio to more teams across their organization  like the Security Operations Center (SOC) teams who rely on tools like security information and event management (SIEM) to monitor environments for alerts and anomalies.

Illumio's integration with Splunk gives SOC teams the ability to quickly identify potentially compromised workloads and enables Illumio administrators to be able to monitor the health of the Illumio solution.

Read more »

Adaptive Security, Security, Adaptive Segmentation