Illumio Blog
October 18, 2019

"We should have done this years ago": A History of Decoupling

Sr. Product Marketing Manager

Katey focuses on go-to-market strategy including voice of the customer. She has over a decade of enterprise IT experience working with global regulators, financial services, and Fortune 100 corporations.

Breaking up isn’t always hard to do. Sometimes things run their course, and a relationship outlives its usefulness. Our only regret is not realizing it sooner!

Remember toll plazas?

We used to have to pay tolls in cash to collectors at checkpoints on highway and bridges. It was a terrible bottleneck. Highways are there to get you where you need to go quickly. Tollbooth checkpoints are the opposite of quick. They just slow everyone down.

Read more »

cybersecurity

September 30, 2019

Divide and Conquer: Why It's Time to Unlock Security From the Network

Sr. Product Marketing Manager

Katey focuses on go-to-market strategy including voice of the customer. She has over a decade of enterprise IT experience working with global regulators, financial services, and Fortune 100 corporations.

Network segmentation is a well-known approach to network security and has been lauded as a way to improve security and reduce your attack surface. At Illumio, we talk a lot about the value of our product being the best solution for segmentation because our software actually allows network and security teams to “decouple” – that is, allow the security segmentation policy to be independent of network infrastructure and constraints.

But you might ask yourself: why is that important? Here’s your Decoupling 101.

Read more »

cybersecurity

September 18, 2019

Better Containing Threats in a Containerized World

Sr. Product Marketing Manager

Katey focuses on go-to-market strategy including voice of the customer. She has over a decade of enterprise IT experience working with global regulators, financial services, and Fortune 100 corporations.

It is a DevOps world – and the rest of us are just living in it.  While this isn’t the case entirely, it can feel this way given how often we hear about DevOps, microservices, and containers.

Truth be told, it was clear in 2015 when we began securing Docker containers that DevOps and the continuous software delivery process was already bringing tremendous business and technical value. Containers break applications into more manageable pieces for more efficient software development that gets new applications and features into the hands of users and customers quickly.  

Read more »

cybersecurity

August 27, 2019

Common Criteria Certified: Securing Federal Agencies with Illumio ASP

Sr. Federal Product Manager

Nearly two years ago, I was lucky enough to join the Illumio team as Federal Product Manager. The first order of business was to acquire the necessary product certifications required by the federal government, including FIPS 140-2 and GSA Section 508 compliance. Recently, the Illumio Adaptive Security Platform (ASP) achieved another important government security certification called Common Criteria. With this certification, Illumio became the first enterprise security vendor to be certified with conformance to the National Information Assurance Partnership (NIAP) Standard Protection Profile for Enterprise Security Management, Policy Management v2.1, which focuses on access control policy definition and management.

Read more »

cybersecurity

July 16, 2019

PCI Compliance Design Considerations

Sr. Product Marketing Manager

PCI DSS compliance has been around for more than 10 years. Networking and firewalls have been in use in corporate data centers for much longer and covered entities have relied on these technologies to segment their PCI environments and reduce their compliance and audit burdens. Today’s data center environments are more complex, abstracted, and distributed. The techniques and technologies utilized by bad actors have also evolved. As a result, we continue to see reports of high-profile data breaches. QSAs continue to issue findings on critical PCI scoping and segmentation errors, on failures to properly isolate the CDE and connected systems traffic, and for having networks that are too flat. 

Read more »

cybersecurity