Every organization today has high-value assets, or as we like to call them, "crown jewels," that should be protected with the utmost vigilance at all times. These may include customer account details, personal identifiable information (PII), payment systems, or other financial assets that, if exposed or exploited, could result in detrimental loss for a business and its brand equity.Read more »
I spend a lot of time discussing with organizations the world over how to achieve better breach protection with security segmentation that delivers simplicity and efficiency for networking and security operations teams.Read more »
Breaking up isn’t always hard to do. Sometimes things run their course, and a relationship outlives its usefulness. Our only regret is not realizing it sooner!
Remember toll plazas?
We used to have to pay tolls in cash to collectors at checkpoints on highway and bridges. It was a terrible bottleneck. Highways are there to get you where you need to go quickly. Tollbooth checkpoints are the opposite of quick. They just slow everyone down.Read more »
Network segmentation is a well-known approach to network security and has been lauded as a way to improve security and reduce your attack surface. At Illumio, we talk a lot about the value of our product being the best solution for segmentation because our software actually allows network and security teams to “decouple” – that is, allow the security segmentation policy to be independent of network infrastructure and constraints.
But you might ask yourself: why is that important? Here’s your Decoupling 101.Read more »