Illumio Blog
October 2, 2018

Know the Score: Vulnerability Exposure Explained

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

In this post, I explain the various factors in calculating the Illumio Vulnerability Exposure Score (VES), which allows organizations to combine industry-standard vulnerability scoring measurements with context from their own unique environment. The VES also helps security professionals prioritize security controls to minimize the exposure of the attack surface and potential impact of vulnerabilities.

Read more »

Data Center Operations

December 21, 2017

2018 Predictions: Customers Demand Outcomes to End Balkanization of Security Practices

Former Chief Commercial Officer

This article was originally published on SecurityWeek.com.


"It’s much more pleasant to be obsessed over how the hero gets out of his predicament than it is over how I get out of mine."

— Woody Allen

 

Today, security is kind of an artisanal industry. With a total addressable market north of $85 billion per year – and not one player above 5 percent – it is a chaotic industry of niches: Endpoint, AV, Cloud, Network/Infrastructure, Application, Compliance, and the list goes on and on.
Read more »

Cloud Computing, Adaptive Security, Data Center Operations

December 20, 2017

Sizing Up Security in 2018: Predictions For Your Organization and Your (Former) Identity

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

In my role, I spend a lot of time looking at and thinking about technology trends, with a sharp focus on how security is reaching limits and breaking. This is what drives me as we build products to address market requirements. The whole reason Illumio exists is because I saw that firewalls are reaching limits and needed to be rethought in the age of the cloud. 

As is tradition this time of year, I took some time to think about what has changed in 2017 and what that means for the year ahead. Some of the predictions are grounded in the reality of what's transpired and what we have learned, while others are more speculative and educated guesses based on the data we have.

Read more »

Cloud Computing, Adaptive Security, Data Center Operations

August 9, 2017

You Need a Map to Evolve Security

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

Introducing a blog series by Illumio CTO, PJ Kirner, that will cover key concepts to help you think about data center and cloud security in a new way, and realign your approach with evolving requirements across application environments. Read the first post of this series, "Why We Need a Data Center and Cloud Security Revolution."

I can’t imagine getting to work without a GPS. Yes, I pretty much drive the same route every day and could probably do it blindfolded, but the GPS helps me get there the fastest by recommending the right route because it has up-to-date real-time data about traffic and can guide me around accidents and traffic jams. It knows both ends of my route, where I’m coming from and where I’m headed to and, mixing in historical data, it can predict the best time for me to leave and always be on time. 

Read more »

Cloud Computing, Adaptive Security, Data Center Operations

July 19, 2017

Out With the Old: Why We Need a Data Center and Cloud Security Revolution

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

Introducing a blog series by Illumio CTO, PJ Kirner, that will cover key concepts to help you think about data center and cloud security in a new way, and realign your approach with evolving requirements across application environments.

Revolutions happen for good reason. They’re the result of a divergence of expectations and reality causing pent-up frustration that pushes the need for change. Old ways no longer align with new requirements and pressure reaches a boiling point where there is no other option but to make that change. 

Evolutions in applications, the data center, and cloud have pushed security to the limits, where old ways like choke points and network based approaches no longer align with new requirements of application teams. These teams have gotten used to new models of resource utilization and application delivery — and there's no turning back. It’s time for a revolution in security.

Read more »

Cloud Computing, Adaptive Security, Data Center Operations