Telhio Secures Its Growth With IllumioTelhio Secures Its Growth With Illumio
Share this story

Key benefits

Telhio Secures Its Growth With Illumio
Unmatched ease and speed

Telhio can set specific segmentation rules and easily expand them out to quickly protect other application workloads.

Telhio Secures Its Growth With Illumio
Insight into endpoint and server traffic

Real-time visibility helps the IT team easily see which servers and workstations are connected and identify unauthorized communications.

Telhio Secures Its Growth With Illumio
Assurance before enforcement

Testing the impact of segmentation policies before enforcing them gives application owners and InfoSec critical peace of mind.

Business goals

Who likes mergers and acquisitions? Not technology managers. For them, these big deals create significant IT challenges from the rapid introduction of new networks and new applications.

Take Telhio Credit Union. Formed in 1934, this financial institution based in Columbus, Ohio provides banking, loans, wealth management and other services to residents and businesses in the region.

Over the last five years, Telhio has grown rapidly from mergers. These deals raised Telhio’s asset base from approximately $700 million to $1.3 billion and elevated the company to Ohio’s fourth largest credit union.

The mergers, though good for growth, created IT complexity. By adding in new computing systems from acquired companies, Telhio’s security exposure also increased significantly.

Technology challenges

With an IT team of only 15, Telhio has to be strategic (read “efficient”) in how it invests in technology and manages staff time, says David Ault, Telhio’s vice president of information security.

From a security standpoint, stopping the spread of ransomware and other cyberattacks across the networks and devices of its acquired companies became a clear priority.

“We needed a way to safeguard our back-office operations and retail banking applications in case of a breach,” Ault says. “Most organizations are able to defend the network perimeter, but I found it was extremely difficult to use traditional network firewalls to secure individual servers and workstations at scale.”

Ault recognized that protecting Telhio’s more than 120 data center servers and 500 employee workstations (physical and virtual) would be nearly impossible with his current stack of antivirus software, networking tools, application monitoring consoles, and other security staples.

To effectively enforce Zero Trust, Ault needed an easy way to implement microsegmentation across the credit union’s IT environment, something that historically has been difficult to build and manage.

How Illumio helped

In his search for a better way to stop breaches from spreading through Telhio’s IT systems, Ault conducted an initial test of Illumio Core on 20 servers and Illumio Endpoint on 70 workstations. The results were very convincing, Ault says.

I could not find another product that matches what Illumio does. The speed, ease and unified control it provides for Zero Trust Segmentation is unmatched in the market. David Ault VP of Information Security Telhio Credit Union

“In the 23 years I’ve been in the IT industry, I’ve seen only three products that lived up to the marketing hype,” he says. “Illumio is one of them.”

That initial experience convinced Ault to roll out Illumio full scale.

“If we have just a few assets to protect, it’s not a big deal,” Ault says. “But as we grew, the number of application workloads to protect quickly became unmanageable. With Illumio, we can set specific policies, then easily expand those out to each type of workload on our network.”

Ault also wanted a product that wouldn’t interfere with his network stack. Again, Illumio fit the bill. Its agent essentially monitors from the side, independent and out of the way of network traffic.

Results and benefits

Now that Illumio is almost fully deployed at Telhio, Ault has been impressed by the speed and ease of the platform.

“It’s been amazing to see what Illumio can do,” Ault says.

Illumio, for example, lets him test the impact a new policy on his applications and network operations before those policies are actually implemented.

“That’s what really differentiates Illumio from other products,” Ault explains. “Being able to test Zero Trust policies before deploying is huge. It helps us ensure application owners that nothing bad will happen when we turn on segmentation controls.”

Before Illumio, we had only a slim idea of what kind of communications were running across our network. But with Illumio, we clearly see exactly what’s connecting to individual endpoints. David Ault VP of Information Security Telhio Credit Union

Thanks to Illumio’s real-time visibility into application traffic, Ault can also easily see which servers and workstations are connected, which ports are being used, and if there is any unauthorized communications going on.

“Before Illumio, we had only a slim idea of what kind of communications were running across our network,” says Ault. “But with Illumio, we clearly see exactly what’s connecting to individual endpoints.”

“Thanks to Illumio, we’ve been able to grow as a business without also increasing our security exposure,” Ault adds. “That’s all I could ask for.”

Related stories

Frankfurter Volksbank Invests in Illumio for Compliance Success
Banking & Finance

Frankfurter Volksbank Invests in Illumio for Compliance Success

Frankfurter Volksbank met key regulatory requirements with micro-segmentation controls and real-time visibility into application traffic.

The Master Group Reduces Its Attack Surface by 80% With Illumio
Distribution

The Master Group Reduces Its Attack Surface by 80% With Illumio

Canada's largest HVAC-R distributor eliminated a significant source of ransomware risk and advanced its Zero Trust posture.

How Illumio Lowers ACH Group’s Cyber Risk — With Nearly Zero Overhead
Healthcare

How Illumio Lowers ACH Group’s Cyber Risk — With Nearly Zero Overhead

An Australian aged care provider builds its cyber resilience with Illumio Zero Trust Segmentation

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?