Related blog posts


Where Does Zero Trust Segmentation Slot Into CISA's New Zero Trust Maturity Model?

Get insight into how CISA's updated Zero Trust Maturity Model will help federal agencies better achieve their cyber resilience objectives.


Illumio Achieves Common Criteria Designation

Learn about Illumio's Common Criteria designation from Natalio Pincever, Senior Director of Product Management for Global Public Sector at Illumio.

Gerald Caron Shares 5 Zero Trust Insights for Federal Agencies

Learn the 5 Zero Trust insights for federal agencies shared by Gerald Caron in episode 3 of The Segment podcast.

Why Cyber Disasters Are Still Happening — And How to Fix It

Get insight from Gary Barlet, Illumio Federal CTO, on why decades of trying to prevent and detect direct attacks by adversaries – and failing – means it's time to shift the focus to containment.

Illumio is "In Process" on the FedRAMP Marketplace

Get the details about what Illumio's new FedRAMP in-process designation means for your federal organization.

7 Reasons Why the Federal Sector Should Choose Illumio for Micro-Segmentation

Federal agencies require micro-segmentation. Learn why Illumio is the best choice.

3 Challenges Federal Agencies Face When Implementing Modern Cybersecurity

The U.S. federal government collects the personal information of almost every citizen. And federal agencies hold valuable data, some of which could put the country in danger if it was released.

Operationalizing the Biden Administration's Cybersecurity Executive Order with Zero Trust

Ready to operationalize President Biden's cybersecurity executive order with Zero Trust? Read this blog to find out how.

What President Biden’s New Security Policy Means for the Future of Cyber

The Biden Administration just cemented its legacy in cybersecurity policy with a sweeping Executive Order aimed at improving the resilience and reducing the risk of the United States Government.

How Federal Agencies Can Create a Zero Trust Pilot Project

If you want to implement Zero Trust in your organization, start by figuring out the critical security priorities and current Zero Trust capabilities.

Related resources

No items found.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?