Q: Talk to us about Illumio's adaptive micro-segmentation technology. What exactly is it and what specific enterprise security need or issue does it help address?
Application environments have become more virtualized, dynamic, and distributed, making it easier for bad actors to gain access to applications and data. The Illumio Adaptive Security Platform prevents the spread of cyber threats inside data centers and clouds by effectively creating 'watertight' compartments with adaptive micro-segmentation to prevent these bad actors from accessing, corrupting, or stealing sensitive information.
There are so many reactive security solutions that tell you when you've been breached and what happened after the fact. Despite the renewed focus and investment in security over the past few years, high-profile breaches are still pretty common. What's really needed is a proactive approach to prevent breaches in the first place. This is where micro-segmentation comes in. We see it becoming increasingly foundational security infrastructure and our customers see it as something they need to have in place as a core part of their security program.
One key advantage of Illumio is that we're not tied to infrastructure like network and hypervisor-based solutions. We secure workloads running anywhere on anything, including bare-metal, virtualized servers, and containerized environments in private data centers or clouds. Many customers have come to us because they have a mix of platforms running across various infrastructure and no other solution could help them.
Our whitelist-based policy model is also unique in that it's tied to the labels we use to classify workloads. Our policies are very human readable, making it easy for anyone in the organization to write and understand, yet extremely powerful. For example, one customer replaced 15,000 firewall rules with just 40 Illumio policies.
An important insight we learned early from our customers is that success with micro-segmentation requires real-time application dependency mapping combined with enforcement. The two are tightly coupled with Illumio and have allowed our customers to achieve segmentation goals quickly.
Q: What are some of the different ways that enterprises are using the Illumio Adaptive Security Platform?
We have customers protecting environments of all sizes, from under 100 workloads to upwards of 50,000. Size isn't a factor. It's all about how critical those environments are to the business.
All customers start with our real-time application dependency map. You really have to see and understand the dependencies and what's connected. Most customers either haven't had this view before or ran an application dependency mapping exercise that quickly became out of date as soon as the project ended.
With an understanding of application dependencies, customers can focus on improving protection for their high-value applications by ring-fencing them with micro-segmentation.
These applications can be in private data centers or public cloud and we're seeing more hybrid cloud and multi-cloud deployments, too. Customers realize it's difficult to protect these environments with traditional solutions and network or hypervisor-based approaches.
We also see many financial services and healthcare customers driven by compliance or regulatory requirements like PCI, SWIFT, and HITRUST. GDPR is a big driver, too. Each requires that you isolate or segment off entire environments to meet compliance goals. Not being able to do this could result in penalties or make it difficult to do business.
Some customers are also driven by internal audit requirements which map back to customer commitments. Think about SaaS providers, legal firms, and financial services companies that provide services and host a lot of sensitive customer data. They have to ensure that [only those who need to access data] should access it. They also need to be able to ensure data and environments don't mix.
Again, to do any of this, you really need the visibility of a real-time application dependency map. Without visibility, you don't know what's connected and how things are communicating. You need that understanding to create the right policies.
Q: Illumio is a Global Partner at Black Hat Asia 2018. How are you planning on using your presence at the event? What is your main messaging going to be?
This is our first big show in Asia, so part of our presence will be introducing Illumio to the region. We'll be talking about how we can help improve security and stop threats from spreading across application environments. Unauthorized movement across application environments coming from either internal or external threats is a big common concern.
We tend to have quite a presence at these shows, with a live theater-style demo being the centerpiece of our booth on the show floor. Our demo shows what the product is all about and what it can do. Since it's live, we take lots of questions and sometimes that ends up driving where the demo goes. It makes these shows a lot of fun and keeps us on our feet, too.