Illumio Introduces 'Zero Trust Segmentation' to Combat Persistent Data Breaches
Illumio, a cybersecurity firm, has introduced a new approach to network security. Dubbed 'Zero Trust Segmentation', it aims to tackle the persistent issue of data breaches, even after prevention and detection methods have failed.
Historically, cybersecurity has focused on prevention and detection. However, breaches still occur, often due to the east-west propagation of threats within networks. Traditional security methods struggle to prevent this.
Illumio's solution ensures every workload is segmented from every other workload, enforcing a least-privilege access model. This approach, also known as microsegmentation, is a key part of a Zero Trust architecture. It assumes a breach has occurred and uses technology to isolate and prevent the spread of threats.
Gaining visibility into how applications are talking on the network is crucial. Illumio's solution is deployed directly on hosts, enabling this. It also provides a clear dependency map between applications, facilitating quick discoveries of compliance violations and communication without network or cloud touch.
Check Point Software Technologies, a leading cybersecurity vendor, is mentioned in connection with this approach. The shift towards containment is necessary, as prevention and detection methods have not been enough to stop breaches. Modern adversaries can avoid detection and spread laterally within networks, often undetected for months.
Illumio's Zero Trust Segmentation offers a new strategy in cybersecurity. By segmenting workloads and assuming a breach has occurred, it aims to isolate and prevent the spread of threats. This approach, in conjunction with traditional methods, could significantly enhance network security and help combat the growing threat of data breaches.