Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Illumio Introduces Adaptive User Segmentation

After raising $100 million in funding last year, Sunnyvale, Calif.-based Illumio has been on a mission to secure enterprise data using a dynamic approach that leverages context and relationship data to automatically program a security policy. 

After raising $100 million in funding last year, Sunnyvale, Calif.-based Illumio has been on a mission to secure enterprise data using a dynamic approach that leverages context and relationship data to automatically program a security policy. 

The company offers what it calls an Adaptive Security Platform (ASP) that can learn the relationships among application workloads and program the optimal security policy for every workload and adapt continuously to set an appropriate security policy, even as applications change.

Illumio Logo

Illumio has now added Adaptive User Segmentation capabilities to its platform through integration with Microsoft’s Active Directory groups, which dynamically calculates and provisions connectivity rules based on user identity to prevent unauthorized communications and access to Illumio-protected applications.

According to the security startup, the integration of Illumio ASP and Active Directory allows an organization to ensure that only the correct users can connect to the appropriate workloads and applications in the data center, public cloud, private cloud or hybrid compute environment. 

“Illumio’s mission since our founding has been to help our customers regain control over their applications and data,” said Andrew Rubin, co-founder and chief executive officer of Illumio. “With the introduction of Adaptive User Segmentation, Illumio once again is dramatically reducing computing attack surface through dynamic, policy-driven enforcement that allows users to only connect to the data center and cloud compute they are entitled to access.”

“Illumio’s new capabilities will resonate with security professionals assessing their security posture,” said Jon Oltsik, senior principal analyst, Enterprise Strategy Group. “Security leaders must deal with both sides of the user/data center equation and are well served to do it together rather than separately.”

“Today, users within an organization can see and connect to most, if not all, applications within the data center or cloud environment, regardless of their Active Directory entitlements,” Illumio explained. “Given heightened challenges to deliver trust and security, relying on central systems of record like Active Directory to ensure users only have access to the appropriate assets is no longer sufficient.”

The company already offers nano-segmentation capability, which provides process-level segmentation among both physical servers and virtual machines and significantly reduces the surface area of server-to-server communications.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...