How to Avoid These Five Common, but Costly Micro-Segmentation Mistakes – Part 4

Erik Giesa profile picture

Erik Giesa

Wednesday, February 28, 2018

Mistake #4: Underestimating the Scope of Your Segmentation Needs

 

The world’s leading technology research and advisory company, Gartner, Inc. recently reported a rise of 31 percent in connected “things” worldwide from 2016 to 2017, which amounts to nearly 8.4 billion connected things last year.

Exp...

When inventing something, you should try to think about what the consequences might be

Jeff Hussey profile picture

Jeff Hussey

President, CEO and Co-Founder

Friday, February 23, 2018

These words were recently spoken by the man affectionately known as “The Father of the Internet”, Vint Cerf, in a recent NPR interview. Unfortunately, he didn’t apply that best practice to the invention he’s best known for. While he and his team created the vehicle that makes our entire world go...

How to Avoid These Five Common, but Costly Micro-Segmentation Mistakes – Part 3

Erik Giesa profile picture

Erik Giesa

Wednesday, February 21, 2018

Mistake #3: Separating Cloaking, Connectivity, and Encryption

 

A workable and effective solution for micro-segmentation comes down to the following simple mathematical formula:

Cloaking + Connectivity + Encryption = Successful Micro-Segmentation Solution (SMSS)

Take away any of those three...

Host Identity Protocol – Making Secure Networking HIP Again

Bryan Skene profile picture

Bryan Skene

VP of Product Development

Thursday, February 15, 2018

The old address-defined networking paradigm of blindly networking everything is problematic at best… unless you’re a hacker. But now, there’s a better way. One that’s HIP to be precise!

HIP—which stands for Host Identity Protocol—moves beyond the old way of networking. Instead, HIP only networks...

A match made in heaven – unified networking and security

Jeff Hussey profile picture

Jeff Hussey

President, CEO and Co-Founder

Wednesday, February 14, 2018

One of the fundamental flaws with the way IT networks are constructed today is that organizations view networking and security as two separate entities. Today of all days, Cupid would ask, “Where’s the love in that?” Rather, it is necessary to bind together(connect) and protect (secure) as one. At...