Publishers Spotlight: Elisity – Cyber Defense Magazine


I was thrilled to catch up with Elisity during Black Hat USA 2024. Elisity’s platform makes it easy for IT, Security and Network teams to apply microsegmenation and security policies on users, workloads and devices. This proactively enables organizations to black lateral movement or east-west attacks across their environments. Lateral movement is one of the top tactics that threat actors use to spread ransomware, malware and identity based attacks. In fact, over 70% of successful breaches involved the use of lateral movement techniques, underscoring their prevalence in cyber attacks. (Source: CrowdStrike 2020 Global Threat Report)

And lateral movement is not always detected. According to the 2022 Mandiant Security Effectiveness report, over half (54%) of the methods used to test lateral movement in networks went undetected. Even more alarmingly, 96% of lateral movement activities failed to trigger alerts in Security Information and Event Management (SIEM) systems. This means that in the vast majority of cases, defense teams had no visibility into ongoing attacks. These findings are worrisome, particularly given that there are available solutions to counter lateral movement.

“We believe the recognition as a Strong Performer in the Forrester Wave™ evaluation underscores what our enterprise customers have known all along,” said James Winebrenner, CEO of Elisity. “By collaborating closely with CISOs and their teams, we’ve developed a revolutionary microsegmentation solution that deploys in days, not months, without the need for downtime, hardware, or agents. Our platform’s efficiency is evident: over 83% of our customers implement critical security policies across their entire infrastructure within their first 90 days. This rapid time-to-value, coupled with our ability to secure both managed and unmanaged devices, sets a new standard in enterprise Zero Trust network security.”

Elisity empowers customers to achieve robust segmentation using their existing infrastructure. In just hours per physical location and without downtime, teams can implement microsegmentation using existing network infrastructure. Notably, Elisity requires no hardware, agents, new VLANs, or complex ACLs.

Elisity enables customers to discover every device on their network, from the known inventory of IT-managed devices to unknown devices like IoT, OT, IoMT, and ephemeral devices. By providing complete visibility of every device, everywhere, Elisity significantly strengthens security postures. The platform leverages advanced machine learning algorithms to correlate device intelligence by triangulating metadata from identity, CMDB, EDR, and device databases.

Publishers Spotlight: Elisity

This unparalleled discovery and visibility provides teams with the confidence to apply policies manually and automatically, benefiting from dynamic security policies. Furthermore, Elisity’s policies are easy to manage, simulate, update, and report on, streamlining the entire security process. In conclusion, Elisity is a leap ahead Zero Trust network microsegmentation solution that maximizes existing infrastructure investments while delivering state-of-the-art microsegmentation making it an invaluable tool for IT and security teams.

Microsegmentation is a key strategy for accelerating our Zero Trust program; our team loves how easy the Elisity platform is to implement, especially compared to other solutions we reviewed. It’s a powerful way to apply security policies across our locations. We are excited that our team and Elisity are getting industry recognition for this innovative approach to reducing risks by segmenting users, workloads, and devices,” said Aaron Weismann, CISO at Main Line Health.

“We deployed it at two of our sites in less than an hour, and by the next day, we were confidently implementing policies. This unprecedented speed and effectiveness soon made Elisity an indispensable part of our network security strategy across our manufacturing sites, protecting thousands of managed IT assets as well as our growing number of unmanaged loT and OT assets,” Max Everett, CISO at Shaw Industries.

Publishers Spotlight: Elisity

“Elisity’s solution is a game-changer. Its intelligent asset classification, visibility and rapid policy enforcement have allowed us to monitor and secure our network in ways we couldn’t have imagined,” Steve Garske, PhD, MSc, MBA, CIO & CISO at Logan Health.

We know there are many options for teams to add to their stack, however the principals of Zerto Trust, which is centered on “Explicit-Trust” over “Implicit Trust” require a strong, proactive implementation of network and device segmentation. Forrester Research said of Elisity in the most recent The Forrester Wave™: Microsegmentation Solutions, Q3 2024, “Network infrastructure vendors have long had microsegmentation solutions on the market, but they were prone to project failure, usually due to complexity. Elisity makes this old idea work by removing the complexity, compressing the policy, and leveraging multiple vendors’ switch fabrics to enable microsegmentation.”

Get a demo or download the The Forrester Wave™: Microsegmentation Solutions, Q3 2024 at https://www.elisity.com/demo-request

About the Author

garym-author Gary Miliefsky is the publisher of Cyber Defense Magazine and a renowned cybersecurity expert, entrepreneur, and keynote speaker. As the founder and CEO of Cyber Defense Media Group, he has significantly influenced the cybersecurity landscape. With decades of experience, Gary is a founding member of the U.S. Department of Homeland Security, a National Information Security Group member, and an active adviser to government and private sector organizations. His insights have been featured in Forbes, CNBC, and The Wall Street Journal, as well as on CNN, Fox News, ABC, NBC, and international media outlets, making him a trusted authority on advanced cyber threats and innovative defense strategies. Gary’s dedication to cybersecurity extends to educating the public, operating a scholarship program for young women in cybersecurity, and investing in and developing cutting-edge technologies to protect against evolving cyber risks.



Source link