|
Piotr Kupisiewicz and Dana Yanch presented for Elisity at Networking Field Day 36 |
This Presentation date is November 6, 2024 at 11:00-12:30.
Presenters: Dana Yanch, Piotr Kupisiewicz
Follow on Twitter using the following hashtags or usernames: #NFD36
Accelerate Zero Trust Maturity Through Enterprise-Wide Microsegmentation with Elisity
Watch on YouTube
Watch on Vimeo
Elisity empowers enterprises to rapidly improve their security posture and accelerate Zero Trust maturity across their entire digital ecosystem. Our revolutionary approach to microsegmentation delivers comprehensive protection for all users and devices—across IT and IoT/OT—without disruption or complexity.
The Elisity IdentityGraph automatically discovers and correlates your complete network landscape, providing the contextual intelligence needed to automate security policy creation and enforcement. We’ll show how leading enterprises implement Elisity in weeks, not years, achieving immediate risk reduction while advancing their Zero Trust journey.
Elisity is a leap forward in network segmentation architecture and is leading the enterprise effort to achieve Zero Trust maturity, proactively prevent security risks, and reduce network complexity. Designed to be implemented in days, without downtime, upon implementation, the platform rapidly discovers every device on an enterprise network and correlates comprehensive device insights into the Elisity IdentityGraph . This empowers teams with the context needed to automate classification and apply dynamic security policies to any device wherever and whenever it appears on the network. These granular, identity-based microsegmentation security policies are managed in the cloud and enforced using your existing network switching infrastructure in real-time, even on ephemeral IT/IoT/OT devices. Founded in 2019, Elisity has a global employee footprint and a growing number of customers in the Fortune 500.
Personnel: Dana Yanch, Piotr Kupisiewicz
Elisity Microsegmentation Platform Origin Story
Watch on YouTube
Watch on Vimeo
This Elisity presentation at Network Field Day 36 includes an overview of the Elisity origin story. Elisity was founded in 2019 and has was built to be a leap forward in network segmentation architecture and today Elisity is leading the enterprise effort to achieve Zero Trust maturity, proactively prevent security risks, and reduce network complexity. Designed to be implemented rapidly, without downtime, upon implementation, the platform instantly discovers every device on an enterprise network and correlates comprehensive device insights into the Elisity IdentityGraph .
This empowers teams with the context needed to automate classification and apply dynamic security policies to any device wherever and whenever it appears on the network. These granular, identity-based microsegmentation security policies are managed in the cloud and enforced using your existing network switching infrastructure in real-time, even on ephemeral IT/IoT/OT devices. Founded in 2019, Elisity has a global employee footprint and a growing number of customers in the Fortune 500.
In 2024 The Forrester Wave : Microsegmentation Solutions, Q3 2024 was published. In this evaluation, Elisity was cited as a Strong Performer in Microsegmentation Solutions. Elisity was one of 11 vendors evaluated for the Forrester Wave based on 23 criteria that examined a vendor’s current offering, strategy, and market presence. In its first appearance in a Forrester Wave, Elisity received the highest score possible in the vision, roadmap, network-based enforcement, and OT, healthcare, and IoT criteria.
Personnel: Dana Yanch, Piotr Kupisiewicz
Elisity Top Microsegmentation Challenges and Goals Across the Manufacturing Pharmaceutical and Healthcare Industries
Watch on YouTube
Watch on Vimeo
This Elisity presentation at Network Field Day 36 focuses on how the convergence of IT and OT networks has created unique cybersecurity challenges across manufacturing, pharmaceutical, and healthcare sectors, where legacy systems, unmanaged devices, and critical operations intersect. This technical talk explores how microsegmentation addresses the distinct security requirements of these regulated industries.
In manufacturing environments, the primary challenge lies in securing industrial control systems that often run on legacy operating systems and utilize proprietary protocols. Organizations must maintain IEC 62443 compliance while enabling secure communication between production zones, enterprise IT systems, and remote access points. Critical goals include protecting intellectual property in manufacturing execution systems (MES) while ensuring zero operational downtime.
Pharmaceutical companies face the additional complexity of FDA-regulated environments where Good Manufacturing Practice (GMP) systems require both rigorous access controls and detailed audit trails. These organizations need microsegmentation solutions that can isolate quality control systems, laboratory information management systems (LIMS), and research data while maintaining strict regulatory compliance. Healthcare institutions struggle with an explosion of IoMT (Internet of Medical Things) devices that can’t support traditional security agents.
Meeting 405(d) HICP guidelines requires organizations to implement microsegmentation without disrupting critical care devices or patient monitoring systems. The challenge intensifies with the need to segment clinical networks from billing systems while maintaining HIPAA compliance.
Learn how modern microsegmentation architectures and platforms like Elisity address these challenges. You’ll see how Elisity’s Identity-based microsegmentation platform enables policy enforcement at the network edge, leveraging existing switch infrastructure for policy enforcement.
Learn why success requires continuous asset discovery, automated policy recommendations based on learned traffic patterns, and the ability to enforce segmentation policies without requiring hardware refresh or network redesign.
Personnel: Dana Yanch, Piotr Kupisiewicz
How to Optimize a Microsegmentation Architecture with Elisity
Watch on YouTube
Watch on Vimeo
This Elisity presentation at Network Field Day 36 focuses on how Elisity’s microsegmentation architecture leverages a cloud-native distributed control plane that separates policy management from enforcement. At its core, the system utilizes a centralized policy management platform that integrates with existing identity providers and maintains the Elisity IdentityGraph—a comprehensive mapping of all network assets, their relationships, and behavior patterns. This identity-centric approach moves beyond traditional IP-based controls to enable context-aware policy enforcement at the network edge.
The implementation relies on Elisity Virtual Edge controller(s) that transform existing access-layer switches into policy enforcement points. These controllers communicate with the Elisity Cloud Control center via secure channels, enabling real-time policy updates without requiring dedicated hardware. For manufacturing environments, this architecture enables granular control over industrial control systems and OT devices while maintaining IEC 62443 compliance. In healthcare settings, it facilitates 405(d) HICP compliance while protecting sensitive medical devices and clinical systems.
Key technical components include the Elisity identity-based Dynamic Policy Engine that leverages machine learning for asset discovery and classification, graphical policy visualization matrices for traffic flow analysis, and virtual edge nodes that enforce policies using native switch functionality. The system continuously monitors east-west and north-south traffic patterns, providing real-time telemetry data for behavior analysis and policy refinement.
This architecture enables security teams to implement zero trust principles at scale, with the ability to microsegment networks down to individual workloads while maintaining the performance requirements of critical manufacturing and healthcare operations. The platform’s ability to learn from traffic patterns and automatically adjust policies based on identity and context makes it particularly effective in environments where traditional agent-based solutions are impractical.
Personnel: Dana Yanch, Piotr Kupisiewicz
Elisity Microsegmentation Platform Demo – Clinical Healthcare Use Cases
Watch on YouTube
Watch on Vimeo
This Elisity presentation at Network Field Day 36 focuses on includes the Elisity Microsegmentation Platform Demo: Securing Clinical Healthcare Networks with Identity-based microsegmentation platform that accelerates an organizations Zero Trust maturity.
Watch this comprehensive demo of how Elisity’s cloud-native microsegmentation platform transforms security for clinical healthcare environments. In this video, we showcase how leading healthcare organizations are using Elisity to protect critical medical devices, EHR systems, and sensitive patient data across complex networks.
The demo highlights the revolutionary Elisity IdentityGraph devices, from IoMT devices to clinical workstations. technology, which provides unprecedented visibility into all users, workloads
You’ll see how our solution:
- Automatically discovers and classifies medical devices, creating a complete asset inventory that integrates with existing IoMT security platforms
- Visualizes real-time traffic patterns between clinical systems, helping security teams spot potential threats
- Implements identity-based policies that follow assets anywhere on the network, ensuring consistent security even as devices move between departments
- Transforms existing network switches into policy enforcement points without requiring new hardware
We’ll demonstrate practical use cases, including:
- Segmenting clinical networks from administrative systems
- Protecting connected medical devices with automated policy enforcement
- Ensuring HIPAA compliance through granular access controls
- Managing secure access for visiting clinicians and medical device vendors
Featured in Forrester Wave Microsegmentation, Q3 2024 as a Strong Performer, Elisity is trusted by leading healthcare organizations including GSK, Main Line Health, and BUPA to secure their most critical assets.
Whether you’re looking to implement HHS 405(d) guidelines or strengthen your overall security posture, this demo shows how Elisity’s cloud-delivered microsegmentation platform can help you achieve zero trust security with minimal disruption to clinical operations.
Personnel: Dana Yanch, Piotr Kupisiewicz