Christer Swartz
Christer Swartz is Solutions Marketing Director at Illumio. He has spent many years in the Networking industry, beginning with a small startup called Cisco. He was previously with Netflix, designing the birth of their Internet video-streaming architecture, and also with Palo Alto Networks, designing deep security in both data center and cloud architectures.
Authored content
Kubernetes Isn’t Immune to Ransomware – And How Illumio Can Help
Learn why ransomware is a very real cybersecurity risk in Kubernetes that DevSecOps architects can't afford to ignore.
100% Cloud? You Still Need Zero Trust Segmentation
Learn why being 100% cloud does not negate the need for breach containment with Zero Trust Segmentation and how Illumio can help.
Why Manufacturing Must Secure IIoT Resources Against Ransomware
Get insight into ransomware risk for IIoT resources in the manufacturing sector.
7 Reasons Why the Federal Sector Should Choose Illumio for Zero Trust Segmentation
Learn how Illumio provides superior, reliable microsegmentation for branches of the Federal sector.
Why Protecting Your OT Doesn’t Require Layer 7 Deep Packet Inspection
Learn why Zero Trust Segmentation is a better answer for preventing the spread of breaches.
Illumio + Appgate: Securing Interior and Perimeter Network Traffic
Addressing the need for layers of defense that protect the north-south traffic network, as well as east-west traffic across interior and perimeter networks.
Get Reliable ROI with Illumio Zero Trust Segmentation
Today’s hybrid, hyper-connected networks have rendered prevention alone ineffective, Zero Trust containment delivers a better solutions call center ROI.
Fight Ransomware Faster: Centralized Visibility for Enforcement Boundaries
A true Zero Trust Segmentation architecture pushes the trust boundary directly to individual application workloads. That's why Illumio's allow-list security model gives you the ability to allow only the traffic your workloads require — denying all else by default.
Integrating Visibility and Rule Creation for Efficient Workload Security
Workload security has two broad requirements: visibility and enforcement.
Enforcement Boundaries: 7 Use Cases Beyond Ransomware
Enforcement Boundaries are the Swiss Army knife of risk reduction. Those famous red tools can do much more than slice some cheese and apple, and Enforcement Boundaries can do much more than just fight ransomware.
Fight Ransomware Fast With Enforcement Boundaries
You have two main ways to fight ransomware. You can either be proactive, working to block future attacks. Or you can be reactive, responding to an active breach.
Simplify SDN and Firewall Deployments with Host-Based Microsegmentation
Software-Defined Networking (SDN) and segmentation are often discussed simultaneously because they both prioritize automation.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?