Elisity’s cover photo
Elisity

Elisity

Computer and Network Security

San Jose, California 6,394 followers

Network Segmentation’s Leap Forward; Microsegmentation in Weeks, Not Years

About us

Elisity is a leap forward in network segmentation architecture and is leading the enterprise effort to achieve Zero Trust maturity, proactively prevent security risks, and reduce network complexity. Designed to be implemented in days, without downtime, upon implementation the platform rapidly discovers every device on an enterprise network and correlates comprehensive device insights into the Elisity IdentityGraph™. This empowers teams with the context needed to automate classification and apply dynamic security policies to any device wherever and whenever it appears on the network. These granular, identity-based microsegmentation security policies are managed in the cloud and enforced using your existing network switching infrastructure in real-time, even on ephemeral IT/IoT/OT devices. Founded in 2019, Elisity has a global employee footprint and a growing number of customers in the Fortune 500.

Website
http://www.elisity.com
Industry
Computer and Network Security
Company size
51-200 employees
Headquarters
San Jose, California
Type
Privately Held

Products

Locations

  • Primary

    6203 San Ignacio Ave

    Suite 110

    San Jose, California 95119, US

    Get directions

Employees at Elisity

Updates

  • 57% of security leaders rank microsegmentation as their #1 initiative to stop lateral movement. Only 24% have actually deployed it. That's the say-do gap Omdia surfaced in their 2025 microsegmentation survey of 352 U.S. cybersecurity decision makers, and it lands hardest in manufacturing. 99% of organizations are planning microsegmentation, but only 9% have more than 80% of their critical systems protected. 78% of decision makers have no hands-on experience with modern microsegmentation, even as 69% say identity-based policy is the feature they want most. Manufacturing networks make the gap operational: Remote engineers (70%), ICS/SCADA systems (53%), building management systems (59%) all sit on top of the priority list for segmentation, and legacy approaches consume 18+ hours per change cycle keeping up. William Toll, our Head of Product Marketing, breaks down the survey through the manufacturing cybersecurity lens, what's holding execution back, and what modern OT microsegmentation looks like when it actually works. Link to the full analysis in the comments. #Microsegmentation #OTSecurity #ManufacturingCybersecurity #IndustrialSecurity #ZeroTrust

    • microsegmentation-in-manufacturing-architecture-diagram
  • Join us next week and meet our local sales leader Katya Ermolaeva at the event!

    View organization page for Innovate Cybersecurity

    5,050 followers

    Next week, we are hosting the first Innovate: Executive Evening in Orange County, CA on May 21.    There are still a few spots left – apply to attend for an evening of curated 1:1 meetings, executive networking, and meaningful dialogue with our Chapter Leader and panelists:   Chapter Leader:
 Nemi G — Global IT Leader & CISO, PDS Health   Panelists: Greg M. — CISO, Lightcast
 Kathy L. — Global Head of Information Security, Skyworks Solutions   Apply to Attend:  https://lnkd.in/gWWtwcdP 🚘 Complimentary car service included.   Sponsored By: Cyberhaven, Contrast Security, Elisity, Corelight, Entrust, WitnessAI, Concentric AI, Netwrix Corporation, Vega, Nagomi Security, Orion Innovation, WideField Security, & Novacoast   #InnovateCybersecurity #InnovateOrangeCountyChapter #InnovateExecEvening

    • No alternative text description for this image
  • MultiCare Health System just won a 2026 CSO Award for “From ‘Department of No’ to ‘Culture of Yes’: Enabling Modern Healthcare Through Identity-Based Microsegmentation.” MultiCare’s team discovered and classified 99% of devices within minutes during the proof of value. Identity-based policy now protects 40,000+ connected devices across 13 hospitals and 350+ urgent care and outpatient clinics. Clinical operations never went down. 2 FTEs run the program, against an industry benchmark of up to 14. Existing Cisco and Juniper switches do the enforcement. No agents on FDA-regulated medical devices. No network redesign. Jason Elrod, CISO at MultiCare: “Elisity works, does what it says it can do.” That’s three CSO Awards in three years for Elisity customers, following GSK in 2023 and Main Line Health in 2024. If you lead security at a healthcare system or large manufacturer, read how MultiCare did it: https://lnkd.in/geMiUs3x #Microsegmentation #ZeroTrust #HealthcareCybersecurity

    • Jason Elrod, CISO, MultiCare Health System CSO 2026 Award Winner
  • 99% of security leaders want microsegmentation. 9% have it. That’s the gap CISA’s new CI Fortify guidance just made urgent. Acting Director Nick Andersen’s framing is precise: critical infrastructure operators have to “isolate vital systems from harm, continue operating in that isolated state, and quickly recover any systems that an adversary may successfully compromise.” The doctrine is sound for an adversary class that lives on valid credentials and native tools. The gap is operator-side. As Elisity CEO James Winebrenner told Cynthia Brumfield at CSO Online, “you can’t plan to operate disconnected from third parties for weeks to months until you can actually list who those third parties are. Most operators can’t.” The work ahead: comprehensive identity and dependency visibility, then segmentation that holds when third-party access is severed. Cynthia’s full piece is linked in the comments. #CriticalInfrastructure #CISA #OTSecurity #ZeroTrust

    CI Fortify asks critical infrastructure operators to plan for weeks of disconnection from third-party dependencies. Most can’t yet, because most can’t list those third parties in the first place. That was the gap I raised with Cynthia Brumfield at CSO Online: “You can’t plan to operate disconnected from third parties for weeks to months until you can actually list who those third parties are. Most operators can’t.” The visibility problem is doing more work in CISA’s new guidance than the headlines suggest. CI Fortify reads as a doctrine shift, but the bigger operator-side ask is the one underneath it: build the identity and dependency map that makes isolation executable. The strategic shift behind it is real. February 2024, then-Director Easterly said her teams had “found and eradicated Volt Typhoon intrusions.” January 2025, the agency was “laser focused” on identifying and evicting Chinese cyber actors. The CI Fortify topic page that went up Monday doesn’t use the word evict anywhere. It tells operators to isolate vital systems, continue operating in that isolated state, and recover compromised systems quickly. That’s a doctrine catching up to a threat profile defenders have been managing for years. CISA’s own February 2024 advisory said Volt Typhoon had been inside some victim IT environments for at least five years before discovery, using valid credentials and native tools. You can evict an operator. You can’t durably evict a stolen credential set running on legitimate accounts. AI is going to compress the timeline further. Anthropic’s Mythos Preview last month autonomously surfaced a 27-year-old flaw in OpenBSD and chained a Linux kernel privilege-escalation pipeline for under $2K in compute. The half-life of an unpatched device just collapsed. The actor pool is going to grow. Thanks to Cynthia Brumfield at CSO Online for digging into this one. Link in comments. #CriticalInfrastructure #CISA #OTSecurity #VoltTyphoon #CyberResilience

  • Damage limitation used to be a slide in a Ron Ross deck. At The Official Official Cybersecurity Summit Boston this week, it was the operating model. Three sessions, one through-line. Ron Ross, in conversation with Parham Eftekhari of CyberRisk Alliance, framed cyber defense as three dimensions: penetration resistance, damage limitation, cyber resilience. He used NASA JPL's Sunrise satellite digital twin to make the point that you cannot defend what you have not modeled. Steve Craig, CISSP, MCT-alumni of NewYork-Presbyterian Hospital made it concrete. 1.2 million medical devices visible on Shodan. FDA-locked systems that cannot be patched. A local admin count driven from 2,000 down to 200, with single digits as the goal. His framing for segmentation stuck with us: speed bumps. Slow the attacker down enough that detection and response can catch up. His exact phrase, "reducing the blast radius," became the title of our recap. The Women in Cyber panel, moderated by Deidre Diamond of CyberSN, with Kelley Misata, Ph.D. of Sightline Security and Open Information Security Foundation, Praveen Sharma, and Janine (Thomas) Comstock, focused on identity as the new perimeter. Human, non-human, and agentic AI. Third-party risk. Post-quantum readiness as a Y2K-scale program that needs to start now. Microsegmentation is how damage limitation gets enforced. Identity, including AI agents, is what it segments on. Microsegmentation is how damage limitation gets enforced. Identity, including AI agents, is what it segments on. Recap link in the comments.

    • Elisity Team at Cybersecurity Summit
  • 🚨 Live Webinar Event 🚨 | 99% of security leaders plan to deploy microsegmentation. 9% actually have it.                                                                 That gap is the real story in network security right now, and on June 18, two Omdia analysts, Hollie Hennessy and Rik Turner will share what their research uncovered about the adoption gap. Jason Elrod and Edmond Mack will pressure-test it with what is actually happening inside their networks today.                                                                      Thursday, June 18. 10 AM PDT / 1 PM EDT. Register below 👇                                                                                                #Microsegmentation #ZeroTrust #Healthcare #CISO #NetworkSecurity  

  • Four weeks after Mythos, the patch-window math is broken. The question is whether you can ship a defense fast enough to matter. David Finkelstein and the St. Luke's University Health Network team did it with the Elisity customer experience team in 46 days, two weeks ahead of schedule. Across 15 hospitals, 85,000 devices, and 1,800 vendors. The fastest enterprise rollout in our history. That speed belongs to both teams. #PatchingIsNotAPlan #Healthcare #CustomerSuccess

    Every CISO I’ve talked to in the last three weeks is getting the same question from their board: “What’s our plan?” Three weeks ago Anthropic announced Claude Mythos, a frontier model that autonomously found thousands of zero-days. The patch window (about 70 days, on a good month) versus the time to exploit (now hours, not weeks). Patching is not a plan. So what is? Watch what David Finkelstein and his team at St. Luke's University Health Network did. 15 hospitals. 85,000 devices. 1,800 vendors. Identity-based microsegmentation deployed in 46 days, two weeks ahead of schedule. Now the head of surgery is running ION robots for procedures with providers 3,000 miles away. Procedures that were a flat “no” twelve months ago. The Omdia survey we commissioned in April 2026 (n=352) found 99% of security leaders want microsegmentation. 9% have it. That’s the gap that decides whether the answer to “what’s our plan?” is a slide or a deployment. St. Luke’s has a deployment. Video below, full story in the comments. #PatchingIsNotAPlan #Microsegmentation #CISO

  • Cyber insurance is no longer a procurement line. It's a resilience requirements document.                               That was Roger Hale's framing when we sat down with the 7-time CSO at #RSAC 2026. Carriers now ask for specific controls, tested recovery procedures, and incident evidence before paying claims. When the breached organization can't produce the telemetry, segmentation evidence, or access logs the policy requires, the financial impact compounds: breach cost, legal cost, and denied claim arrive together. Roger's contrarian take on identity is just as direct: stop separating    "non-human identity" from human identity. Every access decision, whether it's an employee, a service account, or an AI agent, should be evaluated under  one policy fabric.                     Both threads point to the same architectural premise: identity-based, evidence-rich enforcement. Full conversation in the comments.  #Cybersecurity #ZeroTrust #Microsegmentation #CyberResilience #CISO 

    • No alternative text description for this image
  • Preventing lateral movement is an architectural objective, not a tooling decision. That was the through-line of Andy Ellis's RSAC 2026 conversation with Elisity. The former CSO of Akamai for 20 years and author of "How to CISO" was direct about why Zero Trust programs stall. Most lateral movement does not exploit a novel vulnerability. It rides on three things: → Administrative agents the security team itself deployed → Service accounts with too many privileges → East-west paths the network was built to allow The architecture has to plan for stopping lateral movement, not just for detection. Andy's reframe of Zero Trust is just as direct. Programs stall because the message has been "I don't trust you," when it should be "I don't trust the tools we put on the network." The full conversation also covers: → Enclaving FDA-locked medical devices and unpatchable Windows manufacturing PCs → Why two-week traffic samples miss the monthly close and the annual DR test → Why policy is the last thing you do, not the first Worth the read and watch for CISOs, security architects, and network architects working on identity-based microsegmentation. https://lnkd.in/eWpTaj3H #ZeroTrust #Microsegmentation #LateralMovement

    • Andy Ellis with Elisity's William toll talking about Zero Trust, Lateral Movement and Microsegmentation at #RSAC2026
  • 99% of security leaders want microsegmentation deployed. Only 9% have protected more than 80% of their critical systems. A new Omdia survey of 352 cybersecurity decision makers across U.S. healthcare and manufacturing, commissioned by Elisity, lays out a clear say-do gap. Five numbers from the survey: ▪ Nearly 1 in 2 organizations experienced a lateral movement attack in the past year ▪ 57% rank microsegmentation as their top initiative to stop it ▪ 44% cite comprehensive device visibility as their biggest capability gap ▪ 69% require identity-based controls in any modern solution ▪ 32% point to cyber insurance requirements as a direct business driver Legacy tools built on VLANs, ACLs, and agents have slowed real progress for years. Most teams are still running on them. Modern, identity-based microsegmentation works differently. Policy enforces on the network infrastructure you already run. No agents. No new hardware. No VLAN reconfiguration. You contain ransomware and lateral movement across IT, IoT, OT and IoMT in weeks, not years. Read the full announcement: https://lnkd.in/ewWqwfw7 #Microsegmentation #ZeroTrust #Cybersecurity

    • Omida and Elisity Microsegmentation Survey

Similar pages

Browse jobs

Funding

Elisity 3 total rounds

Last Round

Series B

US$ 45.0M

See more info on crunchbase