Edge Security

Global Managed Micro­seg­men­ta­ti­on Service

Managed Microsegmentation Service provides globally active organisations with tailored modular cybersecurity solutions –
with fast and secure entry into the world of zero trust microsegmentation. 

We offer

Fast and secure access

Employees can access the desired corporate applications at any time and from anywhere on any device. High latency and packet losses are a thing of the past thanks to horizontally regulated access authorisations and contained lateral network movements.

Workload-to-Workload

Using microsegmentation, IT admins manage security guidelines that restrict data traffic based on the principle of least privilege and zero trust. Microsegmentation reduces the area of attack of potential cyber attacks, improves the containment of security breaches and strengthens regulatory compliance.

Scalable
solution

Scalable zero trust microsegmentation enables organisations to gradually increase their security maturity level without rebuilding networks or compromising operations.

Your solutions

Microsoft Partner Logo

Perfect for organizations who want consulting, design, visibility  and initial deployment – and will operate internally.

  • Visibility of the entire IT-inventory from day 1.
  • 4x reduction in time to recover from Ransomware.
  • Scalable segmentation maturity.
  • Closes gaps in segmentation maturity without downtime and without network reconstruction.
Cisco Partner Logo

Perfect for organizations who want deeper profiling, ongoing operations, tuning, managed enforcement and support (L1-L3).

  • Visibility of the entire IT-inventory from day 1.
  • 4x reduction in time to recover from Ransomware.
  • Scalable segmentation maturity.
  • Closes gaps in segmentation maturity without downtime and without network reconstruction.
  • Continuous, automatically controlled policy updates.
  • Maintenance and Support (L1-L3).

Zero Trust Microsegmentation

Reduce Breach Impact

 

Deploy faster

Microsegmentation from day one: plan, roll out, profile, implement.

 

Profile deeper

Microsegmentation that only allows for what your business needs and thus consistently minimises the area of attack.

 

Maintain tighter

Continuous monitoring and tuning throughout the entire application life cycle: monitor, maintain, readjust – so that segmentation remains reliably consistent.

Cybersecurity challenges

Multi Cloud

of respondents name Ransomware as a top concern and as the top organizational risk. Quelle: reports.weforum.org

Hybrid Cloud

days on average does it take for a security breach to be identified, managed, and fully resolved. Quelle: IBM Cost of a Data Breach Report 2025 (PDF-Auszug)

Animierter Zähler von 0 auf 21714

reported data breaches per day make compliance a constant "hot topic". Quelle: DLA
Piper GDPR Fines & Data Breach Survey (01/26)

Four times reduction in time to recover from Ransomware

Your benefits

Security Schloss
Event Webseite mit Branding, Event Einladung versenden mit einer Event Management Software
Event Webseite mit Branding, Event Einladung versenden mit einer Event Management Software
Event Check-in, Event Einladung versenden mit einer Event Management Software

Dynamic cyber resilience

Instead of a “regulatory paradox,” adopt a risk-based approach that focuses on real threats rather than just compliance with regulations. Microsegmentation offers development potential away from a static safety measure to a dynamic driver for cyber resilience, compliance and reduced security breaches..

Segmentation without downtime  

Instead of isolated firewall rules, our solutions offer you microsegmentation tools that enable effective management of more mature, granular segmentation. Optimise your digital sovereignty by segmenting multiple asset types (data centres, networks, applications, IoT devices/machines, etc.) in parallel without operational downtime. 

Cloud & on-premise compatibility 

The clear and intuitive microsegmentation management platform supports automation, transparency, and guideline consistency, enabling unified segmentation across cloud and on-premise environments.

Workload-to-Workload

Rely on a workload approach, software-based segmentation, map-first transparency, simulation modes and fast containment. Isolate high-risk assets (such as IoT) and contain lateral network movement. Without network conversion or new network architecture, we guarantee a simple roll-out with low change risk./p>

Our exclusive partners 

Microsoft Partner Logo
Microsoft Partner Logo

Answers to frequently asked questions

Short answer: Yes. Our partner Illumio applies workload-based implementation. No VLAN redesigns and no additional appliances are required. This reduces change risk and operating expenses, especially in hybrid data centre and cloud landscapes and OT-related environments.  

Short answer: Through traceability, export capability and audit trails.  
The policy and change history is fully traceable and can be exported for revision and audits. Mapping to requirements (e.g. ISO and NIST controls) can be documented on a project-specific basis. The separation of roles, duties and authorisations (SoD) is technically and organisationally feasible.

Short answer: The customer – with governance by Swisscom Broadcast  
The role-based authorisation model (RBAC) is the handle for properly implementing policy management and follows the least privilege principle. The dual control principle applies to productive policy changes. An audit trail governs the seamless logging of changes (who/what/when) and can be exported for audits. Simulation modes (tests without enforcement) ensure change security before going live. 

Short answer: No.  
The enforcement of segmentation policies is software-based on your workloads (agent/workload enforcement). No application and/or customer data is transferred to Illumio. Illumio does not require read access to databases, files or application content for policy enforcement.  

Short answer: Through architecture, contract and data minimisation.  
In terms of architecture, the operating model is designed in such a way that no third-party access to content data is required. Your primary contractual partner under Swiss jurisdiction is Swisscom Broadcast. Data processing agreements (DPA/AVV) define the purpose, location and limits of data processing. Where telemetry/metadata is required, its scope, storage location (EU/CH options, if available) and storage can be defined contractually and technically restrictively. 

Short answer: Configuration, policy and metadata, no content data.  
There are different types of data, including: Labels, guidelines, permitted and prohibited connections, technical function/role designations of workloads, ports and services. No payload or content data is generated. 
You as the contractual partner decide where the data is located, within the scope of the operational options offered (e.g. EU or CH). The control processes are encrypted in transit (TLS) and retention periods as well as deletion and export processes are defined.  

Your contact person

Basilio Carnuccio

Sales Manager

Tel. +41 58 223 26 69