Kingston Technology
Kingston Technology
90 Minutes 0
types of devices secured to apply segmentation endpoint agents required
CHA LLENGE S
Legacy approach to segmentation made it complex to provision and manage policies for the 90 types
of devices on Kingston Technology’s factory floor, including thermal units, packaging machines, testing
machines, manufacturing line equipment
PHAS ED JOURNEY
Secured access to the internet and private applicationswith the Zero Trust Exchange, including Zscaler
Internet Access and Zscaler Private Access
Extended zero trust to the factory floor with Device Segmentation, where every device is secured without
taking endpoints offline and without the need for agents, east-west firewalls, or VLAN readdressing
RESULTS
Reduces complexity and riskby enforcing policy on every endpoint, with the granularity to control access
by MAC address
Applies segmentation in minutes and without taking devices offline, unlike in legacy approaches where
making policy changes means days of offline devices and delays to the factory line