Illumio Core


How it works

Stop lateral movement in your data center and cloud environments with Illumio Core (formerly known as Illumio ASP). See how applications are communicating, get vulnerability exposure insights, then take control. Create segmentation policies that work on anything – bare-metal, virtual machines, and containers. 

Architecture Overview

graphic-asp

Illumio Core

With an architecture that allows you to use the enforcement points that already exist in your infrastructure, Illumio Core delivers segmentation without complexity. No additional hardware or re-architecting your network.

Learn more
graphic-ven

Virtual Enforcement Node (VEN)

Not just any lightweight agent – acting more like an antenna than an agent, the VEN is a core component of Illumio Core. It sends and receives information, programs pre-existing enforcement points, and detects policy violations.

Learn more
graphic-pce

Policy Compute Engine (PCE)

The "brain" of Illumio Core. The PCE builds a live map using the information shared from the VEN showing how applications are communicating and creates optimal segmentation policies based on those insights.

Learn more

Features

graphic-illumination

Illumination

See how apps are communicating through a real-time application dependency map.

Learn More
graphic-policy-generator-1

Policy Generator

Create optimal segmentation policies in minutes. 

Learn More
graphic-explorer

Explorer

Search and analyze historical records of traffic between workloads.

Learn More
graphic-secure-connect

SecureConnect

Protect data in transit and execute workload-to-workload encryption.

Learn More
graphic-vulnerability-maps

Vulnerability Maps

See which applications are connecting to vulnerable ports in real time.

Learn More
graphic-segmentation-templates-1

Segmentation Templates

Instantly secure critical off-the-shelf applications with tried-and-tested templates. 

Learn More

Try Illumio Edge

Swag Request

Try Illumio Core