/
Zero Trust Segmentation

Illumio Innovation Lookback: What We Built in 2024

As we close out another big year, it’s time to reflect on what we’ve built, the progress we’ve made, and what’s ahead for the Illumio Zero Trust Segmentation (ZTS) Platform.  

If 2024 proved anything, it’s that security threats are only getting more sophisticated. Nation-state cyberattacks, record-breaking data breaches, and increasingly complex IT environments have made one thing clear: traditional security tools aren’t enough to stop breaches.

Here’s a look at some of our biggest product updates in 2024 — and why they matter for the future of security.

Expanding Zero Trust to the cloud

As more organizations build hybrid cloud environments, keeping workloads secure has become harder. Illumio’s latest updates make it easier to apply Zero Trust in the cloud so that you can get better visibility, control, and protection against cyber threats.

Illumio Sentinel Solution: Integrating with Microsoft Security

Microsoft Sentinel logo

We deepened our partnership with Microsoft last year, bringing Illumio Sentinel Solution to Azure Marketplace.  

Now, customers can seamlessly integrate Illumio ZTS into Microsoft’s cloud-native SIEM and SOAR platform. This helps strengthen detection, response, and containment across cloud environments.

Ransomware Protection Dashboard: See and stop threats faster

Ransomware is a top concern for organizations — and we’re tackling it head-on. This year, we upgraded our Ransomware Protection Dashboard with new widgets at the app group level, giving users real-time visibility into risk areas. These insights help prioritize security efforts, detect weak spots faster, and prevent ransomware from spreading.

Is your organization prepared for ransomware? Find out in the new Global Cost of Ransomware Study.

Scaling security for modern and legacy environments

Today’s businesses rely on both modern cloud systems and older legacy technology which can make security more complicated. Illumio’s latest solutions help protect both, making it easier to secure new and old systems without adding extra work for IT teams.

CLAS containers: Future-proofing Kubernetes security

Cloud-native workloads are constantly evolving. That’s why Illumio’s Cluster Local Actor Store (CLAS) containers provide a new, scalable architecture for ephemeral workloads.

And our revamped Kubernetes interface aligns with standard Kubernetes models. This makes it easier for teams to secure and manage their containers environments.

Legacy Windows VEN Support: Protecting older systems

Not all businesses can immediately retire legacy infrastructure. But that doesn’t mean they should be left unprotected.  

Last year, we introduced Virtual Enforcement Nodes (VENs) for Windows Server 2003 and 2008 (pre-RS). Organizations can now extend Illumio ZTS to older systems while they work toward modernization.

Illumio's biggest 2024 ZTS innovations

Last year, we worked on ways to evolve ZTS so that organizations can contain attacks before they spiral out of control with simple microsegmentation.  

From strengthening cloud security to simplifying compliance, every innovation we launched was designed to help businesses stay ahead of threats, not just react to them.

Illumio Virtual Advisor (IVA): AI-powered insights at your fingertips

Security teams are drowning in complexity. That’s why we launched Illumio Virtual Advisor (IVA), an AI-driven tool that provides instant, expert-level guidance on Zero Trust Segmentation.  

IVA makes it easier to analyze traffic flows, optimize segmentation policies, and get actionable recommendations — all in seconds. With AI doing the heavy lifting, teams can move faster and make more well-informed decisions.

Illumio Virtual Advisor dashboard

AI Labeling: Automate workload labeling

Manually labeling workloads is tedious, time-consuming, and prone to errors. Illumio’s AI-driven labeling takes the guesswork out of the process.  

By leveraging machine learning, our AI labeling automatically assigns accurate, consistent labels based on metadata and flow logs.

This automation eliminates the need for manual security tasks, saving teams valuable time and effort. With reliable, standardized labels in place, security teams can focus on higher-level strategy, accelerate deployments, and seamlessly manage hybrid, multi-cloud environments.

Override Deny: See it all, secure it all

With today’s complex networks, cybersecurity is a visibility game. You can’t secure what you can’t see.

Our unified Map, Traffic, and Mesh View now includes the Override Deny feature. This enables users to write policies that override all other allow rules.  

Override Deny is essential during active breaches because it allows for quick port blocking. And it can help ensure compliance even in ever-changing environments.

Rule Hit Count Report: Simplifying compliance audits

For compliance, it’s critical to understand which security policies are being used and which are outdated.

That’s why we introduced the Rule Hit Count Report to give teams clear visibility into how often rules are triggered. This helps eliminate unnecessary policies, strengthen security gaps, and simplify audits.

What’s next? A future built on Zero Trust

2024 was all about laying the groundwork for stronger, more resilient security strategies. But we’re not stopping here. In 2025, we’re pushing even further — developing smarter solutions, deepening integrations, and ensuring organizations stay ahead of cyber threats.

Want a front-row seat to what’s next? Join us at the Illumio World Tour in London! It’s your chance to see our latest innovations in action, hear from industry leaders, and connect with the Illumio team.

Test drive the Illumio ZTS Platform today with The Illumio Experience.

Related topics

Related articles

Defining Metrics to Successfully Manage Your Zero Trust Implementation Plan
Zero Trust Segmentation

Defining Metrics to Successfully Manage Your Zero Trust Implementation Plan

The Zero Trust mindset assumes that one’s perimeter defenses have been breached, and priorities pivot to containing the lateral movement of malicious actors. Illumio published the 3-stage Zero Trust Plan, which individuals use to plan and operationalize their Zero Trust journey.

An Architect's Guide to Deploying Microsegmentation: Managing the Vendor Relationship and Operational Integration
Zero Trust Segmentation

An Architect's Guide to Deploying Microsegmentation: Managing the Vendor Relationship and Operational Integration

Transitioning from traditional network segmentation (such as firewalls) to micro-segmentation requires an orchestrated effort led by architects or project managers.

How ServiceNow Segments Across Azure and AWS With Illumio
Zero Trust Segmentation

How ServiceNow Segments Across Azure and AWS With Illumio

Learn more about how ServiceNow got up and running with micro-segmentation in this blog post.

How Illumio Simplified eBay’s Large-Scale Microsegmentation Project
Zero Trust Segmentation

How Illumio Simplified eBay’s Large-Scale Microsegmentation Project

Learn eBay’s success story of using the Illumio Zero Trust Segmentation (ZTS) Platform to roll out microsegmentation across its network.

Making the Invisible Visible: How Illumio is Innovating Visualizations in Cybersecurity
Illumio Products

Making the Invisible Visible: How Illumio is Innovating Visualizations in Cybersecurity

Explore how Illumio’s cutting-edge visualizations empower security teams to gain real-time network visibility, uncover vulnerabilities, and strengthen their security posture.

Work Smarter, Not Harder With Illumio’s New AI-Powered Zero Trust Segmentation
Illumio Products

Work Smarter, Not Harder With Illumio’s New AI-Powered Zero Trust Segmentation

Learn how the Illumio Virtual Advisor (IVA) and AI labeling can help you automate complex security tasks and get actionable insights in the Illumio Zero Trust Segmentation Platform.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?