Illumio Insights Free Trial - Admin FAQ
Your colleague has requested access to try Illumio Insights. Here's everything you need to know about granting secure access to your cloud environment.
Question:
What is Illumio Insights?
Answer: Illumio Insights is a security platform that analyzes network traffic to:
- Assess risk with uniform, context-rich AI observability that scales across hybrid, multi-cloud environments.
- Detect attacks by identifying key events, patterns, and behaviors. It reduces alert fatigue and focus on critical issues.
- Contain threats by enabling instant containment and segmentation
Think of it as a security camera for your network traffic — it watches what's happening and alerts you to suspicious activity.
QUESTION:
Why does my colleague need my help (as the admin)?
Answer: Your colleague signed up to try Illumio Insights, a security platform that analyzes network traffic to detect threats. To provide meaningful insights, Illumio needs to access your cloud flow logs (network traffic data). As the cloud administrator, you have the permissions needed to grant this secure, read-only access.
Access & Permissions
Question:
What exactly am I granting access to?
Answer: What specific permissions does Illumio need?
These are standard, read-only permissions that many security tools require.
question:
Can Illumio make changes to my cloud environment?
Answer: No. All permissions are read-only. Illumio cannot:
- Create, modify, or delete cloud resources
- Change configurations or settings
- Access application data or business content
- Affect your cloud infrastructure in any way
question:
What exactly am I giving Illumio access to?
Answer: You're granting read-only access to your cloud flow logs - essentially network traffic metadata that shows:
- Which resources are communicating with each other
- Traffic patterns and volumes
- Connection details (IPs, ports, protocols)
What Illumio does NOT access:
- Your actual data or files
- Application content
- Sensitive business information
- The ability to modify your cloud environment
Security and Data
Question:
Is my data secure?
Answer: Yes. Here's how your data is protected:
- Encryption: All data is encrypted in transit and at rest.
- Access Controls: Only authorized Illumio personnel can access the platform.
- Data Sovereignty: Your data remains in your specified region (currently US/Azure).
- Compliance: Illumio meets enterprise security standards, including GDPR requirements.
Question:
Can I revoke access anytime?
Answer: Absolutely. You maintain full control.
- To revoke access, remove Illumio permissions from your cloud console anytime.
- Access stops immediately when permissions are revoked.
- You can also contact our team at [email protected] to terminate the trial.
question:
What happens to my data during the trial?
Answer: Your flow log data is:
- Processed securely in the Illumio trial environment
- Used solely for security analysis and threat detection
- Never shared with third parties
- Retained only for the trial period (30 days max)
- Automatically deleted when the trial ends
Cost & Implementation
question:
Will this cost us money?
Answer: No. The trial is free.
Question:
Will this impede performance?
Answer: No performance impact. Illumio only reads existing flow logs - it doesn't:
- Generate additional network traffic
- Install agents on your servers
- Create new monitoring overhead
- Affect application performance
Trial Process
Question:
How long does access last?
Answer: The trial runs for 14 days. However:
- If no data is ingested within 7 days, the trial automatically expires.
- You can terminate access anytime.
- All data is deleted when the trial ends.
Question:
How do I grant access?
Answer: A Simple 3-step process:
- Log in to Illumio Insights (credentials in your email)
- Navigate to the Onboarding page
- Click "Add Azure" or "Add AWS" and follow the guided setup
Takes 10-15 minutes total.
Values & Outcomes
question:
What should I expect from this trial?
Answer: Your organization will gain:
- Complete visibility into network communications
- Threat detection capabilities for lateral movement
- Risk identification for potential data exfiltration
- Security recommendations based on traffic analysis
Question:
What happens after granting access?
Answer:
- Immediate: Data ingestion begins
- Hours 1-24: Initial analysis and insights
- Week 1: Team review of preliminary findings
- End of trial: Decision on full implementation
Support
Question:
Who do I contact for help?
Answer:
- Technical setup: [email protected]
- General questions: Illumio Insights product page
- Security documentation: Available upon request
question:
What should I expect after granting access?
Answer: Once access is granted:
- Illumio begins analyzing your flow logs (this takes a few hours)
- Your colleague receives access to security insights and findings
- Our team may reach out to schedule a review of initial findings
- You'll receive confirmation that data ingestion is working properly
question:
How do I know if the trial is providing value?
Answer: You should expect to see:
- Visibility into previously unknown network communications
- Identification of potential security risks or misconfigurations
- Documentation of traffic flows for compliance and security planning
- Recommendations for improving your security posture
question:
What if I'm not comfortable with this?
Answer: We understand. Options include:
- Scheduling a call to address specific concerns
- Reviewing our security documentation first
- Starting with limited scope (specific subnet/region)
- Exploring alternative evaluation methods
Ready to start? Use the login credentials from your email to access Illumio Insights and complete the simple onboarding process. Our team is available to assist with any questions.