Blog | Contact Sales
The Illumio Adaptive Security Platform® (ASP) provides comprehensive visibility, security, and encryption for the enterprise.
Illumio works with leading technology and business partners. Ready to join us?
All media resources available in a single kit.
Forbes Named Illumio Best Private Cloud Company
This paper explains the evolution of networks, software-designed networking, and host-based segmentation.
This Forrester report evaluates Zero Trust platform providers. It recognizes Illumio as a leader and awarded the vendor with the highest score in current offering.
This report summarizes the results of a survey of over 300 IT professionals conducted by Virtual Intelligence Briefing (ViB) to understand how companies segment today and what difficulties they face.
Watch the live introduction of Illumio’s PCE Supercluster and learn how to scale micro-segmentation across even the largest most complex environments.
Live from the VMworld 2018 expo floor, we demo how security and ops teams, application owners, CMDB managers, and auditors can benefit from real-time application dependency and vulnerability mapping integrated with micro-segmentation.
Live from the Microsoft Ignite 2018 expo floor, learn how to see how your applications are communicating in real time, test security policies in minutes, and secure Active Directory and other core services in one click.
Live from the RSA 2018 expo floor, Matthew Glenn, Illumio's VP of Product Management, demos micro-segmentation enabled by a real-time application dependency map and the industry's first vulnerability mapping capabilities.
The Illumio Adaptive Security Platform (ASP) lets organizations understand and protect their computing assets in minutes, across a range of formats in both data centers and public clouds.
Matthew Glenn, Illumio’s VP of Product Management, demos adaptive segmentation live from the RSA Conference 2017 expo floor.
Illumio Segmentation Templates help you deploy adaptive segmentation in minutes for widely used, business-critical apps.
The Explorer feature enables you to ask questions about your network traffic, sort through complex application environments, and quickly find and secure hidden risks.
Policy Generator automatically creates micro-segmentation policies in minutes, saving security teams critical time, accelerating security workflow, and reducing the risk of human errors.
See how Illumio Application Dependency Mapping is an important part of implementing your segmentation strategy and maintaining security and compliance in your environment.
Illumio ASP lets you achieve environmental separation while extending adaptive security to additional enforcement points.
See how to use Illumio ASP to securely migrate to the cloud, or deploy a hybrid model.
Three ways Illumio helps Nutanix customers increase security, not complexity.
Live demo of the Illumio Adaptive Security Platform from the show floor at VMworld 2016.
In this white paper, we explore essential considerations for law firm cybersecurity in today’s "assume breach" world and the essential steps for breach preparedness and regulatory reporting.
Dynamic data centers and cloud need an adaptive security model that decouples security from the underlying infrastructure.
This paper quantifies the costs incurred by failure to adapt to modern security requirements to prevent the spread of breaches.
This guide outlines why and how large enterprises are using application dependency mapping and micro-segmentation in association with the NIST Framework to secure crown jewel applications.
This white paper discusses strategies for securing high value assets (HVAs) in the Federal sector and illustrates Illumio's approach.
This white paper from ESG covers various approaches to micro-segmentation with a focus on the benefits of a host-based architecture.
An effective micro-segmentation solution ensures your SWIFT compliance initiative runs smoothly and quickly, while shortening your audit and helping you avoid costly mistakes.
Continuous visibility and host-based segmentation helps you reduce your PCI scope, secure your CDE, and demonstrate compliance to your auditors and supply chain partners.
Learn about the “truths” of micro-segmentation for security in today's dynamic, heterogeneous data center and cloud world, from architecture and visibility requirements to the need for distributed segmentation.
Learn more about Illumio’s Security Program and our approach to organizational and operational security, program oversight, and third-party assessments.
Using micro-segmentation to reduce your attack surface, harden your data center, and secure your cloud.
Find out how professionals across IT organizations keep their application environments secure with adaptive segmentation.
Why is Active Directory often both a prime target and overly exposed? What characteristics should you look for when considering micro-segmentation solutions to secure Active Directory (or any Microsoft application)? Find out in this white paper.
Businesses don't want to lose the controls they have in their own data centers when migrating workloads to the public cloud.
Learn how application dependency mapping works and why it’s critical to protecting key business assets within your data center and cloud environments.
Firewall rule explosion forces business to spend excessive resources managing and auditing obsolete rules, while also opening them up to potential error, performance degradation, and security risks.
Learn how security segmentation reduces your attack surface, hardens your data center, and enables your cloud security.
Enterprises need consistent, accurate, and automatically adaptive security policies to protect their scaled workloads.
How can enterprises best navigate the complex maze of laws, regulations, and policies that govern data protection and privacy?
DevOps practices are driving IT operations to improve cross-functional collaboration, release times, and quality—but how can they achieve this without sacrificing security?
As data breaches and attacks have become more common, businesses are using segmentation to improve security and control.
Businesses are spending millions of dollars to prevent malicious interception of data when sensitive data is exchanged on networks.
Find out how a top multinational bank secured containerized applications while maintaining the speed required for a competitive business edge.
Find out how a major SaaS provider securely future-proofed their technology stack and scaled automation to meet customer demands.
Find out how one of the world's largest resorts achieved their short-term project requirements and long-term operational needs for securing their PCI environment.
Find out how one of the country's largest medical groups prevented unauthorized access to personal health information (PHI) and ensured third-party hosted data was policy compliant.
Find out how a leading eCommerce retailer quickly met PCI DSS requirements to ringfence its payment infrastructure and achieve compliance.
Find out how a Global 250 bank addressed SWIFT compliance requirements with easy-to-deploy micro-segmentation that ensured consistent security across their SWIFT environments.
Find out how one of the world's largest SaaS players cut hardware costs by $10M+ and increased the security of two new data centers.
This infographic breaks down the top considerations and attributes to look for when choosing your micro-segmentation solution.
Visual summary of the key statistics and findings about the current computing landscape.
To really understand the security landscape we’re living in, we need to put it in the context of what’s been happening until now.
Enterprises are turning to Zero Trust as a common framework to ensure consistent security across environments. See how Illumio ASP maps to Forrester's Zero Trust framework.
This solution brief maps how Illumio ASP can help operators of essential services reduce cyber risk and achieve the outcomes specified by the NIS principles.
PCE Supercluster is designed for enterprise-scale, globally distributed environments. Learn how it allows organizations to manage security policies globally while enabling local PCEs to manage workloads and program enforcement points.
This solution brief provides a mapping of Illumio ASP to the SWIFT Customer Security Controls Framework and describes how Illumio is used and configured by customers as a critical component of the SWIFT security ecosystem.
Learn how real-time visibility and micro-segmentation are foundational to a successful M&A strategy, enabling speedy, seamless integration.
For the first time, vulnerability and threat data is integrated with application dependency maps to show potential attack paths in real time.
Read how Illumio ASP reduces cybersecurity risk by helping organizations optimize the Identify, Protect, Detect, and Respond Functions of the NIST Cybersecurity Framework (CSF).
Answers to frequently asked questions about Illumio ASP, its core components, and key services.
To protect your applications, you must understand them better than your adversaries. Illumio's real-time application dependency mapping service, Illumination, keeps you a step ahead of intruders.
Read how Illumio secures critical business applications and simplifies compliance with nano-segmentation℠.
Read how Illumio ASP makes it possible for you to isolate application environments with one simple, natural-language policy.
Illumio ASP lets organizations apply consistent security within the PCI DSS framework and easily maintain compliance with security policies that adapt to changes.
Learn how to gain traffic visibility and uniform security—across any type of infrastructure.
Secure hybrid deployments with natural-language policies that don’t depend on the network.
What do you get when you combine invisible infrastructure and adaptive security?
With Illumio, enterprises can prevent users from establishing connections to unauthorized applications, effectively stopping inside bad actors from compromising applications.
PivotNine reviews how Illumio ASP can easily manage the complexity and scale involved in securing east-west communication in today’s highly distributed, dynamic, and hybrid environments.
The analyst firm 451 Research offers its take on Illumio's approach to security, including a review of the company's technology, where Illumio fits within the security market, and a SWOT analysis.
Goldman Sachs calls Illumio Adaptive Security Platform an elegant segmentation solution for distributed networks.
SANS Institute report based on its survey of more than 430 IT professionals about their enterprises information security practices.
Learn more about Illumio ASP, its micro-segmentation services, and its benefits.
Why did Illumio re-invent segmentation with adaptive micro-segmentation? Find out in this quick summary of what we do – and how we do it.
This chart compares the capabilities of the Illumio Adaptive Security Platform (ASP) and VMware NSX-T.
If you’re considering using segmentation to improve your security, here are five features you should look for when evaluating solutions.
This chart compares the capabilities of the Illumio Adaptive Security Platform (ASP) and Cisco Tetration Analytics.
This guide compares how VMware NSX and Illumio ASP address security challenges with micro-segmentation.
How can IT and security professionals gain control over the security posture in their dynamic data centers?
Matt Glenn, Illumio VP of Product Management, discusses how Illumio ASP works, how it can limit the impact of a breach, and how to deploy micro-segmentation at scale.
With the advent of clouds, edge computing, and IoT, servers and data are no longer contained. How can you stay secure? Faraz Aladin, Illumio’s Head of Technical Product Marketing, discusses the challenges – and his answer might surprise you.
There is no truly risk-free environment as digital footprints expand. Vijay Chauhan, Sr. Director of Product Marketing for Illumio, explains how to identify your high-value assets, gets into visibility mapping, and shares three key ways to keep your environment safe.
In these conversations with a veteran Microsoft Windows Architect, you'll get a perspective on challenges he faced running and securing Microsoft environments, and how he shaped the Illumio ASP to "illuminate Windows" and make the lives of Microsoft Admins easier.
Illumio CTO PJ Kirner and CCO Alan Cohen deep dive into security segmentation and discuss why it's essential to protecting your data center and cloud.
Illumio Head of Cybersecurity Nathaniel Gleicher joins an Andreessen Horowitz guest panel to discuss the scope of "actual" cyber threats and how we're talking about them today.
Illumio’s Andrew Rubin is interviewed on the a16z podcast about the shift in how enterprises are running their applications and infrastructure—and what it means for security.
Illumio's Andrew Rubin joins KCBS's Morning Drive to discuss the need for a West Point for Cyber.
Illumio's Alan S. Cohen and Matthew Glenn riff on adaptive security, industry trends, and life itself.
What exactly are your crown jewel applications? And how can you best protect the crown jewel applications inside your data centers and cloud environments? Watch this video to find out.
Illumio Head of Cybersecurity Strategy Jonathan Reiber takes the stage at INK Conference 2018 to discuss the vulnerable nature of the data-driven world in which we live – and the steps that organizations can take to become secure beyond breach.
The Illumio App for Splunk is a set of prebuilt dashboards that enhance Illumio integration with Splunk by providing security and operational insights into Illumio-secured environments.
Illumio CTO and co-founder PJ Kirner caught up with ActualTech Media at VMworld 2017 for an update on the latest chapter in the Illumio story and adaptive micro-segmentation.
Illumio CTO PJ Kirner talks to ActualTech Media about the evolution of adaptive segmentation.
Discover the five requirements that you should look for when evaluating adaptive segmentation solutions.
Illumio Head of Cybersecurity Strategy Nathaniel Gleicher examines how the Secret Service protects the President and how their approach can improve cybersecurity.
Illumio CEO and Co-founder Andrew Rubin speaks with WSJ about the new cybersecurity concerns facing organizations that have moved onto the cloud.
Here are the four reasons why visibility is critical to successful adaptive segmentation.
Not all visibility is created equal – having the right visibility is critical for successful adaptive segmentation.
Learn about the components of the Illumio Adaptive Security Platform (ASP) architecture for adaptive segmentation.
Learn how the Policy Compute Engine (PCE) plays a central role in the Illumio Adaptive Security Platform (ASP) solution.
Learn about the Virtual Enforcement Node (VEN): what it is, how it works, and what role it plays in the Illumio ASP solution.
Discover how to easily encrypt data in motion to meet compliance requirements with Illumio SecureConnect.
Learn about the key workflows you should have in place to ensure your adaptive segmentation project is successful.
Labels are important to adaptive segmentation. Learn why and how they work in the Illumio Adaptive Security Platform (ASP) solution.
Learn about why you need a multidimensional policy model for adaptive segmentation and the factors you should look for to ensure you pick the right one
Illumio CEO Andrew Rubin talks to NBC Bay Area about the need for a “West Point for Cyber.”
Gain insight into the changes that organizations are seeing as they move to a new security model with adaptive segmentation.
Illumio Adaptive Security Platform (ASP) makes security the enabler for computing, not the roadblock.
Illumio CEO Andrew Rubin walks IT Harvest's Richard Stiennon through how the Illumio Adaptive Security Platform works, and the importance of driving a major shift in the way we think about security.
Law firms must control sensitive client data, ensure systems are protected in case of a breach, and document regulatory compliance on demand. Micro-segmentation innovations can secure a firm's systems and allow them to confidently respond to audits.
Breaches are inevitable--are your high value assets adequately secured? Identify your own crown jewel assets, then discover why and how large enterprises are protecting their applications with micro-segmentation and learn the 5 key steps they use.
In under 15 minutes, see how Illumio ASP delivers live visualization of application traffic along with continuous, scalable, and dynamic policy and enforcement to every bare-metal server, virtual machine, and container across data centers and public clouds.
Learn how to reduce your data center and cloud attack surface to decrease exposure, limit an attacker's mobility, and minimize the impact of a breach by identifying and protecting your high-value assets and vulnerabilities.
Companies of all sizes are struggling to ensure their network is truly secure using aging firewall security systems. Micro-segmentation, when implemented correctly, offers the security needed and provides tremendous application visibility.
Everyone today is talking about micro-segmentation, but there’s relatively little discussion about what it is (and is not) and how to use it to effectively improve the security inside your data center and cloud. Until now.
See a hyperconverged infrastructure in action and find out how to simplify operations, reduce cost, and get uniform security within your data center and cloud environments.
Illumio and Nutanix, along with F5, Rubrik, and Workspot, show you how to expand your enterprise cloud capabilities with leading application delivery, security, data protection, and VDI solutions in this on-demand webinar.
This Request for Proposal template is comprised of common requirements and questions from buyers when selecting a solution for micro-segmentation. Use it to identify your solution criteria, clarify unknowns, and prioritize potential trade-offs.
Find out how a major healthcare service company employed a real-time map and segmentation to secure their data center assets after selling a part of their business and associated infrastructure to a foreign entity.
Find out how potential crisis turned to opportunity when security segmentation was decoupled from the network, enabling improved DevOps.
Many organizations who reported a breach in 2017 had passed their PCI audits prior to discovery. Don’t rely on outdated technology approaches – learn how to use threat models and Zero Trust security to make your PCI DSS program more effective.
Find out how a top SaaS company successfully integrated systems under board-level scrutiny, without compromising performance or security.
Find out how one of the world's largest talent agencies transformed their cloud security, gaining visibility and more granular security with centralized policy.
Find out how the bank segmented development and production environments without having to shift infrastructure or re-architect their network.
Find out how a leading bank implemented real-time visibility for safer, simpler, and more cost-effective security that follows workloads wherever they go.
Compliance regulations such as SWIFT and GDPR can be daunting. Vijay Chauhan shares his experiences as a financial services security practitioner and highlights how Illumio helps the world’s largest financial institutions solve regulatory challenges at scale.
Micro-segmentation is the simplest and most effective way to address healthcare cybersecurity compliance.
Adaptive security is increasingly becoming the go-to solution for security teams who want to go fast without sacrificing security. But is it right for your team?
Illumio Adaptive Security Platform for Federal
Take our self-assessment to calculate attack surface and benchmark your organization. Get a custom report of best practices to manage vulnerabilities and reduce your blast radius.
Watch the live recording of Illumio MythBusters. We busted some of the most common myths about segmentation – all in the name of security – with a deep dive on Illumio ASP.
This white paper offers a high level understanding of Illumio ASP and its ability to help customers directly meet or support PCI DSS 3.2.1.
The Adaptive Security Platform now supports management and visibility of DNS-addressable services with adaptive segmentation policy that seamlessly follows the workload and automatically adjusts based on its domain name
Watch this webinar to learn how Illumio's Adaptive Security Platform can help you achieve Zero Trust security quickly and at a lower cost than traditional network security approaches.
Learn how Illumio ASP can help operators of Systemically Important Payment Systems (SIPS) reduce cyber risk and achieve the outcomes specified by the SIPS Guidance principles.
How can you do segmentation with a network flat? Watch this video to learn how decoupling enforcement from the network makes it possible.
Networks are designed to connect and security segmentation is designed to isolate. Is it possible to achieve both goals without breaking your network? See what happens when you decouple security from your network architecture.
Based on real-world scenarios and written by industry experts who have been in the trenches, this book is a practical guide that details how to implement a successful security segmentation strategy from start to finish. It's an essential read for all cybersecurity professionals, from security architects to IT infrastructure teams to CISOs.
This Solution Brief describes how Illumio ASP can help customers accurately scope and effectively segment their PCI environment to lower the cost of PCI DSS audits and prevent lateral movement attacks.
Find out how UK asset management firm Baillie Gifford gained cross-environment visibility and audit-ready reporting to build client confidence that data is securely locked down.
How can you apply Forrester's ZTX framework to your Zero trust journey? What's required to design and implement a Zero Trust architecture? How can you prepare your organization for Zero Trust? Forrester Principal Analyst and leading mind on Zero Trust, Chase Cunningham, joined Illumio CTO and co-founder PJ Kirner to answer these questions and more.
Find out how Ixom, chemical industry market leader in Australia and New Zealand, implemented default-deny segmentation to prevent unauthorized access to critical systems and limit vulnerabilities and risk exposure.
The EU's NIS Directive recommends OES measures to prevent and minimise breach impacts. Learn how Illumio's Adaptive Security Platform helps OES achieve those outcomes more quickly, safely, and cost-effectively than other segmentation options.
Solution brief compares the TCO between using hardware firewalls vs.Illumio ASP to support PCI segmentation.
Learn more about Illumio ASP Secure Cloud, key features, and how it compares to on-premises deployment types.
This document offers a list of RFP questions to address PCI scoping and segmentation requirements.
Vijay Chauhan discusses how segmentation relates to Zero Trust security, along with a perspective from his career in cybersecurity.
Gain the agility of containerized deployment, without compromising Zero Trust confidence in preventing the spread of breaches. Illumio’s Adaptive Security Platform (ASP) supports containerized hosts, alongside your existing compute environments.
Illumio VP of Product Marketing, Vijay Chauhan, presents at Cyber Tech & Risk's "Zero Trust Security Summit," explaining Zero Trust security and how segmentation can help you achieve it.
This paper explores the challenges of network-based approaches to container segmentation and how to overcome those challenges using host-based security segmentation.
See how to secure your containerized applications using Illumio's Adaptive Security Platform.
Learn how to extend segmentation policy beyond your datacenter and public or private cloud to govern containers consistently with all other forms of compute – without administering a separate point solution, or re-architecting the network.
It is no secret that attackers move laterally to find and exfiltrate data. To combat this, we segment data centers with complex, expensive firewalls, for better or worse. But there is a better way.
With the increasing adoption of virtualization and hybrid cloud, the pressures to maintain network resiliency and performance continue to rise. Learn how decoupling security segmentation from the network helps you achieve both of these goals.
Find the perfect balance between connectivity and security with a new approach to security segmentation. Watch this webinar to learn how to unlock security segmentation from the network.
Whether you’re contemplating or actively deploying segmentation for security, this Design Guide includes insights and recommendations to help you arrive at the right deployment model for your organization.
In this short video series, segmentation experts Mike Mastrole and Dan Gould discuss the key differences between data center firewalls and Illumio for segmentation.
See how firewalls and Illumio stack up when it comes to cost, timing, risk, complexity, and change.
Learn why more and more organizations are hitting a wall with traditional segmentation solutions like firewalls and SDN and adopting host-based segmentation that fits today's business.
Learn how a top law firm segments across environments, including Azure, to stay audit-ready for its client base in highly-regulated industries.
Lateral movement. Two words that are synonymous with "breach" these days. What exactly is lateral movement? And how do you stop it from happening? Illumio's Neil Patel and Dan Gould "take 90" to explain.
Watch this video to learn how Illumio ASP can help you scope your PCI environment and implement segmentation quickly, reducing your audit burden and making your QSAs happy.
Brian Chess, SVP of Infrastructure & Security, discusses how Oracle NetSuite data center and cloud achieves lockdown with speed and flexibility required for business needs.
CISO Jeff Blair discusses how Illumio helps his team more easily understand and control what’s happening inside the network.
CISO Sajawal Haider discusses why Illumio's visualization and adaptive segmentation create a "frictionless approach" to data center and cloud security.
Joe Burton discusses how the cloud is shaping product development and why "Illumio represents a transformational approach to providing security for the cloud."
The threat landscape is more dynamic than ever before, and as business-critical applications go beyond traditional network boundaries, a new segmentation solution is required. This paper details the benefits of adaptive security segmentation.
"Workloads" and "applications" – you need to segment both to effectively reduce your data center attack surface. Do you know the difference between them? Illumio TME Neil Patel will walk you through it in under 60 seconds.
Find out how to align to Forrester’s framework for Zero Trust and minimize your attack surface, improve visibility, reduce complexity and cost, and strengthen your overall security to protect your business from data loss and cyber breaches.
Get a deeper look at the features and functionality of Illumio's integration with Splunk, keeping SOC teams on track with the ability to see and understand what is happening in the data center and to take action in a click.
What security objective should be top of mind for security teams today? Illumio’s Neil Patel and Dan Gould discuss – along with sure-fire approaches to succeed.
Learn how to install and configure Illumio App for QRadar, which provides real-time data center and cloud visibility to streamline operations and improve security.
Here’s a demonstration of the Illumio App for QRadar’s ability to ingest messages in LEEF and JSON formats.
Visibility is the first step towards protecting your data center and is critical to detecting intruders and stopping lateral movement. Watch our 30-minute overview and demo to learn how an application dependency map can help you.
Here is an overview of the Illumio App for QRadar, which provides real-time data center and cloud visibility to streamline operations and improve security.
From cost to complexity and risk factors, there are significant differences between Illumio and data center firewalls when it comes to segmentation.
Watch our panel discussion between experts from Google Cloud, Qualys, KnowBe4, and Illumio as they discuss the changing cybersecurity landscape, how to create a company-wide cybersecurity task force, evaluating your security budget against your threat level, and best practices for creating your best defense against the threats today and in the future.
Network-based segmentation poses challenges as compute scales outside network boundaries. Segmenting on the network is complex, error-prone, and can even break applications in enforcement. Learn how Illumio can free you to segment better, simply.
Join Illumio's Sam Rastogi to get a long way down the Zero Trust road. Learn how to deploy Illumio on workloads, take advantage of our visibility approach to define policy, and how to enforce effective controls across Zero Trust traffic. Find out why Forrester has identified Illumio as a leader in The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019.
Find out how one of the largest private electrical contractors in Australia avoided manually programming firewalls with a solution that they had up and running in a day.
Wondering how Illumio's agent is different? Check out this video with TME Neil Patel to learn what it's like having it in your data center or cloud – and why it's not your average agent.
Illumio CEO Andrew Rubin sat down with Dark Reading at RSA Conference 2020 to talk about Zero Trust security, sharing his perspective on how it relates to the human element in cybersecurity and why stopping lateral movement is foundational priority.
Ixom CIO Rowan Start and Cloud & Security Architect Greg Leibel discuss why they chose Illumio to meet their network segmentation needs in a cloud-first org – gaining unprecedented visibility and control of their high-risk systems.
Illumio news. Be the first to know.
© 2020 Illumio 920 De Guigne Drive, Sunnyvale, CA 94085