Blog | Contact Sales
CNBC names Illumio to 2018 CNBC Disruptor 50 List
The Illumio Adaptive Security Platform® (ASP) provides comprehensive visibility, security, and encryption for the enterprise.
Watch how Nutanix and Illumio deliver an end-to-end solution for deploying and securing next-generation data centers.
Illumio works with leading technology and business partners. Ready to join us?
Illumio provides customers with 24/7 support for all maintenance, releases, and software updates.
24x7 technical support
Easy-to-search knowledge base
Full suite of product documentation
Client access to Illumio's online community
Illumio announces launch of NEW online community for clients.
All media resources available in a single kit.
Use this guide to create a rock-solid micro-segmentation strategy in only five steps.
Forrester Research has named Illumio a Strong Performer in its report, Forrester Wave ™: Zero Trust eXtended (ZTX) Ecosystem Providers, Q4 2018.
Watch the live recording of Illumio MythBusters. We busted some of the most common myths about segmentation – all in the name of security – with a deep dive on Illumio ASP.
This paper explains the evolution of networks, software-designed networking, and host-based
Watch the live introduction of Illumio’s PCE Supercluster and learn how to scale micro-segmentation across even the largest most complex environments.
Live from the VMworld 2018 expo floor, we demo how security and ops teams, application owners, CMDB managers, and auditors can benefit from real-time application dependency and vulnerability mapping integrated with micro-segmentation.
Live from the Microsoft Ignite 2018 expo floor, learn how to see how your applications are communicating in real time, test security policies in minutes, and secure Active Directory and other core services in one click.
Live from the RSA 2018 expo floor, Matthew Glenn, Illumio's VP of Product Management, demos micro-segmentation enabled by a real-time application dependency map and the industry's first vulnerability mapping capabilities.
The Illumio Adaptive Security Platform (ASP) lets organizations understand and protect their computing assets in minutes, across a range of formats in both data centers and public clouds.
Matthew Glenn, Illumio’s VP of Product Management, demos adaptive segmentation live from the RSA Conference 2017 expo floor.
Illumio Segmentation Templates help you deploy adaptive segmentation in minutes for widely used, business-critical apps.
The Explorer feature enables you to ask questions about your network traffic, sort through complex application environments, and quickly find and secure hidden risks.
Policy Generator automatically creates micro-segmentation policies in minutes, saving security teams critical time, accelerating security workflow, and reducing the risk of human errors.
See how Illumio Application Dependency Mapping is an important part of implementing your segmentation strategy and maintaining security and compliance in your environment.
Illumio ASP lets you achieve environmental separation while extending adaptive security to additional enforcement points.
See how to use Illumio ASP to securely migrate to the cloud, or deploy a hybrid model.
Three ways Illumio helps Nutanix customers increase security, not complexity.
Live demo of the Illumio Adaptive Security Platform from the show floor at VMworld 2016.
In this white paper, we explore essential considerations for law firm cybersecurity in today’s "assume breach" world and the essential steps for breach preparedness and regulatory reporting.
Dynamic data centers and cloud need an adaptive security model that decouples security from the underlying infrastructure.
This paper quantifies the costs incurred by failure to adapt to modern security requirements to prevent the spread of breaches.
This guide outlines why and how large enterprises are using application dependency mapping and micro-segmentation in association with the NIST Framework to secure crown jewel applications.
This white paper discusses strategies for securing high value assets (HVAs) in the Federal sector and illustrates Illumio's approach.
This white paper from ESG covers various approaches to micro-segmentation with a focus on the benefits of a host-based architecture.
An effective micro-segmentation solution ensures your SWIFT compliance initiative runs smoothly and quickly, while shortening your audit and helping you avoid costly mistakes.
An effective micro-segmentation solution allows you to quickly and painlessly scope and segment your PCI environment to prove compliance.
Learn about the “truths” of micro-segmentation for security in today's dynamic, heterogeneous data center and cloud world, from architecture and visibility requirements to the need for distributed segmentation.
Learn more about Illumio’s Security Program and our approach to organizational and operational security, program oversight, and third-party assessments.
Using micro-segmentation to reduce your attack surface, harden your data center, and secure your cloud.
Find out how professionals across IT organizations keep their application environments secure with adaptive segmentation.
Why is Active Directory often both a prime target and overly exposed? What characteristics should you look for when considering micro-segmentation solutions to secure Active Directory (or any Microsoft application)? Find out in this white paper.
Businesses don't want to lose the controls they have in their own data centers when migrating workloads to the public cloud.
Learn how application dependency mapping works and why it’s critical to protecting key business assets within your data center and cloud environments.
Firewall rule explosion forces business to spend excessive resources managing and auditing obsolete rules, while also opening them up to potential error, performance degradation, and security risks.
Learn how security segmentation reduces your attack surface, hardens your data center, and enables your cloud security.
Enterprises need consistent, accurate, and automatically adaptive security policies to protect their scaled workloads.
How can enterprises best navigate the complex maze of laws, regulations, and policies that govern data protection and privacy?
DevOps practices are driving IT operations to improve cross-functional collaboration, release times, and quality—but how can they achieve this without sacrificing security?
As data breaches and attacks have become more common, businesses are using segmentation to improve security and control.
Businesses are spending millions of dollars to prevent malicious interception of data when sensitive data is exchanged on networks.
Find out how a top multinational bank secured containerized applications while maintaining the speed required for a competitive business edge.
Find out how a major SaaS provider securely future-proofed their technology stack and scaled automation to meet customer demands.
Find out how one of the world's largest resorts achieved their short-term project requirements and long-term operational needs for securing their PCI environment.
Find out how one of the country's largest medical groups prevented unauthorized access to personal health information (PHI) and ensured third-party hosted data was policy compliant.
Find out how a leading eCommerce retailer quickly met PCI DSS requirements to ringfence its payment infrastructure and achieve compliance.
Find out how a Global 250 bank addressed SWIFT compliance requirements with easy-to-deploy micro-segmentation that ensured consistent security across their SWIFT environments.
Find out how one of the world's largest SaaS players cut hardware costs by $10M+ and increased the security of two new data centers.
This infographic breaks down the top considerations and attributes to look for when choosing your micro-segmentation solution.
Visual summary of the key statistics and findings about the current computing landscape.
To really understand the security landscape we’re living in, we need to put it in the context of what’s been happening until now.
Enterprises are turning to Zero Trust as a common framework to ensure consistent security across environments. See how Illumio ASP maps to Forrester's Zero Trust framework.
This solution brief maps how Illumio ASP can help operators of essential services reduce cyber risk and achieve the outcomes specified by the NIS principles.
PCE Supercluster is designed for enterprise-scale, globally distributed environments. Learn how it allows organizations to manage security policies globally while enabling local PCEs to manage workloads and program enforcement points.
This solution brief provides a mapping of Illumio ASP to the SWIFT Customer Security Controls Framework and describes how Illumio is used and configured by customers as a critical component of the SWIFT security ecosystem.
Learn how real-time visibility and micro-segmentation are foundational to a successful M&A strategy, enabling speedy, seamless integration.
For the first time, vulnerability and threat data is integrated with application dependency maps to show potential attack paths in real time.
Read how Illumio ASP reduces cybersecurity risk by helping organizations optimize the Identify, Protect, Detect, and Respond Functions of the NIST Cybersecurity Framework (CSF).
Answers to frequently asked questions about Illumio ASP, its core components, and key services.
To protect your applications, you must understand them better than your adversaries. Illumio's real-time application dependency mapping service, Illumination, keeps you a step ahead of intruders.
Read how Illumio secures critical business applications and simplifies compliance with nano-segmentation℠.
Read how Illumio ASP makes it possible for you to isolate application environments with one simple, natural-language policy.
Illumio ASP lets organizations apply consistent security within the PCI DSS framework and easily maintain compliance with security policies that adapt to changes.
Learn how to gain traffic visibility and uniform security—across any type of infrastructure.
Secure hybrid deployments with natural-language policies that don’t depend on the network.
What do you get when you combine invisible infrastructure and adaptive security?
With Illumio, enterprises can prevent users from establishing connections to unauthorized applications, effectively stopping inside bad actors from compromising applications.
PivotNine reviews how Illumio ASP can easily manage the complexity and scale involved in securing east-west communication in today’s highly distributed, dynamic, and hybrid environments.
The analyst firm 451 Research offers its take on Illumio's approach to security, including a review of the company's technology, where Illumio fits within the security market, and a SWOT analysis.
Goldman Sachs calls Illumio Adaptive Security Platform an elegant segmentation solution for distributed networks.
SANS Institute report based on its survey of more than 430 IT professionals about their enterprises information security practices.
Learn more about Illumio ASP, its micro-segmentation services, and its benefits.
Why did Illumio re-invent segmentation with adaptive micro-segmentation? Find out in this quick summary of what we do – and how we do it.
This chart compares the capabilities of the Illumio Adaptive Security Platform (ASP) and VMware NSX.
If you’re considering using segmentation to improve your security, here are five features you should look for when evaluating solutions.
This chart compares the capabilities of the Illumio Adaptive Security Platform (ASP) and Cisco Tetration Analytics.
This guide compares how VMware NSX and Illumio ASP address security challenges with micro-segmentation.
How can IT and security professionals gain control over the security posture in their dynamic data centers?
Matt Glenn, Illumio VP of Product Management, discusses how Illumio ASP works, how it can limit the impact of a breach, and how to deploy micro-segmentation at scale.
With the advent of clouds, edge computing, and IoT, servers and data are no longer contained. How can you stay secure? Faraz Aladin, Illumio’s Head of Technical Product Marketing, discusses the challenges – and his answer might surprise you.
There is no truly risk-free environment as digital footprints expand. Vijay Chauhan, Sr. Director of Product Marketing for Illumio, explains how to identify your high-value assets, gets into visibility mapping, and shares three key ways to keep your environment safe.
In these conversations with a veteran Microsoft Windows Architect, you'll get a perspective on challenges he faced running and securing Microsoft environments, and how he shaped the Illumio ASP to "illuminate Windows" and make the lives of Microsoft Admins easier.
Illumio CTO PJ Kirner and CCO Alan Cohen deep dive into security segmentation and discuss why it's essential to protecting your data center and cloud.
Illumio Head of Cybersecurity Nathaniel Gleicher joins an Andreessen Horowitz guest panel to discuss the scope of "actual" cyber threats and how we're talking about them today.
Illumio’s Andrew Rubin is interviewed on the a16z podcast about the shift in how enterprises are running their applications and infrastructure—and what it means for security.
Illumio's Andrew Rubin joins KCBS's Morning Drive to discuss the need for a West Point for Cyber.
Illumio's Alan S. Cohen and Matthew Glenn riff on adaptive security, industry trends, and life itself.
What exactly are your crown jewel applications? And how can you best protect the crown jewel applications inside your data centers and cloud environments? Watch this video to find out.
Illumio Head of Cybersecurity Strategy Jonathan Reiber takes the stage at INK Conference 2018 to discuss the vulnerable nature of the data-driven world in which we live – and the steps that organizations can take to become secure beyond breach.
Illumio Sr. Director of Product Management Mukesh Gupta joined ISMG to discuss how micro-segmentation can be used to prevent the spread of breaches.
The Illumio App for Splunk is a set of prebuilt dashboards that enhance Illumio integration with Splunk by providing security and operational insights into Illumio-secured environments.
Illumio Head of Cybersecurity Strategy Nathaniel Gleicher discusses steps healthcare organizations can take to defend against cybersecurity challenges and achieve HITRUST compliance.
Illumio CTO and co-founder PJ Kirner caught up with ActualTech Media at VMworld 2017 for an update on the latest chapter in the Illumio story and adaptive micro-segmentation.
Illumio CCO Alan Cohen joined theCUBE at VMworld 2017 to talk micro-segmentation and the impending post-infrastructure world.
Illumio CTO PJ Kirner talks to ActualTech Media about the evolution of adaptive segmentation.
Discover the five requirements that you should look for when evaluating adaptive segmentation solutions.
Illumio CCO Alan Cohen talks to ActualTech Media about what makes Illumio’s adaptive segmentation technology unique.
Illumio CCO Alan Cohen joined theCUBE at the Nutanix .NEXT Conference 2017 to talk micro-segmentation, partnerships, and progress.
Illumio Head of Cybersecurity Strategy Nathaniel Gleicher examines how the Secret Service protects the President and how their approach can improve cybersecurity.
Illumio CEO and Co-founder Andrew Rubin speaks with WSJ about the new cybersecurity concerns facing organizations that have moved onto the cloud.
Illumio CCO Alan Cohen talks to the Open Network User Group (ONUG) team about segmentation as a strategy for securing the software defined era.
Illumio Head of Cybersecurity Nathaniel Gleicher joins a panel at the 2017 Global Cybersecurity Summit to discuss what artificial intelligence means to the enterprise and how it relates to cybersecurity.
Here are the four reasons why visibility is critical to successful adaptive segmentation.
Not all visibility is created equal – having the right visibility is critical for successful adaptive segmentation.
Learn about the components of the Illumio Adaptive Security Platform (ASP) architecture for adaptive segmentation.
Learn how the Policy Compute Engine (PCE) plays a central role in the Illumio Adaptive Security Platform (ASP) solution.
Learn about the Virtual Enforcement Node (VEN): what it is, how it works, and what role it plays in the Illumio ASP solution.
Discover how to easily encrypt data in motion to meet compliance requirements with Illumio SecureConnect.
Illumio CCO Alan Cohen joined John Furrier, co-host of theCUBE, to talk about Mobile World Congress 2017.
Learn about the key workflows you should have in place to ensure your adaptive segmentation project is successful.
Labels are important to adaptive segmentation. Learn why and how they work in the Illumio Adaptive Security Platform (ASP) solution.
Learn about why you need a multidimensional policy model for adaptive segmentation and the factors you should look for to ensure you pick the right one
Illumio CEO Andrew Rubin talks to NBC Bay Area about the need for a “West Point for Cyber.”
Gain insight into the changes that organizations are seeing as they move to a new security model with adaptive segmentation.
Illumio Adaptive Security Platform (ASP) makes security the enabler for computing, not the roadblock.
Illumio CEO Andrew Rubin walks IT Harvest's Richard Stiennon through how the Illumio Adaptive Security Platform works, and the importance of driving a major shift in the way we think about security.
Hear from the 2015 .NEXT Conference panel of innovators on how they are disrupting the legacy stack to simplify operations, lower TCO, and add new capabilities that increase performance and utilization.
Law firms must control sensitive client data, ensure systems are protected in case of a breach, and document regulatory compliance on demand. Micro-segmentation innovations can secure a firm's systems and allow them to confidently respond to audits.
Breaches are inevitable--are your high value assets adequately secured? Identify your own crown jewel assets, then discover why and how large enterprises are protecting their applications with micro-segmentation and learn the 5 key steps they use.
In under 15 minutes, see how Illumio ASP delivers live visualization of application traffic along with continuous, scalable, and dynamic policy and enforcement to every bare-metal server, virtual machine, and container across data centers and public clouds.
Learn how to reduce your data center and cloud attack surface to decrease exposure, limit an attacker's mobility, and minimize the impact of a breach by identifying and protecting your high-value assets and vulnerabilities.
Companies of all sizes are struggling to ensure their network is truly secure using aging firewall security systems. Micro-segmentation, when implemented correctly, offers the security needed and provides tremendous application visibility.
Everyone today is talking about micro-segmentation, but there’s relatively little discussion about what it is (and is not) and how to use it to effectively improve the security inside your data center and cloud. Until now.
See a hyperconverged infrastructure in action and find out how to simplify operations, reduce cost, and get uniform security within your data center and cloud environments.
Illumio and Nutanix, along with F5, Rubrik, and Workspot, show you how to expand your enterprise cloud capabilities with leading application delivery, security, data protection, and VDI solutions in this on-demand webinar.
This Request for Proposal template is comprised of common requirements and questions from buyers when selecting a solution for micro-segmentation. Use it to identify your solution criteria, clarify unknowns, and prioritize potential trade-offs.
Find out how a major healthcare service company employed a real-time map and segmentation to secure their data center assets after selling a part of their business and associated infrastructure to a foreign entity.
Find out how potential crisis turned to opportunity when security segmentation was decoupled from the network, enabling improved DevOps.
Many organizations who reported a breach in 2017 had passed their PCI audits prior to discovery. Don’t rely on outdated technology approaches – learn how to use threat models and Zero Trust security to make your PCI DSS program more effective.
Find out how a top SaaS company successfully integrated systems under board-level scrutiny, without compromising performance or security.
Find out how one of the world's largest talent agencies transformed their cloud security, gaining visibility and more granular security with centralized policy.
Find out how the bank segmented development and production environments without having to shift infrastructure or re-architect their network.
Find out how a leading bank implemented real-time visibility for safer, simpler, and more cost-effective security that follows workloads wherever they go.
Compliance regulations such as SWIFT and GDPR can be daunting. Vijay Chauhan shares his experiences as a financial services security practitioner and highlights how Illumio helps the world’s largest financial institutions solve regulatory challenges at scale.
Micro-segmentation is the simplest and most effective way to address healthcare cybersecurity compliance.
Adaptive security is increasingly becoming the go-to solution for security teams who want to go fast without sacrificing security. But is it right for your team?
Illumio Adaptive Security Platform for Federal
Take our self-assessment to calculate attack surface and benchmark your organization. Get a custom report of best practices to manage vulnerabilities and reduce your blast radius.
This white paper offers a high level understanding of Illumio ASP and its ability to help customers directly meet or support PCI DSS 3.2.1.
The Adaptive Security Platform now supports management and visibility of DNS-addressable services with adaptive segmentation policy that seamlessly follows the workload and automatically adjusts based on its domain name
Watch this webinar to learn how Illumio's Adaptive Security Platform can help you achieve Zero Trust security quickly and at a lower cost than traditional network security approaches.
Learn how Illumio ASP can help operators of Systemically Important Payment Systems (SIPS) reduce cyber risk and achieve the outcomes specified by the SIPS Guidance principles.
How can you do segmentation with a network flat? Watch this video to learn how decoupling enforcement from the network makes it possible.
Networks are designed to connect and security segmentation is designed to isolate. Is it possible to achieve both goals without breaking your network? See what happens when you decouple security from your network architecture.
Based on real-world scenarios and written by industry experts who have been in the trenches, this book is a practical guide that details how to implement a successful security segmentation strategy from start to finish. It's an essential read for all cybersecurity professionals, from security architects to IT infrastructure teams to CISOs.
This Solution Brief describes how Illumio ASP can help customers accurately scope and effectively segment their PCI environment to lower the cost of PCI DSS audits and prevent lateral movement attacks.
Find out how UK asset management firm Baillie Gifford gained cross-environment visibility and audit-ready reporting to build client confidence that data is securely locked down.
How can you apply Forrester's ZTX framework to your Zero trust journey? What's required to design and implement a Zero Trust architecture? How can you prepare your organization for Zero Trust? Forrester Principal Analyst and leading mind on Zero Trust, Chase Cunningham, joined Illumio CTO and co-founder PJ Kirner to answer these questions and more.
The EU's NIS Directive recommends OES measures to prevent and minimise breach impacts. Learn how Illumio's Adaptive Security Platform helps OES achieve those outcomes more quickly, safely, and cost-effectively than other segmentation options.
Illumio news. Be the first to know.
© 2019 Illumio 920 De Guigne Drive, Sunnyvale, CA 94085