Illumio's breakthrough technology offers three core services that enable you to protect applications inside and across your data center and cloud environments.

Enforce Adaptive Segmentation

ENFORCE ADAPTIVE SEGMENTATION 

Illumio adaptive segmentation is designed to apply the exact level of protection needed to the environment, application, or workload by providing a range of segmentation granularity options applied in the workload, network, or through cloud security controls.

 

With Illumio, you can segment large environments like production and development with a single rule, micro-segment a specific critical high-value application and even define granular policy for control down to the process level, all without changes to applications or the network.

 

Enforcement

Illumio Enforcement allows you to:

  • Secure and control application traffic with adaptive segmentation at every workload, in the network, or through cloud security controls.
  • Ensure consistent and continuous protection that automatically adapts to changes (movement of workloads or new capacity across application environments).
  • Eliminate complex application or network changes and avoid potential delays, errors, and outages.

     

Illumio Enforcement allows you to:

  • Secure and control application traffic with adaptive segmentation at every workload, in the network, or through cloud security controls.
  • Ensure consistent and continuous protection that automatically adapts to changes (movement of workloads or new capacity across application environments).
  • Eliminate complex application or network changes and avoid potential delays, errors, and outages.

     

Gain Live Visibility

GAIN LIVE VISIBILITY

Illumination provides a live application dependency map across your environments showing workloads, applications, and traffic flows so you can see how applications communicate and identify violations quickly.

 

In addition to being an important cybersecurity tool, Illumination is a tightly integrated component of the Illumio ASP workflow used to:

  • Discover applications in both brownfield and greenfield environments.
  • Build better, more efficient policies without breaking applications.
  • Confirm enforcement of policy.

WHO USES ILLUMINATION?

CISOs, security, operations, and application teams use Illumination to get real-time visibility, regain control, and maintain compliance of application environments.

Illumination

With Illumination, you will:

  • Eliminate blind spots inside and across your data center and cloud environments with a comprehensive view of application traffic.
  • Gain understanding of application behavior and dependencies on common services (e.g., Active Directory, Exchange, database platforms).
  • Gain granular visibility into workload relationships with details down to the flow and service level.
  • Model security policy and receive visual feedback in real time to eliminate risk of breaking applications with new policies.
  • Pinpoint unauthorized communications and stop them immediately with the ability to quickly quarantine workloads.

With Illumination, you will:

  • Eliminate blind spots inside and across your data center and cloud environments with a comprehensive view of application traffic.
  • Gain understanding of application behavior and dependencies on common services (e.g., Active Directory, Exchange, database platforms).
  • Gain granular visibility into workload relationships with details down to the flow and service level.
  • Model security policy and receive visual feedback in real time to eliminate risk of breaking applications with new policies.
  • Pinpoint unauthorized communications and stop them immediately with the ability to quickly quarantine workloads.
SecureConnect

Encrypt Data In Motion

Illumio SecureConnect and SecureConnect Gateway provide on-demand, policy-based encryption of data in motion between any mix of Linux/Windows workloads or Linux/Windows workloads and VPN gateways without the headaches of manual configuration or expensive, complex hardware solutions.


With one click of a button in the Illumio management console, IPsec tunnels between any two workloads or a workload and a VPN gateway can be easily instantiated wherever they are running in private data centers, public cloud or hybrid environments.

ILLUMIO SECURECONNECT AND SECURECONNECT GATEWAY ENABLE YOU TO:

  • Instantly encrypt data in motion between any mix of Linux/Windows workloads or Linux/Windows workloads and VPN gateways running in private data centers, cloud or hybrid environments.
  • Eliminate complex, manual configuration of IPsec connections.
  • Protect data in motion with private data centers, cloud or hybrid environments without additional hardware or modifying applications.
  • Meet regulatory compliance (e.g., PCI, SOX, HIPAA) with policy-based encryption.

ILLUMIO SECURECONNECT AND SECURECONNECT GATEWAY ENABLE YOU TO:

  • Instantly encrypt data in motion between any mix of Linux/Windows workloads or Linux/Windows workloads and VPN gateways running in private data centers, cloud or hybrid environments.
  • Eliminate complex, manual configuration of IPsec connections.
  • Protect data in motion with private data centers, cloud or hybrid environments without additional hardware or modifying applications.
  • Meet regulatory compliance (e.g., PCI, SOX, HIPAA) with policy-based encryption.

ILLUMIO SECURECONNECT AND SECURECONNECT GATEWAY ENABLE YOU TO:

  • Instantly encrypt data in motion between any mix of Linux/Windows workloads or Linux/Windows workloads and VPN gateways running in private data centers, cloud or hybrid environments.
  • Eliminate complex, manual configuration of IPsec connections.
  • Protect data in motion with private data centers, cloud or hybrid environments without additional hardware or modifying applications.
  • Meet regulatory compliance (e.g., PCI, SOX, HIPAA) with policy-based encryption.