Illumio's breakthrough technology offers three core services that enable you to prevent the spread of breaches inside and across your data center and cloud environments.

Enforce Micro-Segmentation

ENFORCE MICRO-SEGMENTATION 

The Adaptive Security Platform® (ASP) is designed to apply the exact level of enforcement needed for any environment, application, and workload by providing a range of segmentation options enforced at each protected workload.

 

With Illumio, you can separate large environments like production and development with a single rule, micro-segment a specific high-value application, define granular policy for control down to the process level, and even encrypt traffic between workloads and environments with a single policy.

 

Adaptive Micro-Segmentation Policies for High-Value Applications

ILLUMIO MICRO-SEGMENTATION ALLOWS YOU TO:

  • Visualize how workloads communicate with one another.
  • Secure and control application traffic with adaptive micro-segmentation at every workload, in the network, or through cloud security controls.
  • Use micro-segmentation as a compensating control for applications and workloads with software vulnerabilities that cannot be patched.
  • Ensure consistent and continuous segmentation that automatically adapts to changes (e.g., movement of workloads) and spans any data center, public cloud, and hybrid cloud.
  • Enable AES-256 IPsec encryption for data in motion between a mix of Windows/Linux workloads or Windows/Linux workloads and VPN concentrators with a single click and without additional hardware or custom software.

     

ILLUMIO MICRO-SEGMENTATION ALLOWS YOU TO:

  • Visualize how workloads communicate with one another.
  • Secure and control application traffic with adaptive micro-segmentation at every workload, in the network, or through cloud security controls.
  • Use micro-segmentation as a compensating control for applications and workloads with software vulnerabilities that cannot be patched.
  • Ensure consistent and continuous segmentation that automatically adapts to changes (e.g., movement of workloads) and spans any data center, public cloud, and hybrid cloud.
  • Enable AES-256 IPsec encryption for data in motion between a mix of Windows/Linux workloads or Windows/Linux workloads and VPN concentrators with a single click and without additional hardware or custom software.

     

Gain Live Visibility

VIEW APPLICATION DEPENDENCY AND VULNERABILITY MAPS

Illumination® provides live insights across environments to help you visualize application dependencies, view how exposed vulnerabilities can be exploited, and automatically recommend policies to reduce the exposure of those vulnerabilities.

 

In addition to being an important cybersecurity tool, Illumination is a tightly integrated component of the Illumio ASP workflow used to:

  • Discover how applications are connected and communicating.
  • View potentially vulnerable workloads and connections.
  • Build better, more efficient policies without breaking applications.
  • Confirm enforcement of policy and pinpoint policy violations.
  • Save critical time, accelerate security workflows, and reduce the risk of errors.

WHO USES ILLUMINATION?

CISOs, security, operations, and application teams use Illumination to get real-time visibility, regain control, and maintain compliance of application environments.

With Illumination, you will:

  • Eliminate blind spots inside and across your data center and cloud environments with a comprehensive view of application traffic.
  • Gain granular visibility into workload relationships with details down to the flow and service level.
  • Understand application dependencies on common services (e.g., Active Directory, Exchange, database platforms).
  • See the vulnerable paths that a bad actor can exploit across your environments.
  • Create optimal micro-segmentation policies in minutes with Policy Generator's automated policy recommendations.
  • Model security policy and receive visual feedback in real time to eliminate risk of breaking applications with new policies.
  • Use Explorer to ask questions about network traffic and quickly find hidden security risks.
  • Pinpoint unauthorized communications and stop them immediately with the ability to quickly quarantine workloads.

With Illumination, you will:

  • Eliminate blind spots inside and across your data center and cloud environments with a comprehensive view of application traffic.
  • Gain granular visibility into workload relationships with details down to the flow and service level.
  • Understand application dependencies on common services (e.g., Active Directory, Exchange, database platforms).
  • See the vulnerable paths that a bad actor can exploit across your environments.
  • Create optimal micro-segmentation policies in minutes with Policy Generator's automated policy recommendations.
  • Model security policy and receive visual feedback in real time to eliminate risk of breaking applications with new policies.
  • Use Explorer to ask questions about network traffic and quickly find hidden security risks.
  • Pinpoint unauthorized communications and stop them immediately with the ability to quickly quarantine workloads.
Secure Connect

ENCRYPT DATA IN MOTION

Illumio SecureConnect and SecureConnect Gateway provide on-demand, policy-based encryption of data in motion without the headaches of manual configuration or expensive, complex hardware solutions. Illumio ASP activates, programs, and configures the existing native IPsec capabilities in all of your workloads.


With one click of a button in the Illumio management console, easily establish IPsec tunnels between any mix of Linux/Windows workloads or Linux/Windows workloads and VPN concentrators wherever they are running in private data centers, public clouds, and hybrid cloud environments.

Encrypt Data-in-Motion with SecureConnect

ILLUMIO SECURECONNECT ENABLES YOU TO:

  • Instantly encrypt data in motion between workloads running in private data centers, public clouds, and hybrid cloud environments.
  • Eliminate complex, manual IPsec configurations.
  • Protect data in motion without additional hardware or modifying applications.
  • Meet regulatory compliance for encrypting data in motion (e.g., PCI and HIPAA) with one-click encryption.

     

ILLUMIO SECURECONNECT GATEWAY ENABLES YOU TO:

  • Establish secure connectivity for hybrid cloud deployments with workloads running in private data centers, public clouds, and hybrid cloud environments.
  • Encrypt data in motion between Windows and Linux workloads and VPN appliances.
  • Eliminate the need for complicated key management and dedicated site-to-site VPN configurations.
  • Simplify VPN architectures by eliminating traffic steering through chokepoints, performance hits to throughput, or high availability challenges for mission-critical operations.

ILLUMIO SECURECONNECT ENABLES YOU TO:

  • Instantly encrypt data in motion between workloads running in private data centers, public clouds, and hybrid cloud environments.
  • Eliminate complex, manual IPsec configurations.
  • Protect data in motion without additional hardware or modifying applications.
  • Meet regulatory compliance for encrypting data in motion (e.g., PCI and HIPAA) with one-click encryption.

     

ILLUMIO SECURECONNECT GATEWAY ENABLES YOU TO:

  • Establish secure connectivity for hybrid cloud deployments with workloads running in private data centers, public clouds, and hybrid cloud environments.
  • Encrypt data in motion between Windows and Linux workloads and VPN appliances.
  • Eliminate the need for complicated key management and dedicated site-to-site VPN configurations.
  • Simplify VPN architectures by eliminating traffic steering through chokepoints, performance hits to throughput, or high availability challenges for mission-critical operations.