Illumio's breakthrough technology offers three core services that enable you to protect applications inside and across your data center and cloud environments.

Enforce Adaptive Segmentation

ENFORCE ADAPTIVE SEGMENTATION 

Illumio adaptive segmentation is designed to apply the exact level of protection needed to the environment, application, or workload by providing a range of segmentation granularity options applied in the workload, network, or through cloud security controls.

 

With Illumio, you can segment large environments like production and development with a single rule, micro-segment a specific critical high-value application and even define granular policy for control down to the process level, all without changes to applications or the network.

 

Enforcement

Illumio Enforcement allows you to:

  • Secure and control application traffic with adaptive segmentation at every workload, in the network, or through cloud security controls.
  • Ensure consistent and continuous protection that automatically adapts to changes (movement of workloads or new capacity across application environments).
  • Eliminate complex application or network changes and avoid potential delays, errors, and outages.

     

Illumio Enforcement allows you to:

  • Secure and control application traffic with adaptive segmentation at every workload, in the network, or through cloud security controls.
  • Ensure consistent and continuous protection that automatically adapts to changes (movement of workloads or new capacity across application environments).
  • Eliminate complex application or network changes and avoid potential delays, errors, and outages.

     

Gain Live Visibility

GAIN LIVE VISIBILITY

Illumination provides live insights across your environments to help you visualize application dependencies, automatically recommend optimized policies, and sort through complex application environments to find hidden risk faster.

 

In addition to being an important cybersecurity tool, Illumination is a tightly integrated component of the Illumio ASP workflow used to:

  • Discover applications in both brownfield and greenfield environments.
  • Build better, more efficient policies without breaking applications.
  • Confirm enforcement of policy and pinpoint policy violations.

WHO USES ILLUMINATION?

CISOs, security, operations, and application teams use Illumination to get real-time visibility, regain control, and maintain compliance of application environments.

Illumination

With Illumination, you will:

  • Eliminate blind spots inside and across your data center and cloud environments with a comprehensive view of application traffic.
  • Gain understanding of application behavior and dependencies on common services (e.g., Active Directory, Exchange, database platforms).
  • Gain granular visibility into workload relationships with details down to the flow and service level.
  • Find and secure hidden risks faster using Explorer to sort through complex application environments, understand workload relationships, and drill down into traffic and policy details. 
  • Create optimal micro-segmentation policies in minutes with Policy Generator's automated policy recommendations to save critical time, accelerate security workflows, and reduce the risk of human errors. 
  • Model security policy and receive visual feedback in real time to eliminate risk of breaking applications with new policies.
  • Pinpoint unauthorized communications and stop them immediately with the ability to quickly quarantine workloads.

With Illumination, you will:

  • Eliminate blind spots inside and across your data center and cloud environments with a comprehensive view of application traffic.
  • Gain understanding of application behavior and dependencies on common services (e.g., Active Directory, Exchange, database platforms).
  • Gain granular visibility into workload relationships with details down to the flow and service level.
  • Find and secure hidden risks faster using Explorer to sort through complex application environments, understand workload relationships, and drill down into traffic and policy details. 
  • Create optimal micro-segmentation policies in minutes with Policy Generator's automated policy recommendations to save critical time, accelerate security workflows, and reduce the risk of human errors. 
  • Model security policy and receive visual feedback in real time to eliminate risk of breaking applications with new policies.
  • Pinpoint unauthorized communications and stop them immediately with the ability to quickly quarantine workloads.

Auto-generate optimal security policies for your complex data center with Policy Generator

Ask questions about network traffic and quickly find hidden security risks with Explorer

Secure Connect

Encrypt Data in Motion

Illumio SecureConnect and SecureConnect Gateway provide on-demand, policy-based encryption of data in motion between any mix of Linux/Windows workloads or Linux/Windows workloads and VPN gateways without the headaches of manual configuration or expensive, complex hardware solutions.


With one click of a button in the Illumio management console, IPsec tunnels between any two workloads or a workload and a VPN gateway can be easily instantiated wherever they are running in private data centers, public cloud or hybrid environments.

ILLUMIO SECURECONNECT AND SECURECONNECT GATEWAY ENABLE YOU TO:

  • Instantly encrypt data in motion between any mix of Linux/Windows workloads or Linux/Windows workloads and VPN gateways running in private data centers, cloud or hybrid environments.
  • Eliminate complex, manual configuration of IPsec connections.
  • Protect data in motion with private data centers, cloud or hybrid environments without additional hardware or modifying applications.
  • Meet regulatory compliance (e.g., PCI, SOX, HIPAA) with policy-based encryption.

ILLUMIO SECURECONNECT AND SECURECONNECT GATEWAY ENABLE YOU TO:

  • Instantly encrypt data in motion between any mix of Linux/Windows workloads or Linux/Windows workloads and VPN gateways running in private data centers, cloud or hybrid environments.
  • Eliminate complex, manual configuration of IPsec connections.
  • Protect data in motion with private data centers, cloud or hybrid environments without additional hardware or modifying applications.
  • Meet regulatory compliance (e.g., PCI, SOX, HIPAA) with policy-based encryption.