Illumio ASP delivers two core services that provide an industry breakthrough in protecting applications inside and across your data center and cloud environments.

Enforce Adaptive Segmentation

ENFORCE ADAPTIVE SEGMENTATION 

Illumio adaptive segmentation is designed to apply the exact level of protection needed to the environment, application, or workload by providing a range of segmentation granularity options applied in the workload, network, or through cloud security controls.

 

With Illumio, you can segment large environments like production and development with a single rule, micro-segment a specific critical high-value application, define granular policy for control down to the process level, and even encrypt traffic between workloads and environments with a single-click policy.

 

Enforcement

Illumio Enforcement allows you to:

  • Secure and control application traffic with adaptive segmentation at every workload, in the network, or through cloud security controls.
  • Ensure consistent and continuous protection that automatically adapts to changes (movement of workloads or new capacity across application environments).
  • Enable AES-256 IPsec encryption for data in motion between a mix of Windows and Linux workloads with a single click and without additional hardware or custom software.

Illumio Enforcement allows you to:

  • Secure and control application traffic with adaptive segmentation at every workload, in the network, or through cloud security controls.
  • Ensure consistent and continuous protection that automatically adapts to changes (movement of workloads or new capacity across application environments).
  • Enable AES-256 IPsec encryption for data in motion between a mix of Windows and Linux workloads with a single click and without additional hardware or custom software.
Gain Live Visibility

GAIN LIVE VISIBILITY

Illumination provides a live application dependency map across your environments showing workloads, applications, and traffic flows so you can see how applications communicate and identify violations quickly.

 

In addition to being an important cybersecurity tool, Illumination is a tightly integrated component of the Illumio ASP workflow used to:

  • Discover applications in both brownfield and greenfield environments.
  • Build better, more efficient policies without breaking applications.
  • Confirm enforcement of policy.

WHO USES ILLUMINATION?

CISOs, security, operations, and application teams use Illumination to get real-time visibility, regain control, and maintain compliance of application environments.

Illumination

With Illumination, you will:

  • Eliminate blind spots inside and across your data center and cloud environments with a comprehensive view of application traffic.
  • Gain understanding of application behavior and dependencies on common services (e.g., Active Directory, Exchange, database platforms).
  • Gain granular visibility into workload relationships with details down to the flow and service level.
  • Model security policy and receive visual feedback in real time to eliminate risk of breaking applications with new policies.
  • Pinpoint unauthorized communications and stop them immediately with the ability to quickly quarantine workloads.

With Illumination, you will:

  • Eliminate blind spots inside and across your data center and cloud environments with a comprehensive view of application traffic.
  • Gain understanding of application behavior and dependencies on common services (e.g., Active Directory, Exchange, database platforms).
  • Gain granular visibility into workload relationships with details down to the flow and service level.
  • Model security policy and receive visual feedback in real time to eliminate risk of breaking applications with new policies.
  • Pinpoint unauthorized communications and stop them immediately with the ability to quickly quarantine workloads.