Zero Trust Security

Ensure device integration, visualize application dependencies, and secure microperimeters for compliance and to prevent the lateral movement of bad actors inside data centers and cloud environments.


Organizations today increasingly conclude that focusing on perimeter defenses does not solve the breach problem. Adversaries are always one step ahead. Both NIST and MITRE ATT&CK frame the discussion by assuming that malicious actors are already inside your network or will be in the near future. This mindset shifts the conversation from detection and prevention to containment and remediation. With this approach, organizations are making it more difficult or impossible for bad actors to traverse the internal network and reach high value assets.


Organizations are adopting a Zero Trust strategy as a way to approach the problem of building and securing their infrastructure. In order to implement Zero Trust security, organizations must first determine how transactions flow across the entire business ecosystem and how users and other systems access applications, services, and data. They use this information to create microperimeters around applications, workloads, and their dependencies; apply granular segmentation and communications policies; and continuously monitor and visualize any suspicious behavior or anomaly.

The Illumio Adaptive Security Platform® (ASP) delivers micro-segmentation as basic hygiene for Zero Trust security and enables organizations to:


Design and monitor the security of microperimeters in real time

  • Gain visibility into the connections and relationships across your networks, workloads, and applications.
  • Ensure CMDB accuracy using Illumination application dependency maps.
  • Turn every host in your data center and public cloud into a point of visibility and a sensor that detects unauthorized connection attempts and policy deviations.
  • Design the optimal micro-segmentation strategy for Zero Trust security.
  • Visualize and test policies before enforcement without breaking applications.

Enforce security of microperimeters in real time

  • Use application dependency maps and contextual information to apply segmentation rules across heterogeneous compute platforms (bare-metal, VMs, containers).
  • Program the optimal firewall rules of each host using native stateful enforcement.
  • Encrypt data in transit without having to make any changes or upgrades to your existing network infrastructure across data centers and public clouds using SecureConnect.
  • Integrate with third-party security tools to automate and orchestrate your security processes.

Use vulnerability maps for patching strategy and as compensating controls

  • Overlay third-party vulnerability scan data on top of application dependency maps to identify an attackers’ potential attack pathways.
  • Prioritize patching strategy and adjust micro-segmentation policies.
  • Use micro-segmentation as a compensating control without breaking applications.


Learn more:

How to Build a Micro-Segmentation Strategy

How to Build a


Use this guide to create a rock-solid micro-segmentation strategy in only five steps.

Get the guide »