Illumio enables organizations to realize a future without high-profile breaches by providing visibility, segmentation, and control of all network communications across any data center or cloud.

Founded in 2013, the world’s largest enterprises, including Morgan Stanley, BNP Paribas, Salesforce, and Oracle NetSuite, trust Illumio to reduce cyber risk.

Learn more at https://www.illumio.com/what-we-do.

Federal Certifications
 

Illumio Common Criteria Certified
Common-Criteria-Certified.png
 
Illumio FIPS Certified
FIPS.png
Illumio AICPA SOC Certificate
 


Illumio Section 508 Certified
logo-gsa-sec508-299x70.png

A Leader in Zero Trust

Forrester Wave Leader 2019Illumio was founded on the principle of Zero Trust and dubbed the top current offering for Zero Trust in The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019, receiving the highest scores in:

  • Workload security
  • Visibility and analytics
  • Automation and orchestration
  • Manageability and usability
  • APIs
  • Vision and strategy
  • Advocacy

Beyond the Hype: Conversations on Mobilizing Zero Trust - featuring Chase Cunningham, Forrester principal analyst serving security & risk professionals, and PJ Kirner, Illumio CTO and co-founder

Adaptive Security Platform (ASP)

Illumio ASP is uniquely designed to enable you to use the enforcement points that already exist in your infrastructure to improve your data center and cloud security. No additional hardware or re-architecting your network.

 

Illumio ASP Architecture

Illumio ASP Architecture
Illumio_ASP_Architecture.png

 

The Virtual Enforcement Node (VEN) is a lightweight agent that sends and receives information, programs pre-existing enforcement points, and detects policy violations.

 
The Policy Compute Engine (PCE), the "brain" of the Adaptive Security Platform, creates an application dependency map and converts natural language policies into optimal stateful firewall rules for all workloads.

Features

Illumination graphic

Illumination
A real-time application dependency map that shows you how apps are communicating.
 

Policy Generator Graphic

Policy Generator
Create optimal segmentation policies in minutes.
 
 
 

Illumio magnifying glass

Explorer
Search and analyze historical records of traffic between workloads.
 
 

Secure Connect graphic

SecureConnect
Protect data in transit and execute workload-to-workload encryption.
 

Vulnerability Graphic

Vulnerability Maps
See which applications are connecting to vulnerable ports in real time.
 

Segmentation templates graphic

Segmentation Templates
Instantly secure critical off-the-shelf applications with tried-and-tested templates.
 

Contract Name Contract Number Sector State
CIO-CS HHSN316201500012W Federal
GSA Multiple Award Schedules GS-35F-267DA Federal, State
SEWP V Group A: NNG15SC07B; Group D: NNG15SC98B Federal
State of California Multiple Award Schedule (CMAS) 3-16-70-1047B State California
State of Maryland Multi-Vendor COTS IDIQ 06B02490021 State Maryland
State of New Mexico Multi-Vendor IDIQ 60-000-16-00075 State New Mexico

VPN Can Hurt While Helping

Illumio: VPN Can Hurt While Helping. Remote servers accessing Federal Data Centers

An infected work device that VPNs in from home can permit malware down the pipe and into the network, allowing viruses and malicious actors to traverse an organization and gain access to everything from legitimate workloads to high value assets. Read this blog post to learn more. 

Maintain Your Cybersecurity Posture in Remote Work Environments With Illumio:

Adaptive User Segmentation 
If you have a VDI infrastructure, Adaptive User Segmentation (AUS) takes advantage of Microsoft Active Directory (AD) User Groups to control access to computing resources in your organization. You can write rules with these groups to control outbound access on specific workloads based on the user's group membership. Learn more about AUS here

Quickly Reduce the Attack Surface of Your Flat Network
If your network is flat, you need a quick and streamlined approach to identify, discover and ringfence your high-value assets (HVAs), so that you can reduce your attack surface during a transition to a remote work environment. Illumio's host-based micro-segmentation architecture allows you to accelerate your time-to-value while avoiding the cost, risk, complexity and lengthy deployments associated with software-defined networking  (SDN)/networking and data center firewalls.

Extend Visibility and Control into Remote Machines

  • Illumio's real-time application dependency map (Illumination) lets you visualize the authorized remote machines that have legitimate connections to data center applications. 
  • Create unmanaged workloads to whitelist the trusted IP addresses of machines that you want to allow into the data center and to connect to HVAs. To mitigate risks from IP-spoofing, AdminConnect uses PKI certificates to authenticate the identity of an authorized machine before it can connect to a data center application. 
  • The combination of unmanaged workloads with AdminConnect ensures only legitimate remote connections to your HVAs. 

Check out our Webinar: How Security Segmentation Helps Remote Workers Stay Secure and Productive