Quick navigation

Illumio

Illumio Adaptive Security Platform

Stops lateral movement in your data center and cloud environment, see how applications communicate, get vulnerability exposure insights, take control.
Value Proposition

Problem

Organizations are under constant pressure to remain agile. BENEFITS While your data centers evolve and extend into public clouds, containers, and new types of compute resources, you need to ensure that your organization remains compliant with regulations and meets industry security standards. At the same time, security frameworks like NIST and MITRE ATT&CK™ recommend that it is sound security practice to assume your perimeter defenses will be breached and to take appropriate actions to limit the movement of bad actors inside your data center and cloud environments. To address these frameworks while still remaining agile, many organizations are adopting Zero Trust security to reduce attack surfaces and mitigate exposure from different types of attacks.

Solution

Illumio ASP delivers real-time application dependency mapping and micro-segmentation to prevent the lateral movement of bad actors inside your data center and cloud environments. It provides real-time visibility into the connectivity between workloads across heterogeneous compute environments, generates optimal micro-segmentation policies based on how workloads communicate, and programs the native stateful enforcement points in each host to enforce applicable firewall rules. Illumio ASP is unique because its architecture enables you to use the sensors and enforcement points that are natively available in your compute environment, eliminating the overhead of having to re-architect your network and deploy more networking/SDN and data center firewalls to secure your micro-perimeters. Illumio ASP delivers visibility and enables micro-segmentation for Zero Trust security at any scale. Since policy creation does not require deep familiarity with networking terminologies, you can empower different teams within your organization to create micro-segmentation policies, but retain governance over what gets provisioned.

Features

  • Enables Zero Trust security via micro-segmentation to suit your data center design, size, and complexity, and works across heterogeneous compute environments at any scale
  • Gives you real-time visibility of application behavior and connections and leverages this to drive your micro-segmentation strategy.
  • Uses the enforcement points in your existing infrastructure investments, saving you management and cost overheads associated with re-architecting.
  • Enhances your patching strategy and vulnerability management programs by helping you visualize and identify the potential pathways attackers could exploit and use micro-segmentation as a compensating control.
  • Enables you to gain real-time global visibility and maintain a single control plane for managing micro-segmentation policies at a global scale while supporting high availability and disaster recovery objectives.
Downloads

Video(s)