Overview

Product video
Illumio Breach Containment Platform provides comprehensive mapping of traffic telemetry across hybrid multi-cloud environments and endpoints for applications, data, and cloud workloads. This visualization allows security teams to uncover unnecessary connectivity that increases risk. With the Illumio Breach Containment Platform, you can easily know if you are at risk of an attack or currently under attack. Detailed context-based label descriptions of objects guides teams as they create policies, based on applications' components and relationships. With Illumio, teams can make faster, more informed decisions about what traffic to segment to proactively maintain a strong security posture or reactively isolate a breach.
Illumio Breach Containment Platform is made up of these solutions:
Illumio Insights for visibility and incident response. Quickly identify risk, detect attacks, and contain threats with a single click. Empower security teams to protect critical assets and respond instantly.
Illumio Segmentation for cloud and on-premises data center workloads. Limit an attacker's ability to travel across lateral traffic with proactive policy controls that limit the exposure of valuable assets
Highlights
- See risk Visualize all communication and traffic between workloads and devices across the entire hybrid attack surface. Gain visibility with real-time telemetry and data, understand application communications, security policy, usage, access and security exposure with a comprehensive map of traffic flows.
- Set policy Comprehensive monitoring and simplified labeling that helps eliminate blind spots by automatically setting granular and flexible segmentation policies that control communication between workloads and devices to only allow what is necessary and wanted.
- Stop the spread Proactively isolate high-value assets or reactively isolate compromised systems during an active attack to stop the spread of a breach by programming dynamic workload policies for hybrid multi-cloud networks and endpoints, and applying automated policy recommendations.
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Description | Cost/12 months |
---|---|---|
Illumio Breach Containment Platform | Price per 250 secured workloads + Breach Containment Platform | $109,000.00 |
100 CloudSecure Workloads | Price per 100 public cloud workloads | $38,400.00 |
Vendor refund policy
All fees are non-cancellable and non-refundable.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
Illumio provides customers with 24/7 support by phone, email, and through our support portal. +1 888 631 6354, support@illumio.com ,
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Visual traffic interface aids in network micro-segmentation while a streamlined update option enhances process efficiency
What is our primary use case?
We are using Illumio for network micro-segmentation to ensure that all applications comply with Dora compliance. This is an essential part of our infrastructure to ensure security and proper network segmentation.
What is most valuable?
The strongest aspect of Illumio is the visual traffic interface, which allows us to see all traffic that communicates with our servers and allied companies. We can write rules that can be embedded into the IP table, making it easy to handle.Â
Illumio enables us to see network flows, traffic sources, and destinations. The policy generation and enforcement capabilities are valuable, allowing for selective enforcement. Illumio helps in audit purposes by saving data and showing blocked traffic, ensuring no outside traffic is allowed.
What needs improvement?
There should be an option to upgrade from the console to the latest version instead of performing manual upgrades. This would be more helpful to streamline processes.
For how long have I used the solution?
I have been using Illumio for more than four years.
What do I think about the stability of the solution?
Illumio is a stable solution with no glitches or bugs reported, making it a reliable product for us.
What do I think about the scalability of the solution?
Currently, we are working with an on-premises setup however, we plan to scale to cloud with Illumio's new product offerings.
How are customer service and support?
Customer support is excellent. Even if we raise an issue on non-working days like Saturdays or Sundays, we receive prompt responses.
How would you rate customer service and support?
Positive
How was the initial setup?
The installation process is straightforward and does not require much time, however, finding server owners and explaining the process takes more time.
What about the implementation team?
We have professional support from Illumio and guidance for troubleshooting or implementation needs.
What was our ROI?
I cannot provide detailed information on ROI as it is handled by upper management. However, Illumio is known to be the cheapest solution among the security solutions we evaluated.
What's my experience with pricing, setup cost, and licensing?
I do not have specific knowledge about pricing details as it is handled by upper management. I know that Illumio is the cheapest solution in the security area.
What other advice do I have?
For the overall product, I would rate Illumio eight out of ten points.Â
My advice is to consider Illumio as a strong option for visual traffic interface and network micro-segmentation needs.
Gathers critical insights with valuable dependency mapping
What is our primary use case?
We were sales partners with Illumio , so we didn't implement Illumio on our infrastructure. Rather, we sold Illumio.
What is most valuable?
The dependency map is most valuable aspect.
What needs improvement?
I need some further comparisons to point out the weaknesses. That's why I'm looking for comparisons with other products.
For how long have I used the solution?
I have not had the chance to experiment deeply with it.
How are customer service and support?
From my experience, they are very responsive.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Illumio was my first micro-segmentation partner.
Which other solutions did I evaluate?
I am trying to do some technical evaluations between Gandicore and other vendors, yet not any other vendors are being considered.
What other advice do I have?
I would recommend Illumio to all sizes of companies. Even though the whole micro-segmentation movement is pretty new in my region, I would rate Illumio about eight out of ten.
Offers real-time application dependency mapping that is useful
What is our primary use case?
I use the solution in my company to protect our environment and servers.
How has it helped my organization?
Illumio is the first new solution in our company's environment, but we need time to see the improvements from its use in our company. For three years, the tool was used by a different customer of our company, but recently, a new customer has been using it, and we have started to see improvements in their environment from the use of the product.
What is most valuable?
The most valuable features of the solution are the maps and the security build it offers. The tool helps with my company's security posture.
What needs improvement?
The log collection part needs improvement, and the tool should offer more details about the logs. We need more details on areas where there is an error or a traffic blockage. I would like the tool to offer a more detailed view.
For how long have I used the solution?
I have been using Illumio for three years. I am a customer of Illumio.
How was the initial setup?
The product's initial setup phase is not difficult. We are using a cloud version of the tool. Picking up the PC for the setup was difficult because Illumio's service provider took care of it. In our company, we only installed the tool on our devices, so it wasn't much of a difficult process. On a scale of one to ten, one is difficult, and ten is easy, I rate the setup phase as nine.
I didn't deploy Illumio. My company uses the cloud version of the tool. I created my account and paired my device, which was all that was required.
What other advice do I have?
Illumio's real-time application dependency mapping has impacted our company's security operations, and it is very useful because, as I said, it has helped us build our security policy.
The number of people required for the deployment of the tool depends on the environment where it is used. For me, only one or two people are required to maintain the tool. Only if the issue is important will we need Illumio's support.
I rate the tool an eight out of ten.
Pprevents attackers or threats from spreading or moving laterally
What is our primary use case?
The use cases were centered on microservices within the context of BNP Paribas. This was primarily due to the adoption of microservices and the hybrid cloud environment. The goal was to establish precise control over external network connections.
What is most valuable?
The feature that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging policies, which can be complex to devise. It's a matter that requires careful consideration and stakeholder involvement before implementing such policies.   Â
What needs improvement?
Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial.
For how long have I used the solution?
I have been using the solution for the past two years.
What do I think about the stability of the solution?
I have not worked with the solution directly, so I can’t comment on this aspect.
What do I think about the scalability of the solution?
It scales effectively. To the best of my knowledge, we did not face any problems, despite having a large installation base. We did not encounter issues while expanding the project.
How was the initial setup?
The deployment itself was quite straightforward. It took at least one year.
What other advice do I have?
I would recommend this solution and rate it 9 out of 10.Â
An easy to use solution that does basic layer four firewall filtering
What is most valuable?
The solution is easy to use.Â
What needs improvement?
The solution is very basic and doesn't do anything other than the orchestration of layer four endpoint firewall rules.
For how long have I used the solution?
I have been working with the product for three years.Â
What do I think about the stability of the solution?
I have no issues with the tool's stability.Â
What do I think about the scalability of the solution?
I would rate Illumio Zero Trust Segmentation's scalability a seven out of ten.Â
How are customer service and support?
I haven't contacted the tool's technical support team.Â
How was the initial setup?
I would rate Illumio Zero Trust Segmentation's setup a six out of ten. The tool's deployment took two weeks to complete. We relied on two people to help us with the deployment.Â
What other advice do I have?
I would rate the product a six out of ten since it's not an end-to-end solution.Â