Listing Thumbnail

    Illumio Breach Containment Platform

     Info
    Sold by: Illumio 
    Deployed on AWS
    Free Trial
    Illumio Zero Trust Segmentation (ZTS) Platform is the only solution that handles it all: Endpoint-Endpoint, Endpoint-Server, Server-Server, as well as extensive support for cloud workloads, containers, IoT, and OT devices. Empowering organizations to be more resilient for whatever may come their way. ZTS contains the spread of breaches and ransomware across the hybrid attack surface by continually visualizing how workloads and devices are communicating, creating granular policies that only allow wanted and necessary communication, and automatically isolating breaches by restricting lateral movement proactively or during an active attack. In addition, Illumio ZTS includes the Illumio Virtual Advisor (IVA) which provides actionable, AI driven guidance for even the most complex tasks. With IVA, teams can streamline their workflows with instant, expert-level answers to their questions. Quickly access critical information and achieve complex tasks simply by asking the virtual advisor.

    Overview

    Play video

    Illumio Breach Containment Platform provides comprehensive mapping of traffic telemetry across hybrid multi-cloud environments and endpoints for applications, data, and cloud workloads. This visualization allows security teams to uncover unnecessary connectivity that increases risk. With the Illumio Breach Containment Platform, you can easily know if you are at risk of an attack or currently under attack. Detailed context-based label descriptions of objects guides teams as they create policies, based on applications' components and relationships. With Illumio, teams can make faster, more informed decisions about what traffic to segment to proactively maintain a strong security posture or reactively isolate a breach.

    Illumio Breach Containment Platform is made up of these solutions:

    Illumio Insights for visibility and incident response. Quickly identify risk, detect attacks, and contain threats with a single click. Empower security teams to protect critical assets and respond instantly.

    Illumio Segmentation for cloud and on-premises data center workloads. Limit an attacker's ability to travel across lateral traffic with proactive policy controls that limit the exposure of valuable assets

    Highlights

    • See risk Visualize all communication and traffic between workloads and devices across the entire hybrid attack surface. Gain visibility with real-time telemetry and data, understand application communications, security policy, usage, access and security exposure with a comprehensive map of traffic flows.
    • Set policy Comprehensive monitoring and simplified labeling that helps eliminate blind spots by automatically setting granular and flexible segmentation policies that control communication between workloads and devices to only allow what is necessary and wanted.
    • Stop the spread Proactively isolate high-value assets or reactively isolate compromised systems during an active attack to stop the spread of a breach by programming dynamic workload policies for hybrid multi-cloud networks and endpoints, and applying automated policy recommendations.

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.

    Illumio Breach Containment Platform

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    Illumio Breach Containment Platform
    Price per 250 secured workloads + Breach Containment Platform
    $109,000.00
    100 CloudSecure Workloads
    Price per 100 public cloud workloads
    $38,400.00

    Vendor refund policy

    All fees are non-cancellable and non-refundable.

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    Illumio provides customers with 24/7 support by phone, email, and through our support portal. +1 888 631 6354, support@illumio.com ,

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    50
    In Security Observability, Device Security

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    2 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Traffic Visualization
    Comprehensive mapping of traffic telemetry across hybrid multi-cloud environments and endpoints with real-time communication tracking
    Zero Trust Segmentation
    Granular policy controls that limit communication between workloads and devices to only allow necessary and wanted interactions
    Breach Containment
    Dynamic workload policy programming to proactively or reactively isolate compromised systems and prevent lateral movement during attacks
    AI-Driven Guidance
    Virtual advisor providing actionable, context-based recommendations for complex security tasks and policy creation
    Multi-Environment Support
    Extensive coverage for endpoint, server, cloud workloads, containers, IoT, and OT device communication security
    Network Policy Management
    Fine-grained network policy enforcement across Kubernetes clusters with support for egress, ingress, in-cluster, and cross-cluster traffic control
    Traffic Segmentation
    Automatic identification and isolation of namespace boundaries with granular traffic limitation by IP addresses, domains, and IP CIDRs
    Egress Traffic Control
    Static IP address assignment for egress traffic from Kubernetes pods to enable integration with external firewalls and security tools
    Gateway Management
    Standardized ingress traffic management using Gateway API with integrated Envoy Gateway for enterprise-grade security
    Multi-Cluster Security
    Centralized network security management across multiple Kubernetes distributions in cloud and on-premises environments
    Zero Trust Network Architecture
    Cloud-native platform implementing zero trust principles with AI-powered cyberthreat protection
    Threat Prevention Mechanism
    Advanced AI-driven cyber threat and data loss prevention services to eliminate attack surfaces and prevent compromise
    Access Control Framework
    Next-generation zero trust network access (ZTNA) platform enabling secure connections to private apps, services, and OT devices
    Digital Experience Monitoring
    Performance optimization and issue resolution tracking from end-user perspective across application, network, and device domains
    Data Protection Strategy
    Comprehensive protection against data loss from users, SaaS applications, and public cloud infrastructure through advanced prevention techniques

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    5 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Alark Singh

    Visual traffic interface aids in network micro-segmentation while a streamlined update option enhances process efficiency

    Reviewed on Dec 23, 2024
    Review provided by PeerSpot
    ">

    What is our primary use case?

    We are using Illumio  for network micro-segmentation to ensure that all applications comply with Dora compliance. This is an essential part of our infrastructure to ensure security and proper network segmentation.

    What is most valuable?

    The strongest aspect of Illumio  is the visual traffic interface, which allows us to see all traffic that communicates with our servers and allied companies. We can write rules that can be embedded into the IP table, making it easy to handle. 

    Illumio enables us to see network flows, traffic sources, and destinations. The policy generation and enforcement capabilities are valuable, allowing for selective enforcement. Illumio helps in audit purposes by saving data and showing blocked traffic, ensuring no outside traffic is allowed.

    What needs improvement?

    There should be an option to upgrade from the console to the latest version instead of performing manual upgrades. This would be more helpful to streamline processes.

    For how long have I used the solution?

    I have been using Illumio for more than four years.

    What do I think about the stability of the solution?

    Illumio is a stable solution with no glitches or bugs reported, making it a reliable product for us.

    What do I think about the scalability of the solution?

    Currently, we are working with an on-premises setup however, we plan to scale to cloud with Illumio's new product offerings.

    How are customer service and support?

    Customer support is excellent. Even if we raise an issue on non-working days like Saturdays or Sundays, we receive prompt responses.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The installation process is straightforward and does not require much time, however, finding server owners and explaining the process takes more time.

    What about the implementation team?

    We have professional support from Illumio and guidance for troubleshooting or implementation needs.

    What was our ROI?

    I cannot provide detailed information on ROI as it is handled by upper management. However, Illumio is known to be the cheapest solution among the security solutions we evaluated.

    What's my experience with pricing, setup cost, and licensing?

    I do not have specific knowledge about pricing details as it is handled by upper management. I know that Illumio is the cheapest solution in the security area.

    What other advice do I have?

    For the overall product, I would rate Illumio eight out of ten points. 

    My advice is to consider Illumio as a strong option for visual traffic interface and network micro-segmentation needs.

    reviewer2596512

    Gathers critical insights with valuable dependency mapping

    Reviewed on Dec 03, 2024
    Review provided by PeerSpot
    ">

    What is our primary use case?

    We were sales partners with Illumio , so we didn't implement Illumio  on our infrastructure. Rather, we sold Illumio.

    What is most valuable?

    The dependency map is most valuable aspect.

    What needs improvement?

    I need some further comparisons to point out the weaknesses. That's why I'm looking for comparisons with other products.

    For how long have I used the solution?

    I have not had the chance to experiment deeply with it.

    How are customer service and support?

    From my experience, they are very responsive.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Illumio was my first micro-segmentation partner.

    Which other solutions did I evaluate?

    I am trying to do some technical evaluations between Gandicore and other vendors, yet not any other vendors are being considered.

    What other advice do I have?

    I would recommend Illumio to all sizes of companies. Even though the whole micro-segmentation movement is pretty new in my region, I would rate Illumio about eight out of ten.

    Vincent TOH

    Offers real-time application dependency mapping that is useful

    Reviewed on Aug 15, 2024
    Review provided by PeerSpot
    ">

    What is our primary use case?

    I use the solution in my company to protect our environment and servers.

    How has it helped my organization?

    Illumio is the first new solution in our company's environment, but we need time to see the improvements from its use in our company. For three years, the tool was used by a different customer of our company, but recently, a new customer has been using it, and we have started to see improvements in their environment from the use of the product.

    What is most valuable?

    The most valuable features of the solution are the maps and the security build it offers. The tool helps with my company's security posture.

    What needs improvement?

    The log collection part needs improvement, and the tool should offer more details about the logs. We need more details on areas where there is an error or a traffic blockage. I would like the tool to offer a more detailed view.

    For how long have I used the solution?

    I have been using Illumio for three years. I am a customer of Illumio.

    How was the initial setup?

    The product's initial setup phase is not difficult. We are using a cloud version of the tool. Picking up the PC for the setup was difficult because Illumio's service provider took care of it. In our company, we only installed the tool on our devices, so it wasn't much of a difficult process. On a scale of one to ten, one is difficult, and ten is easy, I rate the setup phase as nine.

    I didn't deploy Illumio. My company uses the cloud version of the tool. I created my account and paired my device, which was all that was required.

    What other advice do I have?

    Illumio's real-time application dependency mapping has impacted our company's security operations, and it is very useful because, as I said, it has helped us build our security policy.

    The number of people required for the deployment of the tool depends on the environment where it is used. For me, only one or two people are required to maintain the tool. Only if the issue is important will we need Illumio's support.

    I rate the tool an eight out of ten.

    MICHEL RACT-MUGNEROT

    Pprevents attackers or threats from spreading or moving laterally

    Reviewed on Oct 27, 2023
    Review provided by PeerSpot
    ">

    What is our primary use case?

    The use cases were centered on microservices within the context of BNP Paribas. This was primarily due to the adoption of microservices and the hybrid cloud environment. The goal was to establish precise control over external network connections.

    What is most valuable?

    The feature that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging policies, which can be complex to devise. It's a matter that requires careful consideration and stakeholder involvement before implementing such policies.       

    What needs improvement?

    Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial.

    For how long have I used the solution?

    I have been using the solution for the past two years.

    What do I think about the stability of the solution?

    I have not worked with the solution directly, so I can’t comment on this aspect.

    What do I think about the scalability of the solution?

    It scales effectively. To the best of my knowledge, we did not face any problems, despite having a large installation base. We did not encounter issues while expanding the project.

    How was the initial setup?

    The deployment itself was quite straightforward. It took at least one year.

    What other advice do I have?

    I would recommend this solution and rate it 9 out of 10. 

    reviewer2255061

    An easy to use solution that does basic layer four firewall filtering

    Reviewed on Aug 09, 2023
    Review provided by PeerSpot
    ">

    What is most valuable?

    The solution is easy to use. 

    What needs improvement?

    The solution is very basic and doesn't do anything other than the orchestration of layer four endpoint firewall rules.

    For how long have I used the solution?

    I have been working with the product for three years. 

    What do I think about the stability of the solution?

    I have no issues with the tool's stability. 

    What do I think about the scalability of the solution?

    I would rate Illumio Zero Trust Segmentation's scalability a seven out of ten. 

    How are customer service and support?

    I haven't contacted the tool's technical support team. 

    How was the initial setup?

    I would rate Illumio Zero Trust Segmentation's setup a six out of ten. The tool's deployment took two weeks to complete. We relied on two people to help us with the deployment. 

    What other advice do I have?

    I would rate the product a six out of ten since it's not an end-to-end solution. 

    View all reviews