Illumio Core
provides an easy way to deploy micro-segmentation and network traffic monitoring for any server in any location from on-premises DataCenter to the public cloud. Self-explanatory and effective setup using labels assigned to protected workloads (does not require IP addresses knowledge) and "allow list" ruleset type drastically reduce the attack surfaces. Central management (Policy Compute Engine) is tracking changes in the environment and automatically updating the ruleset. After the deployment, PCE builds a map of compute, applications, and connectivity which makes it very easy and fast to create a ruleset and apply micro-segmentation at scale on bare metal servers, virtual machines, and containers. Illumio Core aggregates all workload's traffic flows logs (even the east-west communication between workloads in the same subnet) and correlates them with the current configuration to show rules that need to be modified. Integration with Vulnerability Scanners shows on the Vulnerability Map a real environment- and communication-dependent exposure of protected resources.
https://clico.bg/vendors/illumio-1/illumio-has-been-delivering-workload-protection-that-prevents-the-spread-of-breaches-and-reduces-the-attack-surface-since-2013/illumio-core
https://clico.bg/logo.png
Illumio Core
provides an easy way to deploy micro-segmentation and network traffic monitoring for any server in any location from on-premises DataCenter to the public cloud. Self-explanatory and effective setup using labels assigned to protected workloads (does not require IP addresses knowledge) and "allow list" ruleset type drastically reduce the attack surfaces. Central management (Policy Compute Engine) is tracking changes in the environment and automatically updating the ruleset. After the deployment, PCE builds a map of compute, applications, and connectivity which makes it very easy and fast to create a ruleset and apply micro-segmentation at scale on bare metal servers, virtual machines, and containers. Illumio Core aggregates all workload's traffic flows logs (even the east-west communication between workloads in the same subnet) and correlates them with the current configuration to show rules that need to be modified. Integration with Vulnerability Scanners shows on the Vulnerability Map a real environment- and communication-dependent exposure of protected resources.