Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

3 AWS reviews

External reviews

31 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Irfan Sharfi

Micro-segmentation has transformed endpoint protection and now isolates internal threats effectively

  • April 07, 2026
  • Review provided by PeerSpot

What is our primary use case?

Illumio serves as our primary endpoint security solution, utilizing the VEN as an agent installed across each workstation, laptop, and server managed through the PCE, the Policy Compute Engine. We manage all endpoint devices, both managed and unmanaged, through the Illumio agent, which communicates with the PCE to monitor all behaviors involving high-level security between north-to-south and east-to-west traffic.

A specific example of how I use Illumio with endpoints to protect my laptop from outside threats involves internal threat protection as well. Suppose two computers are already in the same network domain. If one computer gets compromised by any means, the communication between the other computer would normally continue unprotected. However, when I use Illumio as a security device and install the secure agent on each workstation, if one workstation becomes compromised, I can protect the second one. This means I can protect communication between devices in the same network segment. I can restrict and manage the communication between these devices effectively.

In addition to our primary use case, we protect our devices and environment from ransomware attacks, and I have witnessed several scenarios where Illumio protects devices from such threats. Illumio PCE includes a map where I can see all communication similar to micro-segmentation, including details about the production environment, its location, and the web application. Everything can be micro-segmented, allowing me to segment the network and protect it comprehensively.

What is most valuable?

The best feature of Illumio is micro-segmentation. Within the same segment of a network or device, I can create micro-segmentation based on location, environment, and roles. I can customize what exactly each particular endpoint device is and accordingly write rules to manage communication through inbound and outbound rules, allowing or denying communication as required.

While working with micro-segmentation and setting rules based on roles or locations, managing and updating policies in Illumio does not take considerable time because I have intra-scope and extra-scope rules. If I make a rule and need to modify it, I simply adjust the scope accordingly. When a new workstation comes into the network, I only need to apply the labels to that workstation, and it merges into a policy automatically without needing to modify the policy unless absolutely necessary.

Deploying the VEN is straightforward, as I can deploy it on Windows, Linux, and macOS operating systems. In my organization, we have deployed it on approximately 300,000 devices, and it is easily manageable through Illumio. We have a cloud, SaaS-based environment of the PCE where I manage all those devices, making deployment very straightforward.

Illumio has positively impacted my organization by protecting devices not only from external threats but also from internal ones. If any single PC becomes compromised by an external or internal attack, I can isolate those PCs or devices. If any server becomes compromised, I can isolate it as well, which is a wonderful feature of Illumio.

What needs improvement?

Illumio can be improved in several areas based on our feedback. Sometimes, the PCE experiences slowness, especially when deploying around 300,000 endpoint devices. When these devices communicate within the network, loading the map or connections can cause latency, which needs improvement for a more user-friendly and faster experience.

Regarding improvements to the interface, I believe we can add more features to the graphical user interface, such as proper logs. While the logs currently indicate what was blocked or allowed, clicking on a specific log should provide more information, such as which extra-scope rule is causing a denial, offering better analysis for troubleshooting.

For how long have I used the solution?

I have been using Illumio for the last two and a half years.

What do I think about the stability of the solution?

In my experience, Illumio is completely stable.

What do I think about the scalability of the solution?

Regarding scalability, from the PCE, I can push policies or use scripting to facilitate scalability. By employing Linux scripting or other methods, I can push the policy to all devices at once, making it easy to scale.

How are customer service and support?

Customer support from Illumio is exceptional. Whenever I raise a case with their support team, regardless of the priority level—P1, P2, P3, or P4—they generally reply within an hour and are available for a call whenever needed, providing a complete solution.

Which solution did I use previously and why did I switch?

Before using Illumio, we had not utilized a different endpoint security solution. We relied on Windows firewall and our own firewall, which was a legacy system that could not provide the micro-segmentation we required, prompting us to switch to Illumio for better security.

How was the initial setup?

Since implementing Illumio, my organization has seen a reduction in work effort, and it helps to secure the network efficiently. For example, we have several endpoint devices located in different locations. I can create extra-scope or intra-scope rules to simplify communication while managing their Windows firewall and other firewalls through Illumio.

What was our ROI?

I have seen a good return on investment with Illumio, and it definitely saves our time. Additionally, if we were to buy any other product besides Illumio, we would need to invest more. Illumio serves as a single endpoint technology where I can implement various features, including a zero-trust network, north-to-south and east-to-west configurations, and micro-segmentation, all coming from one platform, which ultimately saves us time and money.

Which other solutions did I evaluate?

While choosing Illumio, we did not evaluate other options since we received an offer for a trial, and it turned out to be a wonderful experience without trying other vendors or technologies so far.

What other advice do I have?

For others looking into using Illumio, I would advise purchasing and testing this product, as it will provide immense satisfaction regarding security and user-friendliness.


    Abhijit Kumar

Granular visibility has transformed how we secure east‑west traffic and contain lateral threats

  • April 07, 2026
  • Review from a verified AWS customer

What is our primary use case?

I was engaged in a deployment of Illumio, where in my previous project, I actually worked for 3,500 endpoints, so I needed to deploy the VENs on individual workplaces and then onboard them to PCE, then make them on segmentation, and finally, make their entire network in segmentation. I handled the entire deployments.

Challenges in the sense of multiple applications present on a customer's premises require you to engage with the application owners first to understand their necessary communication paths. Once you deploy the VEN and obtain a visualized map over the PCE, you gain an understanding of how the communication is going, but you need to verify with the application owner whether the communication traffic between the applications and servers is legitimate or authorized or not, based on which you create the policies. I found that bit critical, engaging with the application owners and obtaining their confirmations. Apart from that, everything else goes smoother from my end. Every other scope and deliverables, whatever is possible by Illumio, turn out to be an almost smoother process.

My main experience includes completing two projects. On both projects while installing the VENs, on one of the sites, we found that we needed to label manually as the CMDB was not integrated, necessitating us to understand the application's behavior, location, roles, and other metadata for all the workloads before preparing the labeling. In the other project, the CMDB was already present on the infrastructure, so it was easier to get authorized. Another use case involved using automation for Windows and Linux with Jenkins during the deployment of the VENs, spreading pairing profiles to all workloads, leading to smooth onboarding. It took some time to finalize the execution of the policies in draft mode before switching to enforcement mode, but it was more realistic and challenging to achieve the exact outcomes we expected.

What is most valuable?

The best feature Illumio offers, in my opinion, is the visibility map, which provides a useful end-to-end traffic connection. It gives details at a granular level about what applications are communicating inside your network, making it easier to create policies. Once you know the communication paths and identify the legitimate users, you can effectively prepare those policies.

The granular visibility provided by the visibility map changes the way we manage network security or policy creation by allowing us to directly refer to nano-segmentation. We can see which specific ports are being accessed, enabling us to segregate or segment the policy rules based on those security ports. This allows for more granular control over communication, tightening security. We have two modes of enforcement in Illumio; before applying enforcement rules, we utilize visibility to get details of the traffic, draft our policies, and ensure the targeted audience is met before enforcement. Initially, we allow traffic and then block everything else except the allowed policies on Illumio, which helps tighten the security of the east-west traffic within our network.

I observed another important feature in Illumio—it is not just replacing the perimeter firewall. A perimeter firewall provides a different level of security, whereas Illumio controls the local firewall. Illumio coexists with other non-Illumio processes that control the local firewall, and in that scenario, it can detect and alert users about local firewall tampering, allowing for better control over workloads.

Illumio positively impacts our organization through granular level segmentation of communication traffic. Initially, security controls depend on the network and applications, but with Illumio, we manage how one host communicates to another and the necessary paths that need to remain open, which reduces unauthorized communications. If any devices are compromised, Illumio instantly notifies us and isolates dangerous hosts, decreasing the spread of ransomware or other threats.

What needs improvement?

Illumio supports both on-prem and cloud environments, but I think the GUI interface could be more user-friendly. The integration with other tools such as SIEM and SOAR could also be improved for easier use in the future.

I did not give it a 10 mainly due to the issue with user-friendly GUI experience and the integrations with third-party tools. The technical certifications and learning paths could also be enhanced with more videos or advisories for better understanding.

For how long have I used the solution?

I have been using Illumio for 1.5 years.

What do I think about the stability of the solution?

Illumio is stable.

What do I think about the scalability of the solution?

Illumio's scalability is good.

How are customer service and support?

The customer support is very prominent. Whenever we reach out for assistance, they respond well.

Which solution did I use previously and why did I switch?

We did not have any previous solution such as Illumio; this is the first one we considered for protecting east-west traffic.

How was the initial setup?

I found the pricing, setup cost, and licensing to be minimal and realistic.

What about the implementation team?

We are a partner of Illumio. In our initial days, we trained with Illumio through multiple certifications, which helps us understand customer requirements and how we deploy Illumio in different projects.

What was our ROI?

Illumio definitely demonstrates its value in money-saving capabilities, enhancing our lateral environment inside the organization and providing effectiveness overall once integrated.

What's my experience with pricing, setup cost, and licensing?

One of the sites purchased Illumio through AWS, and at another site, it has been procured directly from Illumio as they provide their own region, cloud, and bucket.

Which other solutions did I evaluate?

Before choosing Illumio, we evaluated other options such as Cisco Secure Workload and Akamai Guardicore before deciding to go with Illumio.

What other advice do I have?

For others looking into using Illumio, my advice is to activate the agent on the local workloads and set it to visibility mode for at least two weeks to gather insights on all communication before finalizing security policies. The more time you spend in visibility mode, the better understanding you will have of internal traffic, making it easier to create effective policies.

The technical training part on Illumio includes multiple certifications, and I recognize it as one of their finest initiatives. I gave this review a rating of 9 out of 10.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    reviewer2814816

Micro-segmentation has strengthened server traffic control and improves breach containment

  • April 06, 2026
  • Review provided by PeerSpot

What is our primary use case?

The main use case for Illumio involves working on any new applications enrolled into the architecture, where I focus on understanding the traffic and documenting rules. I often face issues with agent and PC console communication, so in those cases, I suspend the agent, check the services, and make sure to activate and deactivate. I perform all types of troubleshooting to ensure the agent communicates properly with the PC console and fetches the policies actively.

For new applications onboarded into the infrastructure, I first work on understanding the application, the users, and whether it is in production, development, testing, or UAT, which involves grasping the basic structure. Then I work closely with application teams to identify what communication needs to be allowed and what is not required. After the agent is installed on those servers, we move them from idle to visibility to monitor traffic for a week. This involves exporting a report and closely collaborating with application teams to define which traffic requires rules and segregating the non-required traffic by source and destination. This documentation leads to a precise mapping of traffic, allowing me to create rules for the servers. The agents are eventually moved to visibility to selective enforcement for some and full enforcement for others, while also providing teams with guidance on future communications and necessary actions, all of which are clearly documented.

What is most valuable?

Illumio is a very good tool that is flexible, with policies written using labels such as environment, application, role, and location rather than IP addresses, making policy management scalable and easy to maintain in dynamic environments. However, the initial setup requires careful planning, and improperly configured policies can block communications between applications. Troubleshooting may require a deep understanding of traffic logs and flow data, alongside previously written policies. Additionally, agent dependency is a consideration since any agent-related issues can affect policy application, making proper monitoring of agent health crucial. Overall, Illumio is a powerful tool for micro-segmentation and zero trust security that provides strong visibility, flexible policy management, and effective threat containment, enhancing an organization's internal security posture. It is not just a security tool but a strategic solution for modern infrastructure security that can significantly reduce the risk of lateral movement and improve overall network security with proper implementation.

The best features Illumio offers include real-time control of traffic between servers and allowing required communication based on specified ports while blocking unwanted ports. It provides breach containment, preventing communication on unapproved ports, and offers full visibility of traffic flows that helps in troubleshooting and audits, with traffic mapping generated by a central controller that analyzes and creates policies based on labels instead of IPs. Policy management is highly scalable, and the lightweight agent can be easily installed on each server, enabling policy simulation to check impact before enforcement using a draft view.

These features are incredibly valuable, including predefined templates that save time and reduce manual errors, resulting in massive scalability that is suitable for larger enterprises, which represent the best features of Illumio for micro-segmentation and real-time visibility.

What needs improvement?

Illumio requires me to create policies for each type of traffic, and for new users, the policy design can be a bit complex. More guided onboarding or automatic policy suggestions would help teams adapt to Illumio faster without needing extensive expertise. While I do not find issues with the interface, first-time users might struggle with navigation. Current limitations also include the integration with tools such as SIM not being seamless, and support for Splunk and Sentinel could be improved. More AI automation in policy creation, such as auto policy recommendations and anomaly detections, would reduce manual processes and human errors. Additionally, old operating systems may not be fully supported, and broader compatibility for the agent or an agent-less option would be beneficial.

Enhanced reporting and analytics would be useful, as current reporting is basic, so improvements such as more customizable reports, compliance reports, and executive dashboards are needed due to their use for management and audits. Reducing dependency on the agent is crucial since enforcement depends on agent health, so improvements such as a backup enforcement mechanism and better agent monitoring or auto-recovery would increase reliability.

For how long have I used the solution?

I have been using Illumio for the past five years.

What do I think about the stability of the solution?

Illumio is stable.

What do I think about the scalability of the solution?

Illumio's scalability is very good; it is quite easy to scale.

How are customer service and support?

Customer support is really good.

Which solution did I use previously and why did I switch?

I have not used any other solutions before Illumio. Prior options were not evaluated before choosing Illumio.

What other advice do I have?

I give Illumio a rating of nine out of ten.

I gave it a nine out of ten due to some small changes I previously mentioned regarding improvements needed for Illumio, such as the dependency on agent health and requests for a simplified dashboard along with AI-based auto policy recommendations. The policy creation process is mostly manual, so AI-based recommendations would be useful. It is an excellent tool for cybersecurity, especially for micro-segmentation, preventing attacks from spreading from one compromised server to others in the infrastructure. With some additional improvements, particularly for first-time users and their understanding, it could reach a perfect score of ten.

Illumio is a great product for managing server-to-server communication properly. It is scalable and user-friendly, but first-time users may experience challenges understanding policy creation, so better guidance is necessary to enhance their learning process. My overall review rating for this product is nine out of ten.


    KlavsThaarup

Micro-segmentation has improved threat containment but now needs deeper visibility and container support

  • March 25, 2026
  • Review from a verified AWS customer

What is our primary use case?

Illumio's use case compared to Akamai is exactly the same. For the purpose of micro-segmentation, it is the same.

What is most valuable?

The advantages of Illumio really stand out because they are not using the kernel module. The biggest thing is that the agents used, the software that goes onto the PCs or the servers, is not as comprehensive as that of Akamai. This might be better for some companies that want a light agent instead of a thick agent.

Illumio has some VPN features and encryption features that are not available in Guardicore.

Illumio's ability to contain threats through secure segmentation is positive. I would say it's a good part here.

They have some features that are not available in Akamai Guardicore.

What needs improvement?

Illumio does not have much in terms of application dependency mapping features. They lack layer 7 process level segmentation, which is a limitation.

In Guardicore, you have the layer 7, the process level. You don't have that in Illumio. This indicates that the information about malware, intrusion detection, and threats would be better in Guardicore because it has this layer 7 support which Illumio does not have.

Some customers like Illumio because it's a simpler product. If it's too complex, some customers think that it's better to have a more simple product. Of course, Illumio has some features that Guardicore doesn't have.

The container support in Illumio is not the same as in Guardicore.

Guardicore has native support for containers, but Illumio does not have native support. They need to install an agent in the container world, while Akamai Guardicore does not need to install an agent, so they have native support that Illumio lacks.

For how long have I used the solution?

I have been dealing with Illumio for only one year so far.

What do I think about the stability of the solution?

Regarding stability for Illumio and performance issues, I cannot answer that. So far, everything is going well. I do not see any problems.

What do I think about the scalability of the solution?

I think Illumio is scalable, the same as the others.

How was the initial setup?

It's rather complex to install Illumio, but that would be the same for both vendors. There is no big problem when you're installing it. It's pretty much straightforward.

What was our ROI?

I observe extensive return on investment with Illumio. The savings will be more than 100% from Illumio.

What's my experience with pricing, setup cost, and licensing?

It will be the same price as the Akamai price for Guardicore. It's expensive, that's true. But when you compare it to firewalls, then it may not be that expensive.

What other advice do I have?

Before, I mentioned that Illumio is not very comprehensive in comparison to Akamai. I said that they could have a lighter agent and also process level segmentation. There is something that's not perfect in Illumio that could be improved.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    reviewer2783439

Segmentation has strengthened internal traffic control and reduces lateral movement risks

  • March 03, 2026
  • Review from a verified AWS customer

What is our primary use case?

We use Illumio as our network security platform to protect our EC2 instances. We use Illumio on our EC2 instances to detect and respond to any instance that might occur on the network side. That is pretty much all we use it for. It is very easy to detect and respond using Illumio.

What is most valuable?

Illumio offers great features such as controlling east-west traffic within data centers and clouds, enforcing segmentation policies between workloads, and reducing the attack surface by limiting unauthorized lateral movement.

Illumio's segmentation rules without requiring anything are pretty unique. It also integrates well with other security tools, giving you a centralized view of policy enforcement across your environment. If you're looking for east-west traffic control and zero-trust architecture, it's a great fit.

From what I have seen, Illumio positively impacts organizations by giving them a much clearer picture of their internal traffic, allowing them to identify risky connections they didn't see before. It also speeds up compliance, as I have heard, since they can enforce least privilege rules across their environments much faster. By reducing lateral movement, it just makes their overall security posture a lot stronger.

What needs improvement?

One area for improvement regarding Illumio might be making the policy management even more intuitive. Right now, it's powerful but can have a bit of a learning curve for some teams. Another thing could be deeper integrations with more third-party security tools. While they do integrate well, a broader set of APIs could make it even easier to slot into different stacks. It is already strong, but a bit more polish on usability and integration could take it further.

Another improvement might be around scalability, ensuring that as organizations grow, Illumio can handle even larger, more complex environments seamlessly. It would be great to see more advanced automation, such as AI-driven recommendations on segmentation rules or anomaly detection. That would really boost proactive security management.

For how long have I used the solution?

I have been using Illumio for about six months now.

What other advice do I have?

One big outcome we saw after implementing Illumio was a notable drop in lateral movement incidents. Within the first few months, we had about a 40% reduction in potential attack paths. On the compliance side, we cut audit times in half. What used to take weeks to validate now takes just a few days. It has really helped us tighten up both security and operational efficiency.

Illumio delivers really solid results. Micro-segmentation is top-notch, and we saw real security improvements. Some of the finer automation and user experience aspects still require a bit of effort to get fully dialed in. Illumio is deployed in our organization in the public cloud, specifically AWS. We use AWS, which is Amazon Web Services, as our cloud provider. We did not purchase Illumio through the AWS Marketplace.

Illumio is definitely a good solution if you have a lot of network traffic that you're dealing with. I rate Illumio a solid eight out of ten.


    Marco G.

Zero Trust Segmentation That Boosts Visibility and Limits Breach Impact

  • January 27, 2026
  • Review provided by G2

What do you like best about the product?
Illumio is helpful because it stops attackers from moving around your network if a breach happens.
It uses Zero Trust segmentation to limit access without needing major network changes.
You get clear visibility into application traffic across data centers and cloud environments.
It’s quick to deploy, easy to manage, and scales well as your environment grows.
Overall, it reduces the blast radius of attacks, simplifies operations, and strengthens security with minimal disruption.
What do you dislike about the product?
Illumio can take time to fully tune, since defining the right policies requires upfront effort.
It focuses on segmentation, so it doesn’t replace other security tools like EDR or firewalls.
The value is highest in complex environments, which may limit impact for very small setups.
Licensing and cost can feel high compared to simpler controls.
Teams may also need training to get comfortable with the model and workflows.
What problems is the product solving and how is that benefiting you?
Illumio helps stop cyberattacks from spreading inside a network by breaking it into small, controlled segments.
It gives clear visibility into how systems and applications talk to each other.
This makes it easier to spot risky connections and unusual behavior.
It automates security policies, reducing manual work and mistakes.
Illumio works across on-prem, cloud, and hybrid environments.
If a breach happens, the damage is contained instead of spreading everywhere.
Overall, it simplifies security operations while making the organization more resilient and compliant.


    Legal Services

Needs More Innovation and Better Integration

  • January 12, 2026
  • Review provided by G2

What do you like best about the product?
The product does doesn't cause issues and not a lot of maintenance is required.
What do you dislike about the product?
Illumio lacks innovation and integration.
What problems is the product solving and how is that benefiting you?
Microsegmentation between servers.


    Airlines/Aviation

Easy to Use and Powerful—Highly Recommended

  • January 07, 2026
  • Review provided by G2

What do you like best about the product?
Easy to use , powerfull and quick to freeze a problematic pc
What do you dislike about the product?
nothing yet :-) maybe that i should of got it earlier
What problems is the product solving and how is that benefiting you?
Latteral movement whithin some of our flat network subnet


    Jessie Chris II B.

Effortless Microsegmentation and Fast Troubleshooting with Illumio

  • January 06, 2026
  • Review provided by G2

What do you like best about the product?
The microsegmentation is its biggest feature. What I like most is the ease in configuration and implementation. Troubleshooting can be done faster as the configuration is simple and easy to understand
What do you dislike about the product?
None. When compared to other firewalls, Illumio is the easist to implement and troubleshoot.
What problems is the product solving and how is that benefiting you?
The ease of implementation and configuration. Have not encountered bugs that would causes impact to the traversing traffic as compared to other firewalls. Easy to troubleshoot as well so saves us time isolating issues


    SREENU S.

Easy Segmentation and Security with Illumio

  • December 15, 2025
  • Review provided by G2

What do you like best about the product?
I like Illumio because it's easy to use and easy to administrate. The UI and agent installation and configuration are straightforward, which makes it easier compared to other products.
What do you dislike about the product?
none
What problems is the product solving and how is that benefiting you?
Illumio helps with segmentation and security by restricting ports and isolating EOL servers. It's easy to use and administer, thanks to its intuitive UI and straightforward agent installation and configuration.