Granular visibility has transformed how we secure east‑west traffic and contain lateral threats
What is our primary use case?
I was engaged in a deployment of Illumio, where in my previous project, I actually worked for 3,500 endpoints, so I needed to deploy the VENs on individual workplaces and then onboard them to PCE, then make them on segmentation, and finally, make their entire network in segmentation. I handled the entire deployments.
Challenges in the sense of multiple applications present on a customer's premises require you to engage with the application owners first to understand their necessary communication paths. Once you deploy the VEN and obtain a visualized map over the PCE, you gain an understanding of how the communication is going, but you need to verify with the application owner whether the communication traffic between the applications and servers is legitimate or authorized or not, based on which you create the policies. I found that bit critical, engaging with the application owners and obtaining their confirmations. Apart from that, everything else goes smoother from my end. Every other scope and deliverables, whatever is possible by Illumio, turn out to be an almost smoother process.
My main experience includes completing two projects. On both projects while installing the VENs, on one of the sites, we found that we needed to label manually as the CMDB was not integrated, necessitating us to understand the application's behavior, location, roles, and other metadata for all the workloads before preparing the labeling. In the other project, the CMDB was already present on the infrastructure, so it was easier to get authorized. Another use case involved using automation for Windows and Linux with Jenkins during the deployment of the VENs, spreading pairing profiles to all workloads, leading to smooth onboarding. It took some time to finalize the execution of the policies in draft mode before switching to enforcement mode, but it was more realistic and challenging to achieve the exact outcomes we expected.
What is most valuable?
The best feature Illumio offers, in my opinion, is the visibility map, which provides a useful end-to-end traffic connection. It gives details at a granular level about what applications are communicating inside your network, making it easier to create policies. Once you know the communication paths and identify the legitimate users, you can effectively prepare those policies.
The granular visibility provided by the visibility map changes the way we manage network security or policy creation by allowing us to directly refer to nano-segmentation. We can see which specific ports are being accessed, enabling us to segregate or segment the policy rules based on those security ports. This allows for more granular control over communication, tightening security. We have two modes of enforcement in Illumio; before applying enforcement rules, we utilize visibility to get details of the traffic, draft our policies, and ensure the targeted audience is met before enforcement. Initially, we allow traffic and then block everything else except the allowed policies on Illumio, which helps tighten the security of the east-west traffic within our network.
I observed another important feature in Illumio—it is not just replacing the perimeter firewall. A perimeter firewall provides a different level of security, whereas Illumio controls the local firewall. Illumio coexists with other non-Illumio processes that control the local firewall, and in that scenario, it can detect and alert users about local firewall tampering, allowing for better control over workloads.
Illumio positively impacts our organization through granular level segmentation of communication traffic. Initially, security controls depend on the network and applications, but with Illumio, we manage how one host communicates to another and the necessary paths that need to remain open, which reduces unauthorized communications. If any devices are compromised, Illumio instantly notifies us and isolates dangerous hosts, decreasing the spread of ransomware or other threats.
What needs improvement?
Illumio supports both on-prem and cloud environments, but I think the GUI interface could be more user-friendly. The integration with other tools such as SIEM and SOAR could also be improved for easier use in the future.
I did not give it a 10 mainly due to the issue with user-friendly GUI experience and the integrations with third-party tools. The technical certifications and learning paths could also be enhanced with more videos or advisories for better understanding.
For how long have I used the solution?
I have been using Illumio for 1.5 years.
What do I think about the stability of the solution?
Illumio is stable.
What do I think about the scalability of the solution?
Illumio's scalability is good.
How are customer service and support?
The customer support is very prominent. Whenever we reach out for assistance, they respond well.
Which solution did I use previously and why did I switch?
We did not have any previous solution such as Illumio; this is the first one we considered for protecting east-west traffic.
How was the initial setup?
I found the pricing, setup cost, and licensing to be minimal and realistic.
What about the implementation team?
We are a partner of Illumio. In our initial days, we trained with Illumio through multiple certifications, which helps us understand customer requirements and how we deploy Illumio in different projects.
What was our ROI?
Illumio definitely demonstrates its value in money-saving capabilities, enhancing our lateral environment inside the organization and providing effectiveness overall once integrated.
What's my experience with pricing, setup cost, and licensing?
One of the sites purchased Illumio through AWS, and at another site, it has been procured directly from Illumio as they provide their own region, cloud, and bucket.
Which other solutions did I evaluate?
Before choosing Illumio, we evaluated other options such as Cisco Secure Workload and Akamai Guardicore before deciding to go with Illumio.
What other advice do I have?
For others looking into using Illumio, my advice is to activate the agent on the local workloads and set it to visibility mode for at least two weeks to gather insights on all communication before finalizing security policies. The more time you spend in visibility mode, the better understanding you will have of internal traffic, making it easier to create effective policies.
The technical training part on Illumio includes multiple certifications, and I recognize it as one of their finest initiatives. I gave this review a rating of 9 out of 10.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Micro-segmentation has improved threat containment but now needs deeper visibility and container support
What is our primary use case?
Illumio's use case compared to Akamai is exactly the same. For the purpose of micro-segmentation, it is the same.
What is most valuable?
The advantages of Illumio really stand out because they are not using the kernel module. The biggest thing is that the agents used, the software that goes onto the PCs or the servers, is not as comprehensive as that of Akamai. This might be better for some companies that want a light agent instead of a thick agent.
Illumio has some VPN features and encryption features that are not available in Guardicore.
Illumio's ability to contain threats through secure segmentation is positive. I would say it's a good part here.
They have some features that are not available in Akamai Guardicore.
What needs improvement?
Illumio does not have much in terms of application dependency mapping features. They lack layer 7 process level segmentation, which is a limitation.
In Guardicore, you have the layer 7, the process level. You don't have that in Illumio. This indicates that the information about malware, intrusion detection, and threats would be better in Guardicore because it has this layer 7 support which Illumio does not have.
Some customers like Illumio because it's a simpler product. If it's too complex, some customers think that it's better to have a more simple product. Of course, Illumio has some features that Guardicore doesn't have.
The container support in Illumio is not the same as in Guardicore.
Guardicore has native support for containers, but Illumio does not have native support. They need to install an agent in the container world, while Akamai Guardicore does not need to install an agent, so they have native support that Illumio lacks.
For how long have I used the solution?
I have been dealing with Illumio for only one year so far.
What do I think about the stability of the solution?
Regarding stability for Illumio and performance issues, I cannot answer that. So far, everything is going well. I do not see any problems.
What do I think about the scalability of the solution?
I think Illumio is scalable, the same as the others.
How was the initial setup?
It's rather complex to install Illumio, but that would be the same for both vendors. There is no big problem when you're installing it. It's pretty much straightforward.
What was our ROI?
I observe extensive return on investment with Illumio. The savings will be more than 100% from Illumio.
What's my experience with pricing, setup cost, and licensing?
It will be the same price as the Akamai price for Guardicore. It's expensive, that's true. But when you compare it to firewalls, then it may not be that expensive.
What other advice do I have?
Before, I mentioned that Illumio is not very comprehensive in comparison to Akamai. I said that they could have a lighter agent and also process level segmentation. There is something that's not perfect in Illumio that could be improved.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Zero Trust Segmentation That Boosts Visibility and Limits Breach Impact
What do you like best about the product?
Illumio is helpful because it stops attackers from moving around your network if a breach happens.
It uses Zero Trust segmentation to limit access without needing major network changes.
You get clear visibility into application traffic across data centers and cloud environments.
It’s quick to deploy, easy to manage, and scales well as your environment grows.
Overall, it reduces the blast radius of attacks, simplifies operations, and strengthens security with minimal disruption.
What do you dislike about the product?
Illumio can take time to fully tune, since defining the right policies requires upfront effort.
It focuses on segmentation, so it doesn’t replace other security tools like EDR or firewalls.
The value is highest in complex environments, which may limit impact for very small setups.
Licensing and cost can feel high compared to simpler controls.
Teams may also need training to get comfortable with the model and workflows.
What problems is the product solving and how is that benefiting you?
Illumio helps stop cyberattacks from spreading inside a network by breaking it into small, controlled segments.
It gives clear visibility into how systems and applications talk to each other.
This makes it easier to spot risky connections and unusual behavior.
It automates security policies, reducing manual work and mistakes.
Illumio works across on-prem, cloud, and hybrid environments.
If a breach happens, the damage is contained instead of spreading everywhere.
Overall, it simplifies security operations while making the organization more resilient and compliant.
Needs More Innovation and Better Integration
What do you like best about the product?
The product does doesn't cause issues and not a lot of maintenance is required.
What do you dislike about the product?
Illumio lacks innovation and integration.
What problems is the product solving and how is that benefiting you?
Microsegmentation between servers.
Easy to Use and Powerful—Highly Recommended
What do you like best about the product?
Easy to use , powerfull and quick to freeze a problematic pc
What do you dislike about the product?
nothing yet :-) maybe that i should of got it earlier
What problems is the product solving and how is that benefiting you?
Latteral movement whithin some of our flat network subnet
Effortless Microsegmentation and Fast Troubleshooting with Illumio
What do you like best about the product?
The microsegmentation is its biggest feature. What I like most is the ease in configuration and implementation. Troubleshooting can be done faster as the configuration is simple and easy to understand
What do you dislike about the product?
None. When compared to other firewalls, Illumio is the easist to implement and troubleshoot.
What problems is the product solving and how is that benefiting you?
The ease of implementation and configuration. Have not encountered bugs that would causes impact to the traversing traffic as compared to other firewalls. Easy to troubleshoot as well so saves us time isolating issues
Easy Segmentation and Security with Illumio
What do you like best about the product?
I like Illumio because it's easy to use and easy to administrate. The UI and agent installation and configuration are straightforward, which makes it easier compared to other products.
What do you dislike about the product?
none
What problems is the product solving and how is that benefiting you?
Illumio helps with segmentation and security by restricting ports and isolating EOL servers. It's easy to use and administer, thanks to its intuitive UI and straightforward agent installation and configuration.