I use the solution in my company to protect our environment and servers.
External reviews
External reviews are not included in the AWS star rating for the product.
Offers real-time application dependency mapping that is useful
What is our primary use case?
How has it helped my organization?
Illumio is the first new solution in our company's environment, but we need time to see the improvements from its use in our company. For three years, the tool was used by a different customer of our company, but recently, a new customer has been using it, and we have started to see improvements in their environment from the use of the product.
What is most valuable?
The most valuable features of the solution are the maps and the security build it offers. The tool helps with my company's security posture.
What needs improvement?
The log collection part needs improvement, and the tool should offer more details about the logs. We need more details on areas where there is an error or a traffic blockage. I would like the tool to offer a more detailed view.
For how long have I used the solution?
I have been using Illumio for three years. I am a customer of Illumio.
How was the initial setup?
The product's initial setup phase is not difficult. We are using a cloud version of the tool. Picking up the PC for the setup was difficult because Illumio's service provider took care of it. In our company, we only installed the tool on our devices, so it wasn't much of a difficult process. On a scale of one to ten, one is difficult, and ten is easy, I rate the setup phase as nine.
I didn't deploy Illumio. My company uses the cloud version of the tool. I created my account and paired my device, which was all that was required.
What other advice do I have?
Illumio's real-time application dependency mapping has impacted our company's security operations, and it is very useful because, as I said, it has helped us build our security policy.
The number of people required for the deployment of the tool depends on the environment where it is used. For me, only one or two people are required to maintain the tool. Only if the issue is important will we need Illumio's support.
I rate the tool an eight out of ten.
Finest security service provider!!
Pprevents attackers or threats from spreading or moving laterally
What is our primary use case?
The use cases were centered on microservices within the context of BNP Paribas. This was primarily due to the adoption of microservices and the hybrid cloud environment. The goal was to establish precise control over external network connections.
What is most valuable?
The feature that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging policies, which can be complex to devise. It's a matter that requires careful consideration and stakeholder involvement before implementing such policies.
What needs improvement?
Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial.
For how long have I used the solution?
I have been using the solution for the past two years.
What do I think about the stability of the solution?
I have not worked with the solution directly, so I can’t comment on this aspect.
What do I think about the scalability of the solution?
It scales effectively. To the best of my knowledge, we did not face any problems, despite having a large installation base. We did not encounter issues while expanding the project.
How was the initial setup?
The deployment itself was quite straightforward. It took at least one year.
What other advice do I have?
I would recommend this solution and rate it 9 out of 10.
Best Security Solution Provider
Great products, no issues from a user standpoint
Powerful microsegmentation tool but not the most intuitive
Support is awesome. They're always available and quick to help.
Illumio product user friendly and anyone can control inbound & outbound traffic of machine
Great platform to protect your applications deployed in cloud and Virtualized Infrastracture
2. Good with Threat defense mechanism and has the capability to identify the malicious activities.
2. Integration with current network topology is too easy.