Illumio Features
Management (3)
Dashboards and Reports
Access pre-built and custom reports and dashboards.
Workflow Management
Creates new or streamlines existing workflows to better handle IT support tickets and service.
Administration Console
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks
Operations (3)
Governance
Allows users to create, edit, and relinquish user access privileges.
Logging and Reporting
Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
API / Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Security Controls (4)
Anomaly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data Loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Security Auditing
Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Prevention (5)
Intrusion Prevention
Enforces security paramaters to prevent unauthorized access.
Firewall
Protects servers, data center infrastructure and information from a variety of attacks and malware threats.
Encryption
Provide some level of encryption of information, protecting sensitive data while it exists within the data center.
Security hardening
Facilitates system and network security by identifying and remediating vulnerabilities
Cloud Data Protection
Provides high quality and wide scope of in-cloud and offline data security capabilities.
Detection (3)
Intrusion Detection
Detects unauthorized access and use of privileged systems.
Security Monitoring
Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Anti-Malware / Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences.
Administration (6)
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Administration Console -
Provides a centralized console for administation tasks and unified control.
API / integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Policy Enforcement
Allows administrators to set policies for security and governance.
Dependency Mapping
Facilitates the discovery, allocation, and mapping of application dependencies across servers, networks, and cloud environments.
Network Mapping
Allows visual display of networks segmented components and their connected resources.
Network Management (8)
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Network Mapping
Allows visual display of networks segmented components and their connected resources.
Security Analytics
Utilizes behavioral analysis to improve security procedures and documentation.
API/Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Network Mapping
Provides visual displays network connections, services, and endpoints.
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Reporting
Documents suspicious activity within a network and provide analysis of potential threats or vulnerabilities.
Console
Provides a centralized console for administration tasks and unified control.
Security (4)
Security Automation
Allows administrative control over automated security tasks.
Application Security
Protects application access and data. Prompts additional authentication for suspicious users.
Workload Protection
Protects computing resources across a network. Prompts additional authentication for suspicious users.
Data Protection
Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users.
Identity Management (3)
Adaptive Access Control
Provides a risk-based approcach to determining trust within the network.
Identity Scoring
Calculates risk based on user behavior, permissions, and requests.
User Monitoring
Monitors users attempting unauthorized access to databases, applicaitons, and othe network components.
Network Maintenance (3)
Policy Optimization
Identifies redundent processes and policies, automates changes to reduce unnecessary policy enforcement.
Risk Analysis
Identifies potential network security risks, vulnerabilities, and compliance impacts.
Auditing
Allows for deep examination into network-connected devices, policies, and protocols.
Network Monitoring (3)
Network Monitoring
Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Configuration Monitoring
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Change Management
Tools to track and implement required network policy changes.
Enforcement (5)
Identity-Based Policy Management
Accelerates policy change workflows using identity attributes to manage microsegmentation policies.
Workflow Automation
Completely automates end-to-end policy enforcement workflows across hybrid- and multi-cloud environments.
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Intelligent Segmentation
Automates segmentation and provides AI-based improvement suggestions.
Workload Protection
Protects computing resources across a network. Prompts additional authentication for suspicious users.
Visibility (3)
Breach Detection
Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks.
Observability
Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.
Application Discovery
Detect new assets and applications as they enter a cloud environments and networks to add to asset inventory.
Generative AI (2)
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Generation
Allows users to generate text based on a text prompt.
Identity and Access Management - Zero Trust Platforms (4)
Single sign-on (SSO)
Simplifies user authentication across multiple services while maintaining security.
Multi-factor authentication (MFA)
Ensures that users are verified through multiple credentials before access is granted, reducing the risk of compromised accounts.
Role-based access control (RBAC)
Grants access based on the user’s role within the organization, adhering to the principle of least privilege.
Identity federation
Integrates with external identity providers to manage user identities across different platforms and services.
Security - Zero Trust Platforms (5)
Encryption
Mandatory encryption of data both at rest and in transit protects against unauthorized access.
Endpoint detection and response (EDR)
Continuous monitoring and real-time response capabilities with EDR help detect and mitigate threats on endpoint devices.
Device posture assessment
Verifies the security status of a device before granting access to network resources, ensuring that only compliant devices can connect.
Micro-segmentation
Divides the network into isolated segments to prevent lateral movement by attackers, ensuring that if one segment is compromised, others remain secure.
Zero trust network access (ZTNA)
Replaces traditional VPNs by enforcing granular, context-aware access to applications based on user identity, device, and other factors.
Data Security - Zero Trust Platforms (2)
Data loss prevention (DLP)
Detect and prevent unauthorized access or transfer of sensitive data.
Data classification
Data classification automatically categorizes data based on its sensitivity, allowing for appropriate security measures to be applied
Application Visibility - Zero Trust Platforms (5)
API support
API support ensures that the zero trust platform can integrate seamlessly with other security tools and existing infrastructure
Application-level controls
Provides the ability to enforce security policies at the application layer, ensuring that access to specific applications is tightly controlled.
Secure application access
ensures that only authorized users can access critical applications, protecting against unauthorized entry points
User and entity behavior analytics (UEBA)
UEBA identifies unusual behavior that may indicate a security threat, enabling proactive threat managemen
Continuous monitoring
Provides real-time visibility into all network traffic, user activities, and data flows to detect anomalies
Reporting and Policies - Zero Trust Platforms (5)
Policy automation
allows for automatic application of security policies based on predefined criteria, reducing the risk of human error and ensuring consistent enforcement
Regulatory compliance
Regulatory compliance assists organizations in adhering to industry-specific regulations, such as the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), or the California Consumer Privacy Act (CCPA)
Cross-platform compatibility
This works across different environments, including on-premises, cloud, and hybrid setups, ensuring comprehensive security coverage
Policy enforcement
This ensures that security policies are consistently applied across all users, devices, and application
Comprehensive reporting
Detailed reports that provide insights into security events help organizations maintain compliance and optimize their security posture
Agentic AI - Zero Trust Platforms (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Proactive Assistance
Anticipates needs and offers suggestions without prompting




