Listing Thumbnail

    Illumio Breach Containment Platform

     Info
    Sold by: Illumio 
    Deployed on AWS
    Free Trial
    Vendor Insights
    AWS Free Tier
    Illumio Zero Trust Segmentation (ZTS) Platform is the only solution that handles it all: Endpoint-Endpoint, Endpoint-Server, Server-Server, as well as extensive support for cloud workloads, containers, IoT, and OT devices. Empowering organizations to be more resilient for whatever may come their way. ZTS contains the spread of breaches and ransomware across the hybrid attack surface by continually visualizing how workloads and devices are communicating, creating granular policies that only allow wanted and necessary communication, and automatically isolating breaches by restricting lateral movement proactively or during an active attack. In addition, Illumio ZTS includes the Illumio Virtual Advisor (IVA) which provides actionable, AI driven guidance for even the most complex tasks. With IVA, teams can streamline their workflows with instant, expert-level answers to their questions. Quickly access critical information and achieve complex tasks simply by asking the virtual advisor.
    4.4

    Overview

    Play video

    Illumio Breach Containment Platform provides comprehensive mapping of traffic telemetry across hybrid multi-cloud environments and endpoints for applications, data, and cloud workloads. This visualization allows security teams to uncover unnecessary connectivity that increases risk. With the Illumio Breach Containment Platform, you can easily know if you are at risk of an attack or currently under attack. Detailed context-based label descriptions of objects guides teams as they create policies, based on applications' components and relationships. With Illumio, teams can make faster, more informed decisions about what traffic to segment to proactively maintain a strong security posture or reactively isolate a breach.

    Illumio Breach Containment Platform is made up of these solutions:

    Illumio Insights for visibility and incident response. Quickly identify risk, detect attacks, and contain threats with a single click. Empower security teams to protect critical assets and respond instantly.

    Illumio Segmentation for cloud and on-premises data center workloads. Limit an attacker's ability to travel across lateral traffic with proactive policy controls that limit the exposure of valuable assets

    Highlights

    • See risk Visualize all communication and traffic between workloads and devices across the entire hybrid attack surface. Gain visibility with real-time telemetry and data, understand application communications, security policy, usage, access and security exposure with a comprehensive map of traffic flows.
    • Set policy Comprehensive monitoring and simplified labeling that helps eliminate blind spots by automatically setting granular and flexible segmentation policies that control communication between workloads and devices to only allow what is necessary and wanted.
    • Stop the spread Proactively isolate high-value assets or reactively isolate compromised systems during an active attack to stop the spread of a breach by programming dynamic workload policies for hybrid multi-cloud networks and endpoints, and applying automated policy recommendations.

    Details

    Sold by

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.
    Security credentials achieved
    (1)

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.

    Illumio Breach Containment Platform

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    Illumio Breach Containment Platform
    Price per 250 secured workloads + Breach Containment Platform
    $109,000.00
    100 CloudSecure Workloads
    Price per 100 public cloud workloads
    $38,400.00

    Vendor refund policy

    All fees are non-cancellable and non-refundable.

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    Illumio provides customers with 24/7 support by phone, email, and through our support portal. +1 888 631 6354, support@illumio.com ,

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    50
    In Security Observability, Device Security

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    3 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Real-time Traffic Visualization
    Comprehensive mapping and visualization of all communication and traffic flows between workloads and devices across hybrid multi-cloud environments and endpoints with real-time telemetry data.
    Granular Segmentation Policy Creation
    Automated generation and application of granular, context-based segmentation policies that control communication between workloads and devices to allow only necessary and wanted traffic.
    Multi-Environment Workload Support
    Support for diverse workload types including endpoint-to-endpoint, endpoint-to-server, server-to-server communications, cloud workloads, containers, IoT devices, and OT devices across hybrid architectures.
    Dynamic Breach Isolation
    Proactive and reactive isolation capabilities that restrict lateral movement by programming dynamic workload policies and applying automated policy recommendations during active attacks or for high-value asset protection.
    AI-Driven Policy Guidance
    Integrated artificial intelligence-driven virtual advisor that provides actionable recommendations for policy creation and complex segmentation tasks through natural language interaction.
    Network Policy Enforcement
    Fine-grained network policies that limit egress traffic by IPs, domains, and IP CIDRs with automatic namespace boundary identification and policy recommendations for namespace isolation.
    Egress Traffic Management
    Egress Gateway functionality that assigns static IP addresses to egress traffic from Kubernetes pods for integration with firewalls and tools requiring static IP identification.
    Ingress Traffic Management
    Ingress Gateway using Gateway API standard with integrated Envoy Gateway for comprehensive security and observability of ingress traffic.
    Multi-Cluster Network Security
    Centralized network security management across multiple Kubernetes distributions supporting individual and multi-cluster deployments in cloud and on-premises environments.
    Network Observability and Risk Mitigation
    Observability and risk mitigation capabilities for detecting and mitigating security breaches across all types of network traffic including egress, ingress, in-cluster, and cross-cluster communication.
    Zero Trust Architecture
    Cloud-native zero trust platform that applies zero trust principles to eliminate attack surface and prevent lateral movement across users, applications, and infrastructure.
    AI-Powered Threat Detection
    AI-powered cyberthreat and data loss prevention services that detect and prevent advanced threats, accidental exposure, theft, and ransomware attacks.
    Next-Generation Network Access
    Next-generation zero trust network access (ZTNA) platform enabling seamless and secure connectivity to private applications, services, and operational technology devices.
    Data Loss Prevention
    Data protection capabilities preventing data loss from users, SaaS applications, and public cloud infrastructure through comprehensive loss prevention policies.
    End-to-End Digital Experience Monitoring
    End-user perspective monitoring and visibility across device, ISP, cloud proxy, and application layers to optimize performance and identify application, network, and device issues.

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    -
    -
    -
    -
    -
    No security profile
    No security profile

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.4
    38 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    63%
    29%
    8%
    0%
    0%
    3 AWS reviews
    |
    35 external reviews
    External reviews are from G2  and PeerSpot .
    Steve S.

    Easy to Deploy, Fast Traffic-Flow Visibility with Illumio

    Reviewed on Apr 18, 2026
    Review provided by G2
    What do you like best about the product?
    Illumio is easy to deploy and within a few hours, you have total visibility of traffic flows on your network. There are no performance issues on the endpoints and pricing is inline with expectations
    What do you dislike about the product?
    There are no downsides of Illumio, the product is easy to use, wide operating support and quick to onboard
    What problems is the product solving and how is that benefiting you?
    For companies with legacy or flat networks, Illumio can easily solve the lateral movement problem without reengineering the network. Also stops blast radius in the event of a breach
    Information Technology and Services

    Easy to Understand and Quickly Proves Value with Great Customer Visibility

    Reviewed on Apr 15, 2026
    Review provided by G2
    What do you like best about the product?
    It is easy to understand, and it prove its value early even when you are not doing any restrictions, it is bringing the visibility for the customer.
    What do you dislike about the product?
    It doesnt have a Dark Mode UI. And sometimes we may need too much time to see some changes applied.
    What problems is the product solving and how is that benefiting you?
    Bringing visibility and security for the customers.
    Chris K.

    Illuminates Traffic for Enhanced Network Control

    Reviewed on Apr 15, 2026
    Review provided by G2
    What do you like best about the product?
    I appreciate Illumio's 'illumination' feature that allows me to map the current traffic to understand communication patterns before applying policies to restrict. The different mappings and dependencies help me understand and have the full picture, which is quite valuable for network segmentation.
    What do you dislike about the product?
    The adoption journey of Illumio is not that easy. After 1 year, we are still learning to enable some features. I would like my security analysts, network engineers, and sys admins to be able to leverage it. More guided technical workshops, available for customers, to fully adopt the product would be helpful.
    What problems is the product solving and how is that benefiting you?
    I use Illumio for network segmentation to monitor and control traffic, block lateral movement, and understand communication patterns. The illumination feature maps traffic and dependencies, providing a full picture before applying policies.
    Manu S.

    Strong Identity-Based Micro-Segmentation That Reduces Lateral-Movement Risk

    Reviewed on Apr 15, 2026
    Review provided by G2
    What do you like best about the product?
    It is a great tool --- it delivers strong, identity‑based micro‑segmentation. And it helps to reduce lateral‑movement risk and eventually helping security teams enforce policies with confidence.
    What do you dislike about the product?
    complex at first, and Large‑scale deployments may require careful tuning
    What problems is the product solving and how is that benefiting you?
    It fits its name and tasks that - detect attacks, and stop breaches instantly at cloud scale. Also it gives us real‑time visibility and results is a stronger, audit‑defensible security posture. Great tool
    Irfan Sharfi

    Micro-segmentation has transformed endpoint protection and now isolates internal threats effectively

    Reviewed on Apr 07, 2026
    Review provided by PeerSpot

    What is our primary use case?

    Illumio  serves as our primary endpoint security solution, utilizing the VEN as an agent installed across each workstation, laptop, and server managed through the PCE, the Policy Compute Engine. We manage all endpoint devices, both managed and unmanaged, through the Illumio  agent, which communicates with the PCE to monitor all behaviors involving high-level security between north-to-south and east-to-west traffic.

    A specific example of how I use Illumio with endpoints to protect my laptop from outside threats involves internal threat protection as well. Suppose two computers are already in the same network domain. If one computer gets compromised by any means, the communication between the other computer would normally continue unprotected. However, when I use Illumio as a security device and install the secure agent on each workstation, if one workstation becomes compromised, I can protect the second one. This means I can protect communication between devices in the same network segment. I can restrict and manage the communication between these devices effectively.

    In addition to our primary use case, we protect our devices and environment from ransomware attacks, and I have witnessed several scenarios where Illumio protects devices from such threats. Illumio PCE includes a map where I can see all communication similar to micro-segmentation, including details about the production environment, its location, and the web application. Everything can be micro-segmented, allowing me to segment the network and protect it comprehensively.

    What is most valuable?

    The best feature of Illumio is micro-segmentation. Within the same segment of a network or device, I can create micro-segmentation based on location, environment, and roles. I can customize what exactly each particular endpoint device is and accordingly write rules to manage communication through inbound and outbound rules, allowing or denying communication as required.

    While working with micro-segmentation and setting rules based on roles or locations, managing and updating policies in Illumio does not take considerable time because I have intra-scope and extra-scope rules. If I make a rule and need to modify it, I simply adjust the scope accordingly. When a new workstation comes into the network, I only need to apply the labels to that workstation, and it merges into a policy automatically without needing to modify the policy unless absolutely necessary.

    Deploying the VEN is straightforward, as I can deploy it on Windows, Linux, and macOS operating systems. In my organization, we have deployed it on approximately 300,000 devices, and it is easily manageable through Illumio. We have a cloud, SaaS-based environment of the PCE where I manage all those devices, making deployment very straightforward.

    Illumio has positively impacted my organization by protecting devices not only from external threats but also from internal ones. If any single PC becomes compromised by an external or internal attack, I can isolate those PCs or devices. If any server becomes compromised, I can isolate it as well, which is a wonderful feature of Illumio.

    What needs improvement?

    Illumio can be improved in several areas based on our feedback. Sometimes, the PCE experiences slowness, especially when deploying around 300,000 endpoint devices. When these devices communicate within the network, loading the map or connections can cause latency, which needs improvement for a more user-friendly and faster experience.

    Regarding improvements to the interface, I believe we can add more features to the graphical user interface, such as proper logs. While the logs currently indicate what was blocked or allowed, clicking on a specific log should provide more information, such as which extra-scope rule is causing a denial, offering better analysis for troubleshooting.

    For how long have I used the solution?

    I have been using Illumio for the last two and a half years.

    What do I think about the stability of the solution?

    In my experience, Illumio is completely stable.

    What do I think about the scalability of the solution?

    Regarding scalability, from the PCE, I can push policies or use scripting to facilitate scalability. By employing Linux scripting or other methods, I can push the policy to all devices at once, making it easy to scale.

    How are customer service and support?

    Customer support from Illumio is exceptional. Whenever I raise a case with their support team, regardless of the priority level—P1, P2, P3, or P4—they generally reply within an hour and are available for a call whenever needed, providing a complete solution.

    Which solution did I use previously and why did I switch?

    Before using Illumio, we had not utilized a different endpoint security solution. We relied on Windows firewall and our own firewall, which was a legacy system that could not provide the micro-segmentation we required, prompting us to switch to Illumio for better security.

    How was the initial setup?

    Since implementing Illumio, my organization has seen a reduction in work effort, and it helps to secure the network efficiently. For example, we have several endpoint devices located in different locations. I can create extra-scope or intra-scope rules to simplify communication while managing their Windows firewall and other firewalls through Illumio.

    What was our ROI?

    I have seen a good return on investment with Illumio, and it definitely saves our time. Additionally, if we were to buy any other product besides Illumio, we would need to invest more. Illumio serves as a single endpoint technology where I can implement various features, including a zero-trust network, north-to-south and east-to-west configurations, and micro-segmentation, all coming from one platform, which ultimately saves us time and money.

    Which other solutions did I evaluate?

    While choosing Illumio, we did not evaluate other options since we received an offer for a trial, and it turned out to be a wonderful experience without trying other vendors or technologies so far.

    What other advice do I have?

    For others looking into using Illumio, I would advise purchasing and testing this product, as it will provide immense satisfaction regarding security and user-friendliness.

    View all reviews