Overview
Illumio Insights is designed for hyper-scale functionality across hybrid and multi-cloud environments. Insights offers comprehensive, real-time visibility into an organizations security landscape, covering all connected resources and data flows. By integrating with Illumio Segmentation, threats identified within environments can be quickly contained, and affected resources can be instantly quarantined.
Illumio Insights is particularly beneficial for the Blue Team, consisting of SOC analysts, incident responders, and threat hunters. It enables them to visualize and prioritize lateral movement risks across various environments, to facilitate rapid detection, identification, and response of threats.
With Insights, organizations gain,
Instant, agentless observability at scale. Visualize and understand connectivity across cloud and container environments using AI-driven flow decoration and threat labeling, which helps assess, triage, and confirm security events in cloud environments.
AI-driven threat detection and prioritization. Make swift, informed decisions in response to active attackers by revealing otherwise unseen attacker tactics, techniques, and procedures, as well as their lateral movement across cloud resources.
Effective threat mitigation with one-click containment. Neutralize potential threats with a one-click dynamic quarantine feature, containing and isolating compromised resources and dramatically reducing the Mean Time to Respond.
Highlights
- See risk. Visualize all communication and traffic between workloads and devices across the entire hybrid attack surface. Gain visibility with real-time telemetry and data, understand application communications, security policy, usage, access and security exposure with a comprehensive map of traffic flows.
- Set policy. Comprehensive monitoring and simplified labeling that helps eliminate blind spots by automatically setting granular and flexible segmentation policies that control communication between workloads and devices to only allow what is necessary and wanted.
- Stop the spread. Proactively isolate high-value assets or reactively isolate compromised systems during an active attack to stop the spread of a breach by programming dynamic workload policies for hybrid multi-cloud networks and endpoints, and applying automated policy recommendations.
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Quick Launch
Pricing
Free trial
Dimension | Description | Cost/12 months |
|---|---|---|
Free Trial | Free Trial. Please contact Illumio for pricing after Free Trial | $0.00 |
Vendor refund policy
All fees are non-cancellable and non-refundable.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Support
Vendor support
Illumio provides customers with 24/7 support by phone, email, and through our support portal. +1 888 631 6354 or support@illumio.comÂ
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Effortless Firewall Rule Management, No Drawbacks Yet
Dashboards have transformed how I spot trends and monitor multi-cloud traffic patterns
What is our primary use case?
I have used the solution to improve detection and trend spotting by using dashboards to highlight key areas instead of trying to randomly hunt for them.
How has it helped my organization?
The solution has been used with customers, though not directly. However, customers are extremely excited about what more it can uncover when working with cloud native solutions such as VNets and other serverless services.
What is most valuable?
One of the most valuable features is the ability to map traffic and patterns over multiple hyperscalers, not just AWSÂ .
What needs improvement?
In some of the views, an IP address appears to be a link, but it doesn't open any new windows or display any new information.
For how long have I used the solution?
I have been using the solution for 3 months.
What's my experience with pricing, setup cost, and licensing?
I recommend purchasing via BT for the best commercials.
What other advice do I have?
I can't wait to see what the solution can expose for on-premise environments.
Has improved risky traffic detection and enables one-click containment in the public cloud
What is our primary use case?
I use the product to find unknown and risky traffic in the public cloud.
How has it helped my organization?
This solution has contributed to quick detection of risky traffic and offers one-click containment. The Shadow LLM feature is also very helpful.
What is most valuable?
I find the risky traffic detection feature valuable, as it allows us to identify areas with a weak security posture.
What needs improvement?
There is room for improvement with more AI-based detection to report traffic abnormalities and potential issues. I also suggest implementing AI-based suggestions and one-click actions to rectify problems.
For how long have I used the solution?
I have been using the solution for a few months.
What's my experience with pricing, setup cost, and licensing?
The pricing is reasonable. It would be more attractive if more features were added while retaining the current pricing.
What other advice do I have?
I have no other advice.
Which deployment model are you using for this solution?
Hands-on breach labs have deepened my understanding of real-world scenarios
What is our primary use case?
I use BareMetal Servers On-Prem.
What is most valuable?
The hands-on labs were well-designed and provided great insight into real-world breach scenarios. I also really appreciated the chance to connect with other Illumio customers and partners.
Illumio Insights impressed me with its ease of use, clarity, and potential to significantly improve breach containment strategies. It is a powerful tool that adds real value to any security team looking to stay ahead of evolving threats.
For how long have I used the solution?
I have used the solution for three years.
Which solution did I use previously and why did I switch?
We use Illuminati.
Illumio is helping us achieve Zero Trust by enforcing least- privilege access our workloads.
The dynamic laelling means we can deploy micro-segmentation quickly and at scale.
By implementing Selective Enforcement as a first phase we can achieve an initial level of segmentation quickly across our assets.
The move to a Unified console where one can have visibility and enforcement of policies across both on-premise adnd cloud assets.
By leveraging the Illumio API we have a robust integration with many internal systems for automation including our CMDB, IP Management tools, virtualization platform and directory services.
Some issues with performance of the SaaS console although this seems to have been improved since moving to a dedicated instance.
Some issues experienced with the visualization of logs in explorer.
Would like to see a clearer schedule on our move to the Unified console.