We use Illumio as our network security platform to protect our EC2 instances. We use Illumio on our EC2 instances to detect and respond to any instance that might occur on the network side. That is pretty much all we use it for. It is very easy to detect and respond using Illumio.
Cyber Security Architect at a tech vendor with 10,001+ employees
Real User
Top 10
Oct 19, 2025
The main use case for Illumio is providing micro-segmentation where we don't want to segment the network based on IP addresses but rather segment them based on roles, applications, and environments. Everything that we do from the segmentation point of view is based on the label. Based on the label, we prepare the policies, and then we do the segmentation, which gives us a more granular approach and limits the attack surface from happening. Now the attack surface is limited, and this will happen if any attack occurs; we stop the lateral movement of the attack because we have segmented the environment. I am managing a project where the client needs Illumio, and we are helping with their environment on the segmentation approach. They have many applications in their environment, and we support them by understanding the environment and applications they have. When we have the full inventory of their applications, we ask them to do the labeling in Illumio based on information such as how many applications they have, what labels we have to give them, and under what categorization those labels should be. For example, which application should be part of this location, this role, this environment, and this application. Based on that, we have created an approach to help our client onboard the applications, wherein we have many activities happening. For example, we review their traffic, conduct ring-fencing, and understand what traffic goes through. After a few days, we understand the required traffic, based on that we draft the policy, have the policy review session, and then finally enforce the application. All of this occurs alongside the process from the client end; they follow all the processes, and we handle the technical part before finally enforcing the application. Illumio is deployed in the cloud environment in Azure.
We are using Illumio for network micro-segmentation to ensure that all applications comply with Dora compliance. This is an essential part of our infrastructure to ensure security and proper network segmentation.
The use cases were centered on microservices within the context of BNP Paribas. This was primarily due to the adoption of microservices and the hybrid cloud environment. The goal was to establish precise control over external network connections.
We only deploy Illumio Adaptive Security Platform on the servers, and only apply the server segmentation. Our scope for using Illumio is relatively small, and so far it's good because our scope is only applied to the server farms.
Illumio enhances security through micro-segmentation and real-time traffic control, offering detailed network visibility and precise application communication management. It supports scalability across environments, improving security posture and reducing lateral movement.Illumio's features include real-time traffic control, micro-segmentation, and scalable policy management, allowing organizations to establish strict security measures against threats like ransomware. Its visibility map...
Illumio's use case compared to Akamai is exactly the same. For the purpose of micro-segmentation, it is the same.
We use Illumio as our network security platform to protect our EC2 instances. We use Illumio on our EC2 instances to detect and respond to any instance that might occur on the network side. That is pretty much all we use it for. It is very easy to detect and respond using Illumio.
The main use case for Illumio is providing micro-segmentation where we don't want to segment the network based on IP addresses but rather segment them based on roles, applications, and environments. Everything that we do from the segmentation point of view is based on the label. Based on the label, we prepare the policies, and then we do the segmentation, which gives us a more granular approach and limits the attack surface from happening. Now the attack surface is limited, and this will happen if any attack occurs; we stop the lateral movement of the attack because we have segmented the environment. I am managing a project where the client needs Illumio, and we are helping with their environment on the segmentation approach. They have many applications in their environment, and we support them by understanding the environment and applications they have. When we have the full inventory of their applications, we ask them to do the labeling in Illumio based on information such as how many applications they have, what labels we have to give them, and under what categorization those labels should be. For example, which application should be part of this location, this role, this environment, and this application. Based on that, we have created an approach to help our client onboard the applications, wherein we have many activities happening. For example, we review their traffic, conduct ring-fencing, and understand what traffic goes through. After a few days, we understand the required traffic, based on that we draft the policy, have the policy review session, and then finally enforce the application. All of this occurs alongside the process from the client end; they follow all the processes, and we handle the technical part before finally enforcing the application. Illumio is deployed in the cloud environment in Azure.
We are using Illumio for network micro-segmentation to ensure that all applications comply with Dora compliance. This is an essential part of our infrastructure to ensure security and proper network segmentation.
We were sales partners with Illumio, so we didn't implement Illumio on our infrastructure. Rather, we sold Illumio.
I use the solution in my company to protect our environment and servers.
The use cases were centered on microservices within the context of BNP Paribas. This was primarily due to the adoption of microservices and the hybrid cloud environment. The goal was to establish precise control over external network connections.
We use the tool to secure our systems. It helps us to adhere to confidentiality and integrity.
We only deploy Illumio Adaptive Security Platform on the servers, and only apply the server segmentation. Our scope for using Illumio is relatively small, and so far it's good because our scope is only applied to the server farms.
We've had to implement the infrastructure. In fact, we are changing over to FortiGate's VMX security solution.
Our primary use case for Illumio is micro-segmentation.