https://store-images.s-microsoft.com/image/apps.12234.e10e8f34-8663-4bcb-be2f-f9514d363ab8.ca838668-bf0d-4572-9b2b-341ec25106b7.d76a62d7-70de-43ac-b6d3-ac19297ab3d5
Illumio Endpoint
Illumio, Inc.
Illumio Endpoint
Illumio, Inc.
Illumio Endpoint
Illumio, Inc.
Stop the spread of ransomware by preventing lateral movement from end-user devices
Illumio Endpoint prevents lateral movement to other endpoints, the cloud, or the data center. Visualizing endpoint traffic on the go, at home, and in the office. Secure endpoint exposure by containing known and unknown cyberattacks to a single device. Stop ransomware in its track by blocking all unnecessary traffic by default. By dramatically limiting the attack surface, the first device that gets affected will be the last.
Key benefits:
Visualize endpoint traffic anywhere - From home or the office, quickly assess and mitigate risk by seeing all network traffic.
Control application access - Don't expose endpoints to the data center – only allow defined users access to the right applications.
Secure endpoint exposure - Isolate cyberattacks to a single device – even before the attack is detected by other security tools.
Architectural Overview
Defend your organization against today’s growing security threats by combining Illumio Endpoint with Illumio Core. Eliminate the risk users pose to your environment by extending Zero Trust Segmentation to endpoint devices with Illumio Endpoint. Combine with Illumio Core in the datacenter for full end-to-end traffic visibility and segmentation.
Illumio Core includes the following components:
• Policy Compute Engine (PCE)
The PCE is the Illumio management console and segmentation controller. It continuously collects telemetry information from the VEN, providing real-time mapping of traffic patterns and recommending optimal allow-list rules based on contextual information about the environment, workloads and processes.
• Virtual Enforcement Node (VEN)
The VEN is a lightweight agent that is installed in the guest OS of a host or endpoint. It collects flow and metadata information and transmits these to the PCE. It also receives the firewall rules from the PCE to program the managed host’s native stateful L3/L4 firewalls. Critically, the Illumio VEN is not inline to traffic. It does not enforce firewall rules or route traffic.
All products include support. Illumio provides customers with 24/7 support by phone, email, and through our support portal. Software and maintenance releases are also available in the support portal. For more information, please visit https://www.illumio.com/support
For custom pricing, EULA, or a private contract, please contact AzureMarketplace@illumio.com for a private offer.
https://store-images.s-microsoft.com/image/apps.24309.e10e8f34-8663-4bcb-be2f-f9514d363ab8.c1e4d1de-36b0-4109-a827-99211af2dbbf.544cfbff-fd25-41b9-b7bf-26b4d7f51afa
https://store-images.s-microsoft.com/image/apps.24309.e10e8f34-8663-4bcb-be2f-f9514d363ab8.c1e4d1de-36b0-4109-a827-99211af2dbbf.544cfbff-fd25-41b9-b7bf-26b4d7f51afa
https://store-images.s-microsoft.com/image/apps.2171.e10e8f34-8663-4bcb-be2f-f9514d363ab8.c1e4d1de-36b0-4109-a827-99211af2dbbf.83db6722-7a2c-41c9-8b48-cb9b03931f54
https://store-images.s-microsoft.com/image/apps.48975.e10e8f34-8663-4bcb-be2f-f9514d363ab8.c1e4d1de-36b0-4109-a827-99211af2dbbf.6cf9bfe6-c46f-4f21-a380-46fd16901651
https://store-images.s-microsoft.com/image/apps.54295.e10e8f34-8663-4bcb-be2f-f9514d363ab8.c1e4d1de-36b0-4109-a827-99211af2dbbf.e7779468-0e6e-439d-8830-a7c403353ca7