IT teams now have the ability to “see” security policy issues by asking questions in plain English. New security platform will automatically generate micro-segmentation policies to remediate risks.
Thanks to PJ Kirner, co-founder and CTO of Illumio for sharing the next wave of its micro-segmentation technology with new capabilities in visualization and application dependency mapping, as well as security policy development.
Explorer: Unlocks a new dimension to the visualization capability, allowing operations and security staff to ask “questions” about their network traffic such as:
Tell me all flows going into and out of my PCI environment.
What traffic has crossed from development to production in the last 60 days?
Where is the majority of my permitted management traffic coming from?
Where is my computer underprovisioned for high availability or failover?
Policy Generator: Uses network traffic to automatically generate micro-segmentation policies for every workload and application running anywhere, on any computing platform. The new feature can analyze applications and create segmentation policies in seconds without network details like IP addresses. This saves security teams critical time, reduces the risk of human errors, and improves policy consistency across the network.
“When we unveiled the Illumio Adaptive Security Platform, we provided the market with the best capabilities to visualize and understand unauthorized communications across the data center and the cloud, providing a strong enhancement to our customers' security posture,” said Kirner. “Our Explorer and Policy Generator services provide unparalleled capabilities for customers to map their attack surface and reduce the burden of administering the best security policy for any application or environment.”