Skip to main content

Cloud

Welcome to Illumio Cloud

You can prevent breaches and ransomware from becoming cyber disasters in the public cloud by getting visibility and insights into your cloud workloads and traffic activities. Use these insights to author effective policies. Note that the product name has changed to Illumio Segmentation for the Cloud.

Use the following features to gain visibility into your traffic patterns:

  • Multi-Cloud: Single-pane-of-glass view into multi-cloud environments.

  • Cloud Inventory View: Visibility, searchability, and ability to gather insights from resources spanning multiple cloud environments.

  • Cloud Map View: Visualize and search resources, resources relationships, and actual traffic flows on an interactive map of the multi-cloud environment, with drill-down on resources, flows, and metadata with a few clicks. Use the Cloud Map to visualize resource hierarchy and traffic flows, and locate resources and security controls for network security reviews.

  • Traffic Visibility: Visualize and search to gather insights from traffic flows.

  • Application Blueprint: Build and view a multi-cloud application blueprint using cloud tags and metadata. Auto-discover application deployments and resources. View inventory, resource relationships, traffic flow, interactive cloud maps, and policies in the context of an application and its deployments.

  • Policy Authoring: Author and provision organization-wide and application-specific policies using labels and IP lists for application segmentation.

  • Change Management System Integration: Integrate with Slack.

Typical Cloud Workflow

  1. Onboard a cloud account.

  2. Onboarding begins the process of discovering and ingesting resources from your environment.

    See Cloud Discovers Your Application Environments.

  3. Go to the Cloud Map to see your discovered resources. Go to the Inventory page to see a list of your discovered resources.

    See Cloud Map and Inventory.

  4. Set up your deployments (optional) and define your applications.

    See Define a Deployment and Define an Application.

  5. Review the application definition before you apply security policies to your application definition.

    See Cloud Policy Model and Organization Policy versus Application Policy.