/
Zero Trust Segmentation

Illumio Innovation Lookback: What We Built in 2024

As we close out another big year, it’s time to reflect on what we’ve built, the progress we’ve made, and what’s ahead for the Illumio Zero Trust Segmentation (ZTS) Platform.  

If 2024 proved anything, it’s that security threats are only getting more sophisticated. Nation-state cyberattacks, record-breaking data breaches, and increasingly complex IT environments have made one thing clear: traditional security tools aren’t enough to stop breaches.

Here’s a look at some of our biggest product updates in 2024 — and why they matter for the future of security.

Expanding Zero Trust to the cloud

As more organizations build hybrid cloud environments, keeping workloads secure has become harder. Illumio’s latest updates make it easier to apply Zero Trust in the cloud so that you can get better visibility, control, and protection against cyber threats.

Illumio Sentinel Solution: Integrating with Microsoft Security

Microsoft Sentinel logo

We deepened our partnership with Microsoft last year, bringing Illumio Sentinel Solution to Azure Marketplace.  

Now, customers can seamlessly integrate Illumio ZTS into Microsoft’s cloud-native SIEM and SOAR platform. This helps strengthen detection, response, and containment across cloud environments.

Ransomware Protection Dashboard: See and stop threats faster

Ransomware is a top concern for organizations — and we’re tackling it head-on. This year, we upgraded our Ransomware Protection Dashboard with new widgets at the app group level, giving users real-time visibility into risk areas. These insights help prioritize security efforts, detect weak spots faster, and prevent ransomware from spreading.

Is your organization prepared for ransomware? Find out in the new Global Cost of Ransomware Study.

Scaling security for modern and legacy environments

Today’s businesses rely on both modern cloud systems and older legacy technology which can make security more complicated. Illumio’s latest solutions help protect both, making it easier to secure new and old systems without adding extra work for IT teams.

CLAS containers: Future-proofing Kubernetes security

Cloud-native workloads are constantly evolving. That’s why Illumio’s Cluster Local Actor Store (CLAS) containers provide a new, scalable architecture for ephemeral workloads.

And our revamped Kubernetes interface aligns with standard Kubernetes models. This makes it easier for teams to secure and manage their containers environments.

Legacy Windows VEN Support: Protecting older systems

Not all businesses can immediately retire legacy infrastructure. But that doesn’t mean they should be left unprotected.  

Last year, we introduced Virtual Enforcement Nodes (VENs) for Windows Server 2003 and 2008 (pre-RS). Organizations can now extend Illumio ZTS to older systems while they work toward modernization.

Illumio's biggest 2024 ZTS innovations

Last year, we worked on ways to evolve ZTS so that organizations can contain attacks before they spiral out of control with simple microsegmentation.  

From strengthening cloud security to simplifying compliance, every innovation we launched was designed to help businesses stay ahead of threats, not just react to them.

Illumio Virtual Advisor (IVA): AI-powered insights at your fingertips

Security teams are drowning in complexity. That’s why we launched Illumio Virtual Advisor (IVA), an AI-driven tool that provides instant, expert-level guidance on Zero Trust Segmentation.  

IVA makes it easier to analyze traffic flows, optimize segmentation policies, and get actionable recommendations — all in seconds. With AI doing the heavy lifting, teams can move faster and make more well-informed decisions.

Illumio Virtual Advisor dashboard

AI Labeling: Automate workload labeling

Manually labeling workloads is tedious, time-consuming, and prone to errors. Illumio’s AI-driven labeling takes the guesswork out of the process.  

By leveraging machine learning, our AI labeling automatically assigns accurate, consistent labels based on metadata and flow logs.

This automation eliminates the need for manual security tasks, saving teams valuable time and effort. With reliable, standardized labels in place, security teams can focus on higher-level strategy, accelerate deployments, and seamlessly manage hybrid, multi-cloud environments.

Override Deny: See it all, secure it all

With today’s complex networks, cybersecurity is a visibility game. You can’t secure what you can’t see.

Our unified Map, Traffic, and Mesh View now includes the Override Deny feature. This enables users to write policies that override all other allow rules.  

Override Deny is essential during active breaches because it allows for quick port blocking. And it can help ensure compliance even in ever-changing environments.

Rule Hit Count Report: Simplifying compliance audits

For compliance, it’s critical to understand which security policies are being used and which are outdated.

That’s why we introduced the Rule Hit Count Report to give teams clear visibility into how often rules are triggered. This helps eliminate unnecessary policies, strengthen security gaps, and simplify audits.

What’s next? A future built on Zero Trust

2024 was all about laying the groundwork for stronger, more resilient security strategies. But we’re not stopping here. In 2025, we’re pushing even further — developing smarter solutions, deepening integrations, and ensuring organizations stay ahead of cyber threats.

Want a front-row seat to what’s next? Join us at the Illumio World Tour in London! It’s your chance to see our latest innovations in action, hear from industry leaders, and connect with the Illumio team.

Test drive the Illumio ZTS Platform today with The Illumio Experience.

Related topics

Related articles

How to Design and Implement an Effective Container Microsegmentation Strategy with Kubernetes
Zero Trust Segmentation

How to Design and Implement an Effective Container Microsegmentation Strategy with Kubernetes

Micro-segmentation is often viewed as challenging to implement at scale.

4 Common Objections to Zero Trust Segmentation — And How to Overcome Them
Zero Trust Segmentation

4 Common Objections to Zero Trust Segmentation — And How to Overcome Them

Zero Trust Segmentation is a proven way to prevent ransomware propagation, but may seem overwhelming for IT leaders at midsize organizations. Here are four common objections we've heard from them and how to overcome each.

Operationalizing Zero Trust – Step 1: Identify What to Protect
Zero Trust Segmentation

Operationalizing Zero Trust – Step 1: Identify What to Protect

As technology was deployed on a small scale, ad hoc solutions were manageable, and more productive than trying to pursue economies of scale or seek to engineer strategic solutions that could be relevant across the board.

How Illumio Simplified eBay’s Large-Scale Microsegmentation Project
Zero Trust Segmentation

How Illumio Simplified eBay’s Large-Scale Microsegmentation Project

Learn eBay’s success story of using the Illumio Zero Trust Segmentation (ZTS) Platform to roll out microsegmentation across its network.

Making the Invisible Visible: How Illumio is Innovating Visualizations in Cybersecurity
Illumio Products

Making the Invisible Visible: How Illumio is Innovating Visualizations in Cybersecurity

Explore how Illumio’s cutting-edge visualizations empower security teams to gain real-time network visibility, uncover vulnerabilities, and strengthen their security posture.

Work Smarter, Not Harder With Illumio’s New AI-Powered Zero Trust Segmentation
Illumio Products

Work Smarter, Not Harder With Illumio’s New AI-Powered Zero Trust Segmentation

Learn how the Illumio Virtual Advisor (IVA) and AI labeling can help you automate complex security tasks and get actionable insights in the Illumio Zero Trust Segmentation Platform.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?