It seems that no matter how many security technologies, network perimeters, and intrusion prevention safeguards are erected, the bad guys somehow find a means of entry.
Enter microsegmentation as a way to minimize the damage from successful perimeter breaches. The basic idea is to segment off parts of the network, especially the most sensitive parts, and wall them off with stricter policies and tie them into a zero-trust architecture.
Microsegmentation improves visibility into data flows and restricts access to applications and data based on approved identities and roles. This makes it far more difficult for cybercriminals to move laterally within a network. Restrictions can also be extended by location and device. Server-to-server, application-to-server, and web-to-server traffic is more closely monitored, with policies preventing all but vital communications between these network segments.
Microsegmentation Benefits
Key Features of Microsegmentation Tools
Vendors in the microsegmentation segment offer a variety of tools and features to make their products attractive, so there are plenty of differences between offerings. Segmentation can also have different levels of granularity. Therefore, each organization needs to determine the level of granularity that is right for a specific environment according to the risk profile of applications.
Despite those differences, these are the features common to ..
Support the originator by clicking the read the rest link below.