{"id":17812,"date":"2020-10-23T22:25:32","date_gmt":"2020-10-23T22:25:32","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=17812"},"modified":"2023-05-12T15:51:29","modified_gmt":"2023-05-12T15:51:29","slug":"microsegmentation-zero-trust-security","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/","title":{"rendered":"Microsegmentation: The Next Evolution in Cybersecurity"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The explosion in remote work that followed the COVID-19 pandemic has shifted corporate models from <\/span><span style=\"font-weight: 400;\">a main-branch focus to distributed corporate networks and vastly spread out remote employees. That in turn has shifted focus away from distributed networks and technologies like <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/sd-wan-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">SD-WAN<\/span><\/a><span style=\"font-weight: 400;\"> to the edge of the network &#8211; and to technologies like <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">zero trust security<\/span><\/a><span style=\"font-weight: 400;\"> and microsegmentation.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">The next evolution of cybersecurity<\/span><\/h2>\n<p><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Microsegmentation uses virtualization technology to create increasingly granular secure zones in networks. By applying tightly-focused security policies, microsegmentation moves security away from simply identifying IP addresses and grants users access to only the applications and data they need based on their identity and role. Security then becomes about the individual user, limiting dangerous lateral movement within a network. Those policies can be further refined by location and device &#8211; an adaptive approach that takes into consideration current security risk. It&#8217;s a core technology for zero trust, the idea that no one should be trusted or given more access than they require.<\/span><\/p>\n<p><em>See our picks for <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\">Top Microsegmentation Products<\/a><\/em><\/p>\n<h3><span style=\"font-weight: 400;\">The benefits of microsegmentation<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Microsegmentation offers organizations a number of benefits:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Reduced attack surface:<\/b><span style=\"font-weight: 400;\"> Microsegmentation limits attackers&#8217; ability to move laterally through a network, ultimately reducing the potential attack surface.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Threat detection and response:<\/b><span style=\"font-weight: 400;\"> Even with optimized security practices in place, breaches are inevitable. But microsegmentation can drastically improve threat detection and response times. When policy violations are detected, microsegmentation tools can generate real-time alerts and even block unsanctioned activity.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Regulatory Compliance:<\/b><span style=\"font-weight: 400;\"> Microsegmentation can strengthen organizations&#8217; <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/security-compliance\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">regulatory compliance<\/span><\/a><span style=\"font-weight: 400;\"> posture by creating segments that specifically store regulated data, typically the personally identifiable information (PII) of customers covered under laws such as General Data Protection Regulation (GDPR) and The California Consumer Privacy Act (CCPA). Compliance-focused policies can then be created for these segments. This also greatly simplifies the auditing process.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">The Problem with traditional security techniques<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">More traditional security tools, such as <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/types-of-firewalls\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">firewalls<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-vpn-solutions\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">VPNs<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">network access control (NAC)<\/span><\/a><span style=\"font-weight: 400;\">, have their limits because they focus primarily on securing the network perimeter. Security teams historically assumed the biggest threats were attacking from outside the network. But that approach overlooked insider threats &#8211; and the damage that hackers could do when they eventually got inside the network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Complicating the network security picture is the rise in activity at the edge of the network, from consumers, remote workers and Internet of Things (IoT) devices. Edge traffic has prompted organizations to move data processing away from data centers to the edge of the network. That improves data center security and responsiveness &#8211; but shifts those problems to the network&#8217;s edge, necessitating new approaches to security. In response, <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/edge-security-how-to-secure-the-edge-of-the-network\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">edge security<\/span><\/a><span style=\"font-weight: 400;\"> has become a new buzzword, and at its core is the concept of zero trust.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Authenticating users and devices with zero trust security<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The zero trust framework relies on the philosophy of &#8220;trust nothing and verify everything.&#8221; This means that organizations must authenticate and authorize every single user and device connecting internally or externally to a network before allowing access to any applications or stored data. This method of &#8220;least privilege&#8221; access recognizes that too much trust is a vulnerability.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If a malicious actor gains access to a network, perimeter-focused security tools can&#8217;t prevent them from moving laterally through a network, giving them access to applications and data. That lateral movement is particularly dangerous because such advanced persistent threats are behind the most disastrous data breaches. Zero trust secures access across all applications and environments within a network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So how can security teams authenticate the massive numbers of users and devices traveling throughout a network? One key is to create software-defined segments and define security policies for them at a granular level using microsegmentation.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Isolating networks and workloads with microsegmentation<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Historically, organizations used network segmentation for security, which is a technique for creating sub-networks within a hardware-based environment. These network segments are built using traditional, parameter-focused tools, such as VPNs or firewalls, to provide north-south security \u2013 the flow of data entering or exiting a network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsegmentation, on the other hand, offers protection for east-west, or lateral traffic \u2013 the flow of data inside a network. This includes server-to-server, application-to-server and web-to-server connections within the network. By creating security <\/span><i><span style=\"font-weight: 400;\">microsegments<\/span><\/i><span style=\"font-weight: 400;\"> for individual workloads with granular policy controls, microsegmentation provides complete control over the traffic within and between software-defined segments.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Network segmentation vs microsegmentation<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">A common analogy for network segmentation versus microsegmentation is that network segmentation acts as the walls and moats surrounding your network castle. Microsegmentation acts as the guards protecting every single door and pathway inside the castle walls. Both are needed, but microsegmentation is the missing piece that can protect your most valuable data.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-17880 aligncenter\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/10\/ESP_MicroSeg_01-01.png\" alt=\"\" width=\"330\" height=\"388\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-01.png 1189w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-01-255x300.png 255w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-01-869x1024.png 869w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-01-768x905.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-01-150x177.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-01-300x353.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-01-696x820.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-01-1068x1258.png 1068w\" sizes=\"(max-width: 330px) 100vw, 330px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-17882 aligncenter\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/10\/ESP_MicroSeg_01-02.png\" alt=\"\" width=\"330\" height=\"389\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-02.png 1188w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-02-254x300.png 254w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-02-868x1024.png 868w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-02-768x906.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-02-150x177.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-02-300x354.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-02-696x821.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-02-1068x1259.png 1068w\" sizes=\"(max-width: 330px) 100vw, 330px\" \/><\/p>\n<h3><\/h3>\n<h3><span style=\"font-weight: 400;\">Problems with network segmentation<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The theory behind network segmentation stands in stark contrast with zero trust, as it is only concerned with authorizing initial access to a network. This means that once a connection gains access, it is trusted to travel freely throughout the network, or at least that segment.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another issue with network segmentation is its reliance on coarse policies for network segments that offer limited control. Software-defined segments in modern hybrid and cloud networks would require thousands of coarse policies for each segment to achieve some lateral traffic protection. This is far more than can be reasonably managed as new resources and users are continually added to a network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The lack of comprehensive, detailed policies to protect lateral traffic is a particularly large issue in the case of <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/#:~:text=What%20are%20advanced%20persistent%20threats,valuable%20data%20and%20other%20vulnerabilities.\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">advanced persistent threats (APTs)<\/span><\/a><span style=\"font-weight: 400;\">. In these cases, attackers use stolen credentials to gain access to a network. Without a zero-trust framework in place, attackers can then navigate through a network undetected for long periods of time, mapping out an organization&#8217;s system and creating highly-customized <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">malware<\/span><\/a><span style=\"font-weight: 400;\"> for harvesting sensitive data. Zero trust and microsegmentation are critical new steps for preventing APTs from traveling openly throughout a network.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Reducing the attack surface with zero trust and microsegmentation<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">By isolating environments and segmenting workloads, a zero trust framework using microsegmentation greatly reduces the overall attack surface of a network by limiting movement from one potentially compromised workload to another. Once microsegmented, fine-grained security policies can be applied to workloads, all the way down to single machines, users or applications. These policies can be defined according to real-world constructs, such as user groups, access groups and network groups, and can be applied across multiple applications or devices.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">How to assign policies<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">On the device level, policies can be used to assign certain restrictions to devices based on their functionality, so that only devices that require access to critical applications and resources can be granted authorization. These devices can also be isolated from each other so they cannot communicate unless authorized to do so. Devices can also be restricted based on location &#8211; say a coffee shop vs. a corporate network &#8211; and the security of the device itself, which may not be current on all security updates and patches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Policies can also be based on source identities, another advantage microsegmentation has over previous methods of segmentation. Network segmentation can only tell you what information is being communicated between segments, whereas microsegmentation can pinpoint the identity of the resource requesting to communicate, whether it be a server, application, host or user. This provides far more granular segmentation, only allowing communication between resources whose identities have been granted proper permissions to do so.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With a comprehensive microsegmentation solution in place, any connection that cannot be verified by policy parameters is blocked from gaining access. Not only does microsegmentation protect against lateral movement, but it also gives security teams high-visibility and context for all network traffic. This allows teams to quickly identify malicious behavior and breaches, improving incident response and remediation.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Choosing zero trust and microsegmentation tools<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">While the zero trust framework is not a completely new concept, it has only recently gained traction as an enterprise security tool. Therefore, not all zero trust product offerings focus on microsegmentation. When shopping around for a solution, make sure to confirm that it offers microsegmentation so you get the most out of your zero trust framework. Here are a few of the more popular microsegmentation vendors to start your search:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Amazon Web Services (AWS)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Microsoft<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">VMware<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Cisco<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Fortinet<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Palo Alto Networks<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">If you&#8217;re worried about implementing zero trust in your network, fortunately, this does not require a complete reinvention of the infrastructure. The most effective solutions should layer on top of your environment without the need to replace existing security investments. If you would like to gain a better understanding of what options are available to you, check out our list of the <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Top Zero Trust Security Solutions<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6cffed65cb-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6cffed65cb\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6cffed65cb\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6cffed65cb\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6cffed65cb\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6cffed65cb\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6cffed65cb\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The explosion in remote work that followed the COVID-19 pandemic has shifted corporate models from a main-branch focus to distributed corporate networks and vastly spread out remote employees. That in turn has shifted focus away from distributed networks and technologies like SD-WAN to the edge of the network &#8211; and to technologies like zero trust [&hellip;]<\/p>\n","protected":false},"author":161,"featured_media":17884,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[9651,23887,30581],"b2b_audience":[37,33,44,30,45,31,32],"b2b_industry":[48],"b2b_product":[395,377],"class_list":["post-17812","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-faq","tag-microsegmentation","tag-zero-trust-security","b2b_audience-architect","b2b_audience-awareness-and-consideration","b2b_audience-c-level-executive","b2b_audience-large-enterprise","b2b_audience-management-title","b2b_audience-medium-business-enterprise","b2b_audience-small-business-enterprise","b2b_industry-industry","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-gateway-and-network-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsegmentation: The Next Evolution in Cybersecurity<\/title>\n<meta name=\"description\" content=\"Microsegmentation is a method for creating granular secure zones in software-defined networks to protect lateral traffic. Learn benefits now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsegmentation: The Next Evolution in Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Microsegmentation is a method for creating granular secure zones in software-defined networks to protect lateral traffic. Learn benefits now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-23T22:25:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-12T15:51:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-03.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2376\" \/>\n\t<meta property=\"og:image:height\" content=\"1189\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kyle Guercio\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kyle Guercio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/\"},\"author\":{\"name\":\"Kyle Guercio\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fcdece1299767aff305bb146ab672b20\"},\"headline\":\"Microsegmentation: The Next Evolution in Cybersecurity\",\"datePublished\":\"2020-10-23T22:25:32+00:00\",\"dateModified\":\"2023-05-12T15:51:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/\"},\"wordCount\":1438,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-03.png\",\"keywords\":[\"FAQ\",\"microsegmentation\",\"zero trust security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/\",\"name\":\"Microsegmentation: The Next Evolution in Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-03.png\",\"datePublished\":\"2020-10-23T22:25:32+00:00\",\"dateModified\":\"2023-05-12T15:51:29+00:00\",\"description\":\"Microsegmentation is a method for creating granular secure zones in software-defined networks to protect lateral traffic. Learn benefits now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-03.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-03.png\",\"width\":2376,\"height\":1189},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsegmentation: The Next Evolution in Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fcdece1299767aff305bb146ab672b20\",\"name\":\"Kyle Guercio\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a28973bbf29322be5ea89bd09def6a83?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a28973bbf29322be5ea89bd09def6a83?s=96&d=blank&r=g\",\"caption\":\"Kyle Guercio\"},\"description\":\"Kyle Guercio has worked in content creation for six years contributing blog posts, featured news articles, press releases, white papers, and more for a wide variety of subjects in the technology space. He covers topics relating to servers and cybersecurity and has contributed to ServerWatch and Webopedia.com.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/kyle-guercio\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsegmentation: The Next Evolution in Cybersecurity","description":"Microsegmentation is a method for creating granular secure zones in software-defined networks to protect lateral traffic. Learn benefits now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/","og_locale":"en_US","og_type":"article","og_title":"Microsegmentation: The Next Evolution in Cybersecurity","og_description":"Microsegmentation is a method for creating granular secure zones in software-defined networks to protect lateral traffic. Learn benefits now.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/","og_site_name":"eSecurity Planet","article_published_time":"2020-10-23T22:25:32+00:00","article_modified_time":"2023-05-12T15:51:29+00:00","og_image":[{"width":2376,"height":1189,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-03.png","type":"image\/png"}],"author":"Kyle Guercio","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Kyle Guercio","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/"},"author":{"name":"Kyle Guercio","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fcdece1299767aff305bb146ab672b20"},"headline":"Microsegmentation: The Next Evolution in Cybersecurity","datePublished":"2020-10-23T22:25:32+00:00","dateModified":"2023-05-12T15:51:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/"},"wordCount":1438,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-03.png","keywords":["FAQ","microsegmentation","zero trust security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/","url":"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/","name":"Microsegmentation: The Next Evolution in Cybersecurity","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-03.png","datePublished":"2020-10-23T22:25:32+00:00","dateModified":"2023-05-12T15:51:29+00:00","description":"Microsegmentation is a method for creating granular secure zones in software-defined networks to protect lateral traffic. Learn benefits now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-03.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/ESP_MicroSeg_01-03.png","width":2376,"height":1189},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Microsegmentation: The Next Evolution in Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fcdece1299767aff305bb146ab672b20","name":"Kyle Guercio","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a28973bbf29322be5ea89bd09def6a83?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a28973bbf29322be5ea89bd09def6a83?s=96&d=blank&r=g","caption":"Kyle Guercio"},"description":"Kyle Guercio has worked in content creation for six years contributing blog posts, featured news articles, press releases, white papers, and more for a wide variety of subjects in the technology space. He covers topics relating to servers and cybersecurity and has contributed to ServerWatch and Webopedia.com.","url":"https:\/\/www.esecurityplanet.com\/author\/kyle-guercio\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/17812"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/161"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=17812"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/17812\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/17884"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=17812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=17812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=17812"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=17812"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=17812"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=17812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}