{"id":19928,"date":"2021-11-10T21:38:00","date_gmt":"2021-11-10T21:38:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19928"},"modified":"2021-11-10T21:41:27","modified_gmt":"2021-11-10T21:41:27","slug":"microsegmentation-is-catching-on-as-key-to-zero-trust","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/","title":{"rendered":"Microsegmentation Is Catching On as Key to Zero Trust"},"content":{"rendered":"<p>For a security technology that&#8217;s only a few years old, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/\">microsegmentation<\/a> is catching on quickly.<\/p>\n<p>According to a new report from edge security vendor Byos, 88 percent of cybersecurity leaders believe microsegmentation is essential to achieving <a href=\"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/\">zero trust<\/a> security, and 83 percent are currently leveraging microsegmentation in some form.<\/p>\n<p>Despite such strong uptake, the market still has plenty of room to grow, the report found: only 17 percent have fully invested in microsegmentation to the point that they believe they&#8217;ve successfully achieved zero trust.<\/p>\n<p>Those findings appear in <a href=\"https:\/\/www.byos.io\/state-of-microsegmentation\" target=\"_blank\" rel=\"noopener\"><em>The State of Microsegmentation in Network Security<\/em><\/a>, a Byos report that details the results of a Q3 2021 survey of 100 cybersecurity leaders. In an interview with <em>eSecurity Planet<\/em>, Byos founder and CEO Matias Katz discussed the findings and their implications for <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-security-tools\/\">network security<\/a> in general.<\/p>\n<p>Microsegmentation is needed, Katz said, because traditional security measures simply aren&#8217;t sufficient to meet many of today&#8217;s challenges.<\/p>\n<p>&#8220;The whole idea of microsegmentation is to give customers more control \u2013 to get faster, more efficient access to controlled assets without having to choose between exposing them too much or not having access to them at all,&#8221; he said.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-implement-microsegmentation\/\">How to Implement Microsegmentation<\/a><\/p>\n<h2>Critical Infrastructure, IIoT a Good Fit<\/h2>\n<p>The idea of walling off the most critical assets in a network is a particularly good fit for <a href=\"https:\/\/www.esecurityplanet.com\/networks\/critical-infrastructure-protection-physical-cybersecurity\/\">critical infrastructure<\/a> and industrial IoT, in which a wide range of legacy devices simply aren&#8217;t able to run traditional <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">EDR software<\/a>.<\/p>\n<p>&#8220;You have energy, oil and gas, healthcare, defense, that have broader perimeters where you have 20, 30, 50 controllers that are controlling either human life or energy, and they have no protection,&#8221; Katz said. &#8220;The companies are reliant on the perimeter.&#8221;<\/p>\n<p>In cases like that, an attacker just has to breach the perimeter and they&#8217;re one hop away from total control. &#8220;But you can create microsegments that isolate those controllers from the rest of the planet, so they&#8217;re not visible even if you breach the big perimeter,&#8221; Katz said. &#8220;And you also get different chokehold points where you can control the type of traffic that&#8217;s allowed in or out, in a microsegment as small as even one endpoint if you want to.&#8221;<\/p>\n<p>Companies are increasingly aware of the importance of that kind of functionality. Fully 92 percent of survey respondents believe microsegmentation is more practical and efficient than alternatives, 93 percent say it&#8217;s integral for <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/iot-device-risk-to-enterprises\/\">IoT security<\/a>, 88 percent believe it helps ensure effective security policy management, and 89 percent view it as a way to streamline challenges associated with <a href=\"https:\/\/www.esecurityplanet.com\/networks\/security-compliance\/\">regulatory compliance<\/a>.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\">Top Microsegmentation Solutions<\/a><\/p>\n<h2>Microsegmentation Benefits Misunderstood<\/h2>\n<p>Still, Katz said he was surprised by the survey results regarding top microsegmentation features by demand. Table stakes, according to respondents, include real-time threat management (76 percent), secure remote access (67 percent), a <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> kill switch (62 percent), and zero-touch deployment (57 percent). Legacy technology protection came last, cited by just 43 percent of respondents.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-19931\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/microseg-features.png\" alt=\"microsegmentation benefits\" width=\"512\" height=\"318\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/microseg-features.png 512w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/microseg-features-300x186.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/microseg-features-150x93.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/p>\n<p>Katz disagrees with those priorities, which he ascribes to too many respondents simply parroting popular security vendors&#8217; marketing strategies. &#8220;If you look at the last five big breaches, they had nothing to do with secure remote access, they had nothing to do with a zero-touch deployment,&#8221; he said. &#8220;They had more to do with the fact that they had legacy devices that handled critical infrastructure.&#8221;<\/p>\n<p>And while real-time threat management is of course a key consideration for network security, Katz said, that&#8217;s also achievable from countless other security vendors and tools. &#8220;That&#8217;s great \u2013 we still need that \u2013 but there are other things like legacy protection that are being forgotten,&#8221; he said.<\/p>\n<h2>Telcos Falling Behind<\/h2>\n<p>The survey also found that while 95 percent of respondents in manufacturing, 92 percent in information and data services, 92 percent in finance and insurance, and 80 percent in healthcare and social assistance have already adopted microsegmentation, less than 30 percent in telecommunications have done so.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-19930\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/microseg-adoption.png\" alt=\"microsegmentation by industry\" width=\"512\" height=\"318\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/microseg-adoption.png 512w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/microseg-adoption-300x186.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/microseg-adoption-150x93.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/p>\n<p>Katz suggested that&#8217;s attributable to that industry&#8217;s focus on communication, which inevitably makes those companies a little slower to implement barriers. &#8220;If you look at telcos, it&#8217;s all about the bigger picture,&#8221; he said. &#8220;It&#8217;s all about the broad network and communication, and the concept of creating microsegments goes against the current of what they&#8217;re trying to build. So I assume that it&#8217;s perceived as an operational or business risk to them.&#8221;<\/p>\n<p>That&#8217;s a very different focus from, say, healthcare and social assistance. &#8220;If you&#8217;re a hospital, then you&#8217;re not in the business of communication \u2013 you&#8217;re in the business of protecting patients, and communication is just one of the checklists,&#8221; he said. &#8220;In telcos, it&#8217;s the number one: how do we keep this open and working? Adding roadblocks to that might be perceived as a challenge, and also expensive.&#8221;<\/p>\n<h2>A Necessary Cost<\/h2>\n<p>Expense is a common concern. Across all verticals, 29 percent of companies that haven&#8217;t yet implemented microsegmentation listed cost as the key barrier to adoption. Other barriers cited included lack of personnel (35 percent), network complexity (35 percent), and lack of time (29 percent).<\/p>\n<p>Still, Katz said microsegmentation should really be seen as something like a seatbelt \u2013 you use it not because you want to, but because you know it keeps you safe. &#8220;It&#8217;s a little bit about biting the bullet and accepting that if you want to have a distributed workforce, if you want to have <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/\">work-from-home<\/a>, if you want to adapt to this post-Covid era where everyone works from wherever, there&#8217;s a couple of extra steps that you need to take,&#8221; he said.<\/p>\n<p>Katz acknowledged that for most companies, doing so represents an added expense. &#8220;My recommendation would be that they accept that there&#8217;s going to be new money needed to be added to the budget to cover this, because of the newly added exposure caused by a distributed workforce and legacy equipment,&#8221; he said.<\/p>\n<p>That new exposure is based both on a new focus on critical infrastructure as a target, and on a massive surge in remote working, which exposes company-issued computers to new threats. &#8220;If one of your employees has a barbecue and they invite 25 guests, now you as a CISO have 25 strangers that have direct access to a company-issue computer, which has to be allowed access to the corporate office because that employee works from home,&#8221; Katz said. &#8220;Those are new risks, and there needs to be new budgets for that.&#8221;<\/p>\n<p>Further reading: <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">Best Zero Trust Security Solutions<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6db4b39cce-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6db4b39cce\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6db4b39cce\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6db4b39cce\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6db4b39cce\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6db4b39cce\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6db4b39cce\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>For a security technology that&#8217;s only a few years old, microsegmentation is catching on quickly. According to a new report from edge security vendor Byos, 88 percent of cybersecurity leaders believe microsegmentation is essential to achieving zero trust security, and 83 percent are currently leveraging microsegmentation in some form. Despite such strong uptake, the market [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":19930,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[23887,30581],"b2b_audience":[33],"b2b_industry":[53,57],"b2b_product":[395,381],"class_list":["post-19928","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-microsegmentation","tag-zero-trust-security","b2b_audience-awareness-and-consideration","b2b_industry-energy","b2b_industry-healthcare","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-network-access-control-nac"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsegmentation Is Catching On as Key to Zero Trust | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"A remarkable 83% of companies are already using microsegmentation, a new survey found, but important gains lie ahead.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsegmentation Is Catching On as Key to Zero Trust | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"A remarkable 83% of companies are already using microsegmentation, a new survey found, but important gains lie ahead.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-10T21:38:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-10T21:41:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/microseg-adoption.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"318\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"Microsegmentation Is Catching On as Key to Zero Trust\",\"datePublished\":\"2021-11-10T21:38:00+00:00\",\"dateModified\":\"2021-11-10T21:41:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/\"},\"wordCount\":1071,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/microseg-adoption.png\",\"keywords\":[\"microsegmentation\",\"zero trust security\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/\",\"name\":\"Microsegmentation Is Catching On as Key to Zero Trust | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/microseg-adoption.png\",\"datePublished\":\"2021-11-10T21:38:00+00:00\",\"dateModified\":\"2021-11-10T21:41:27+00:00\",\"description\":\"A remarkable 83% of companies are already using microsegmentation, a new survey found, but important gains lie ahead.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/microseg-adoption.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/microseg-adoption.png\",\"width\":512,\"height\":318,\"caption\":\"microsegmentation by industry\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsegmentation Is Catching On as Key to Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsegmentation Is Catching On as Key to Zero Trust | eSecurity Planet","description":"A remarkable 83% of companies are already using microsegmentation, a new survey found, but important gains lie ahead.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/","og_locale":"en_US","og_type":"article","og_title":"Microsegmentation Is Catching On as Key to Zero Trust | eSecurity Planet","og_description":"A remarkable 83% of companies are already using microsegmentation, a new survey found, but important gains lie ahead.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/","og_site_name":"eSecurity Planet","article_published_time":"2021-11-10T21:38:00+00:00","article_modified_time":"2021-11-10T21:41:27+00:00","og_image":[{"width":512,"height":318,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/microseg-adoption.png","type":"image\/png"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"Microsegmentation Is Catching On as Key to Zero Trust","datePublished":"2021-11-10T21:38:00+00:00","dateModified":"2021-11-10T21:41:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/"},"wordCount":1071,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/microseg-adoption.png","keywords":["microsegmentation","zero trust security"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/","url":"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/","name":"Microsegmentation Is Catching On as Key to Zero Trust | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/microseg-adoption.png","datePublished":"2021-11-10T21:38:00+00:00","dateModified":"2021-11-10T21:41:27+00:00","description":"A remarkable 83% of companies are already using microsegmentation, a new survey found, but important gains lie ahead.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/microseg-adoption.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/microseg-adoption.png","width":512,"height":318,"caption":"microsegmentation by industry"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Microsegmentation Is Catching On as Key to Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19928"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19928"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19928\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19930"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19928"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19928"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19928"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}