Content area
Full text
As IT environments have gotten more distributed and dynamic, the use of real-time visibility and microsegmentation has grown. Many traditional security tools aren’t agile enough to secure businesses where changes have become the norm. For example, if an application developer spins up a container, it needs to be protected, but the length of time it takes to deploy something like a firewall is far too long to secure it.
Microsegmentation has many use cases
Microsegmentation functions as an overlay to the physical infrastructure and can dynamically change as the environment evolves. The most common use cases for microsegmentation is ring-fencing high-value applications. Other use cases include environmental separation, workload and application migration, and securing hybrid infrastructure.
An easy way to think about microsegmentation versus other security technologies is that it prevents the spread of breaches by isolating application components. But it doesn’t actually get rid of the problem. That’s left to compensating control tools, such as intrusion detection and prevention systems.
The biggest inhibitor to the deployment of microsegmentation is that security professionals don’t know what to segment. Application environments have grown increasingly complex, and understanding how to apply the segmentation can be a difficult-to-impossible task.





