SlideShare a Scribd company logo
8
Most read
16
Most read
Definition: Micro-segmentation is the art of using software-defined 
policies, instead of hardware network configurations, to make 
network security more flexible. It can only work if implemented 
with right tools and forethought.
FIELDENGINEER.COM
A GLOBAL ON-DEMAND FREELANCE MARKETPLACE FOR THE TELECOM INDUSTRY
WHAT IS MICRO
SEGMENTATION?
There are four architectural 
models used in micro 
segmentation. 
They are:
1. Hybrid model
 It is a combination of third-party and native controls.
2. Overlay model 
Usually uses a type of software or agent within every host, instead 
of using moderating communications. Vendors of this model include 
Unisys, vArmour, Vmware NSX, ShieldX, Juniper, Illumio, 
Guardicore, Drawbridge Networks, CloudPassage, and Cisco.
3. Third-party model 
Mainly based on a virtual firewall presented by third-party firewall 
vendors. They include Huawei, Sophos, SonicWall, Palo Alto, 
Juniper, Fortinet, Checkpoint, and Cisco.
4. Native model 
Makes use of included or inherent capabilities provided within 
various areas such as infrastructure, operating hypervisor/system, 
IaaS, or virtualization platform.
Benefits of Micro
segmentation
Now you know what is micro segmentation. The next step is 
getting information on its benefits. This will help you understand 
why it is important in data centers and other IT/ICT platforms. 
The following are benefits of micro segmentation.
1. Extensibility
Security administrators depend on micro segmentation to make adaptations to 
unfolding new scenarios, as threat topologies in data center are constantly changing 
and micro segmentation ensures sharing of intelligence between security functions 
is enabled. The end result is a security infrastructure working concertedly to design 
response to different situations.
2. Ubiquity
Managing and deploying traditional security in virtual networking is costly. 
The cost forces data center administrators to ration security. Intruders take 
advantage of the low security in low-priority systems to infiltrate the data 
center. To have a sufficient defense level, security administrators rely on 
micro segmentation because it embeds security functions into the 
infrastructure itself.
3. Persistence
Due to constant changes in data center topologies like workloads are 
moved, server pools are expanded, networks are re-numbered and so 
on the constants in all this change are need for security and the workload.
With micro segmentation administrators can describe inherent characteristics 
of a workload instead of depending on IP address. The information is then tied 
back to the security policy. Once this is done, the policy can answer questions 
such as: what kind of data will this workload handle (personally identifiable 
information, financial, or low-sensitivity)?, or what will the workload be used 
for (production, staging, or development)? Additionally, administrators can 
combine these characteristics to describe inherited policy attributes. For 
instance, a production workload handling financial data may get a higher 
level of security than a workload handling financial data.
How to Make 
Micro Segmentation Work
Similar to conventional virtualization, there are many ways to implement network 
micro segmentation. Basically, there are three major considerations when it 
comes to adoption of micro segmentation technology they are:
1. Visibility
Potential adopters need to thoroughly understand communication 
patterns and network traffic flow within, from, and to the data center.
2. Zero trust approach
This is a complete lock down of communications. Throughout the 
deployment of micro segmentation, zero-trust policies should be 
followed. Across the network, communication should be only allowed 
carefully using the results of previous analysis. It is the best practice 
for anyone who wants to ensure application security and connectivity.
3. Repeat the process regularly
Distilling rules and analyzing traffic is not a deployment effort that is 
done once. It needs to be a continuous activity that has to be done 
often to make sure policies and workloads do not change suddenly 
and any current analytical results can be used to effectively tune micro 
segmentation rules. Current analytical results may come from changes 
in traffic patterns or new applications. All these are consideration putting 
an emphasis on the choice of tools and hypervisor used in micro 
segmentation facilitation.
Secure your data center 
A well protected data center requires micro segmentation rules.
With filedengineer.com its finally possible to hire freelance data 
center engineers to implement micro segmentation.
www.fieldengineer.com
Field Engineer 
77 Water Street, Suite 7000, New York, NY 10005 USA
GET THE APP
FIELDENGINEER.COM
A GLOBAL ON-DEMAND FREELANCE
MARKETPLACE
FOR THE TELECOM INDUSTRY

More Related Content

PPTX
2019 02-20 micro-segmentation based network security strategies (yoni geva)
PPTX
What is Virtualization
PPTX
Nutanix
PPTX
Virtualization 101
PPT
Cisco Product & Solutions Overview
PPTX
Microsoft Azure in 5 minutes
PDF
NF101: Nutanix 101
PPTX
Cloud computing
2019 02-20 micro-segmentation based network security strategies (yoni geva)
What is Virtualization
Nutanix
Virtualization 101
Cisco Product & Solutions Overview
Microsoft Azure in 5 minutes
NF101: Nutanix 101
Cloud computing

What's hot (20)

PDF
Hybrid cloud overview and VCF on VxRAIL
PDF
VMware Tanzu Introduction
PDF
An Introduction to VMware NSX
PPT
VMware Presentation
PPTX
Cloud security and security architecture
PPTX
VMware vSphere+ and vSAN+ Pricing and Packaging Partner Facing Deck EN (1).pptx
PPTX
Segmenting your Network for Security - The Good, the Bad and the Ugly
PDF
Vmware virtualization in data centers
PDF
Cloud Security: A New Perspective
PPTX
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
PPT
Cloud computing
PPTX
VMware vSphere technical presentation
PDF
Dell Technologies Dell EMC ISG Storage, CI, HCI and Data Protection Portfolio...
PPTX
Cloud Computing for college presenation project.
PPTX
Virtual Infrastructure Overview
PPTX
Proxmox for DevOps
PPTX
Cloud computing
PPT
Honeypot honeynet
PDF
Dell Technologies - The Complete ISG Hardware Portfolio
PDF
VMware NSX 101: What, Why & How
Hybrid cloud overview and VCF on VxRAIL
VMware Tanzu Introduction
An Introduction to VMware NSX
VMware Presentation
Cloud security and security architecture
VMware vSphere+ and vSAN+ Pricing and Packaging Partner Facing Deck EN (1).pptx
Segmenting your Network for Security - The Good, the Bad and the Ugly
Vmware virtualization in data centers
Cloud Security: A New Perspective
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
Cloud computing
VMware vSphere technical presentation
Dell Technologies Dell EMC ISG Storage, CI, HCI and Data Protection Portfolio...
Cloud Computing for college presenation project.
Virtual Infrastructure Overview
Proxmox for DevOps
Cloud computing
Honeypot honeynet
Dell Technologies - The Complete ISG Hardware Portfolio
VMware NSX 101: What, Why & How
Ad

Similar to What is micro segmentation? (20)

DOCX
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
PDF
Trends & Innovations in Next-Gen Firewall Solutions
PDF
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
PDF
Ultimate Guide to Choosing Zero Trust Security Vendors.pdf
PDF
Blueprint for Cyber Security Zone Modeling
PPTX
Fadi El Moussa Secure Cloud 2012 V2
PDF
Essential Features of Modern Firewall Systems
PDF
eBook-enterprise-firewall-Technology.pdf
PDF
Understanding Next-Generation Firewalls (NGFW): The Future of Cybersecurity M...
PDF
A New Trust Model for 5G Networks
PDF
The Growing Network Firewall Market_ Trends, Challenges, and Future Outlook.pdf
PDF
Block Armour Brochure
PDF
Block Armour Brochure
PDF
Windstream Hosted Solutions: Public Cloud Security
PDF
Crush Cloud Complexity, Simplify Security - Shield X
PPTX
Exploring Innovations in Next-Gen Firewall Technology
PDF
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
PDF
Why the SonicWall Next-Generation Firewall is Essential for Modern Network Se...
PPTX
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
Trends & Innovations in Next-Gen Firewall Solutions
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Ultimate Guide to Choosing Zero Trust Security Vendors.pdf
Blueprint for Cyber Security Zone Modeling
Fadi El Moussa Secure Cloud 2012 V2
Essential Features of Modern Firewall Systems
eBook-enterprise-firewall-Technology.pdf
Understanding Next-Generation Firewalls (NGFW): The Future of Cybersecurity M...
A New Trust Model for 5G Networks
The Growing Network Firewall Market_ Trends, Challenges, and Future Outlook.pdf
Block Armour Brochure
Block Armour Brochure
Windstream Hosted Solutions: Public Cloud Security
Crush Cloud Complexity, Simplify Security - Shield X
Exploring Innovations in Next-Gen Firewall Technology
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Why the SonicWall Next-Generation Firewall is Essential for Modern Network Se...
Ad

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Electronic commerce courselecture one. Pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Modernizing your data center with Dell and AMD
PPT
Teaching material agriculture food technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation theory and applications.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Network Security Unit 5.pdf for BCA BBA.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Understanding_Digital_Forensics_Presentation.pptx
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Electronic commerce courselecture one. Pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Modernizing your data center with Dell and AMD
Teaching material agriculture food technology
Machine learning based COVID-19 study performance prediction
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation theory and applications.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Building Integrated photovoltaic BIPV_UPV.pdf
A Presentation on Artificial Intelligence
Cloud computing and distributed systems.
Encapsulation_ Review paper, used for researhc scholars
Dropbox Q2 2025 Financial Results & Investor Presentation
Network Security Unit 5.pdf for BCA BBA.

What is micro segmentation?