This resource is no longer available
In today’s rapidly evolving IT landscape, organizations can no longer rely on perimeter protection as a defense against cyberthreats. Lateral threats, or threats that move within the network, are becoming more common.
To combat these threats, micro-segmentation is emerging as an effective way to visualize and manage lateral traffic. This article provides an overview of the pros and cons of the 3 primary approaches to micro-segmentation, which include:
- Network-based micro-segmentation
- Hypervisor-based micro-segmentation
- Host-based micro-segmentation