This resource is no longer available

Cover Image

In today’s rapidly evolving IT landscape, organizations can no longer rely on perimeter protection as a defense against cyberthreats. Lateral threats, or threats that move within the network, are becoming more common.

To combat these threats, micro-segmentation is emerging as an effective way to visualize and manage lateral traffic. This article provides an overview of the pros and cons of the 3 primary approaches to micro-segmentation, which include:

  • Network-based micro-segmentation
  • Hypervisor-based micro-segmentation
  • Host-based micro-segmentation
Vendor:
ColorTokens
Posted:
Dec 22, 2021
Published:
Apr 22, 2020
Format:
HTML
Type:
Resource

This resource is no longer available.