Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Micro-Segmentation: A Better Way to Defend the Data Center

    By
    Chris Preimesberger
    -
    July 28, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Micro-Segmentation: A Better Way to Defend the Data Center

      1 - Micro-Segmentation: A Better Way to Defend the Data Center

      eWEEK examines the top 10 reasons why micro-segmentation can provide greater security than conventional approaches within the data center.

      2New Security for East-West Traffic

      2 - New Security for East-West Traffic

      The legacy security model is hard on the outside but soft on the inside. Once attackers get through perimeter security, they have easy access to internal infrastructure, workloads and data, exfiltrating sensitive and valuable data without check. Micro-segmentation combats this access by securing workloads, data and data access at the source, providing deep internal security of corporate and consumer data where it resides.

      3Zero Trust Security

      3 - Zero Trust Security

      In the micro-segmentation model, there is no default trust for any entity—users, devices, applications and network—regardless of placement or location. The entire mechanism is based on denying all communication until explicitly allowed (via explicit policies) and permitting only what is necessary from trusted sources. This ensures protection from lateral or horizontal infiltration.

      4Application-Aware Security

      4 - Application-Aware Security

      Micro-segmentation policy groups are generally created based on application tiers, workload profiles, placement zones and other factors. They are not based on rigid IP addresses or subnets. Policies also are enforced right at the virtual machines or containers hosting the application tiers. Workloads and data access are secured at the source as an application-centric security model.

      5Fine-Grained Network Control

      5 - Fine-Grained Network Control

      Perimeter security is a heavy hammer approach. If a certain asset or group of virtual machines is deemed more vulnerable than others, micro-segmentation allows for fine-grained firewalls and security policies to be deployed, ensuring a greater level of security on the most important data center assets while allowing flexibility for others.

      6Deep Protection by Isolation

      6 - Deep Protection by Isolation

      In the event of a breach, micro-segmentation promises to isolate and quarantine the infected machines and devices, thus containing the breach to a smaller fault domain and preventing unfettered lateral access to uncompromised systems and data. IT can focus its efforts on the compromised assets to identify the vulnerability while the remaining network continues to work unabated. All this happens seamlessly in real time.

      7Define Once, Deploy Multiple Times

      7 - Define Once, Deploy Multiple Times

      With proper micro-segmentation planning, security groups, their membership, their hierarchy and inheritance can all be specified centrally and pre-provisioned. At runtime, virtual machines and workloads simply inherit the proper membership and policies, regardless of when and where they come to life within the data center.

      8Enhanced Mobility of Workloads

      8 - Enhanced Mobility of Workloads

      Micro-segmentation enables greater mobility of workloads, within the data center and into the cloud. Firewall rules move alongside the virtual machines as they run from host to host and between clouds, ensuring consistent protection at all times. This enables operators to better eliminate vulnerabilities and enact preventative measures ahead of the hackers.

      9Improved and Automated Firewall Management

      9 - Improved and Automated Firewall Management

      Coupled with the right monitoring and operational model, micro-segmentation provides data center operators with deeper visibility into security posture and helps automate maintenance. If a particular virtual machine gets deleted, the firewall rules associated with that VM get deleted as well. This in turn ensures that the firewall rule base is kept up to date and uncluttered with unused, unwanted rules and updates that become increasingly hard to decipher.

      10DevOps Alignment

      10 - DevOps Alignment

      Micro-segmentation allows application owners to be responsible for their own app’s security while allowing them to see only what they are entitled to see. This allows operators to analyze and manage applications more effectively and efficiently, without being granted universal control. These specific security clearances can prevent insider attacks and interference by barring actors from moving beyond individual purview.

      11High Agility and OPEX Efficiency

      11 - High Agility and OPEX Efficiency

      Breaches in data centers can remain undetected for extended periods of time. Micro-segmentation enables the data center to be far more agile and quick to react with the ability to identify the breach almost immediately and to contain it within a narrow fault domain. At the same time, its multiple layers of security help to slow the attack’s spread and enable operators to lock down the hacker and secure uncompromised data at a faster rate. It’s a more agile, cost-effective approach to security.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.