The State of Segmentation in Security Architectures

"Recent data breaches have seen cybercriminals siphon off millions of records containing personally identifiable information and credit as well as debit card data, which is taking a major toll on company profits and customer loyalty. To identify the gaps in IT security that allow hackers to steal so much data, a joint UBM Tech and Certes Networks survey asked security experts how the protect their sensitive data, and specifically how they ploy segmentation technologies to shrink their attack surfaces and reduce the damage caused by a data breach.Segmentation is commonly understood as the practice of dividing or separating IT resources into their own logical or physical domains, often for the purpose of simplifying traffic management or providing security. The survey and this analysis paper focus primarily on segmentation of networks and enterprise applications that are shared on networks. 
In this report, we examine the role of segmentation in containing breaches and how it can be done more effectively. We explore the possible shortcomings of segmentation that is tied to network infrastructure. Finally, we discuss a ""software-defined"" approach to segmenting applications that decouples security enforcement from the underlying network or infrastructure and enables an enterprise to contain breaches and minimize damage should an attack occur. Download this research report to learn more.

Spotlight

ISON Group Africa

ISON is a leading pan-African IT and BPO services company with presence in 25 countries in Africa, Middle East and ASEAN and an employee strength of over 10,000+ employees. ISON capitalizes on the strength of its core expertise and capabilities to service Telecom Service Providers, Financial Services, Government, Retail and Tower Infrastructure Providers sectors. We leverage our deep domain and delivery expertise, methodologies and frameworks, partnerships and technology alliances to provide turnkey Services – Design, Build and Manage. Our robust BPO services infrastructure is built on global delivery platform to deliver Voice, Non-Voice and KPO services. We are ISO 27001(BS 7799), ISO 9001:2008 compliant organization.

OTHER WHITEPAPERS
news image

Zero Trust Maturity Model

whitePaper | April 28, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

The ‘Zero Trust’ Model in Cybersecurity: Towards understanding and deployment

whitePaper | August 24, 2022

In the last couple of years, “zero trust” has gained significant traction in the cybersecurity realm as a means to protect networks and increase security across organizations. In part, the growing popularity of this security model can be attributed to the shift to hybrid working practices that call for a more secure work environment whether on- or off-premises.

Read More
news image

Cloud Privilege Broker 22.1 Security Whitepaper

whitePaper | September 15, 2022

There is complete end-to-end encryption from BeyondInsight with Cloud Privilege Broker through to the Cloud Platform Infrastructure. Cloud Privilege Broker services communicate with each other through distributed queues over TLS encryption.

Read More
news image

Acronis Cyber Protection Operation Centers Report: Ransomware dominates threat landscape

whitePaper | November 24, 2022

Acronis was the first company to implement complete integrated cyber protection to protect all data, applications and systems. Cyber protection requires the researching and monitoring of threats, as well as abiding by the five vectors of safety, accessibility, privacy, authenticity and security, or SAPAS. As part of the strategy, we’ve established four Cyber Protection Operation Centers (CPOCs) around the world to monitor and research cyberthreats 24/7.

Read More
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More
news image

Cybersecurity Considerations in Autonomous Ships

whitePaper | October 18, 2022

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO-accredited knowledge hub offering a unique interdisciplinary approach to the most relevant issues in cyber defence.

Read More

Spotlight

ISON Group Africa

ISON is a leading pan-African IT and BPO services company with presence in 25 countries in Africa, Middle East and ASEAN and an employee strength of over 10,000+ employees. ISON capitalizes on the strength of its core expertise and capabilities to service Telecom Service Providers, Financial Services, Government, Retail and Tower Infrastructure Providers sectors. We leverage our deep domain and delivery expertise, methodologies and frameworks, partnerships and technology alliances to provide turnkey Services – Design, Build and Manage. Our robust BPO services infrastructure is built on global delivery platform to deliver Voice, Non-Voice and KPO services. We are ISO 27001(BS 7799), ISO 9001:2008 compliant organization.

Events