WHAT IS MICRO-SEGMENTATION?
Micro-segmentation is the art of using software-defined policies, instead of hardware network configurations, to make network security more flexible. It can only work if implemented with right tools and forethought.
Models used in micro-segmentation
There are four architectural models used in micro segmentation. They are:
- Hybrid model - it is a combination of third-party and native controls
-
Overlay model - usually uses a type of software or agent within every host, instead of using moderating communications. Vendors of this model include Unisys, vArmour, VMware NSX, ShieldX, Juniper, Illumio, Guardicore, Drawbridge Networks, CloudPassage, and Cisco.
- Third-party model - based primarily on a virtual firewall submitted by third-party firewall vendors. They include Huawei, Sophos, SonicWall, Palo Alto, Juniper, Fortinet, Checkpoint, and Cisco.
-
Native model - makes use of included or inherent capabilities provided within various areas such as infrastructure, operating hypervisor / system, IaaS, or virtualization platform
Similar to conventional virtualization, there are many ways to implement network micro segmentation. In most scenarios, the existing protection mechanisms and legacy infrastructure are augmented systematically with new technologies, which include virtual firewalls and software defined networking . When it comes to adoption of micro segmentation. technology, there are three major considerations involved.
How to make micro segmentation work
https://www.fieldengineer.com/blogs/what-is-micro-segmentation/
WHAT IS MICRO-SEGMENTATION?