Intelligent CXO Issue 14 - Page 12

LATEST INTELLIGENCE

HOW TO BUILD A MICRO- SEGMENTATION STRATEGY

PRESENTED BY
DOWNLOAD
WHITEPAPERS AT : www . intelligentcxo . com / whitepapers

M

Micro-Segmentation and Your Security Strategy
Why micro-segmentation ? The perimeter doesn ’ t stop all bad actors from making it inside data centers and cloud environments . Regardless of how many detection technologies organizations use , something is bound to get through – a new virus , phishing emails , or a bad actor working at a company . Micro-segmentation reduces your attack surface , frustrates intruders , can be used as a compensating control against vulnerabilities , and hardens your data center .
Let ’ s talk about breaches .
When intruders breach your perimeter , they most often enter at a low-value asset or environment – your development environment , a contractor ’ s network , a low-value application , an unpatched server , or connected non-compute devices like HVAC systems or sensors .
To cause damage to your organization , they first have to reach critical data or systems , and to do this , they move laterally through your environment .
Unfortunately , intruders can often reach highvalue targets because connectivity is wide open within most data centers and clouds .
This means that if intruders find a way in , they often spend days and even months moving laterally inside data centers and cloud environments , undetected , until reaching their goal to cause harm and steal valuable data . x
12 www . intelligentcxo . com