The rise of software-defined networks and network virtualization has paved the way for micro-segmentation. It’s a security technique that enables fine-grained policies to be assigned to isolated workloads within a data center or cloud deployment. Micro-segmentation is often called a “zero-trust model” of virtualized security, meaning that only necessary actions and connections are specifically enabled in a workload or application, and everything else is blocked. This reduces the network attack surface by limiting east-west communication by applying very granular security controls. The process essentially creates a software-defined workload-level perimeter, regardless of whether it involves a virtual machine (VM), container or function.


How to Avoid These Five Common, but Costly Micro-Segmentation Mistakes – Part 4

Tempered Networks profile picture

Tempered Networks

Wednesday, February 28, 2018

Mistake #4: Underestimating the Scope of Your Segmentation Needs

 

The world’s leading technology research and advisory company, Gartner, Inc. recently reported a rise of 31 percent in connected “things” worldwide from 2016 to 2017, which amounts to nearly 8.4 billion connected things last year.

Exp...

How to Avoid These Five Common, but Costly Micro-Segmentation Mistakes – Part 3

Tempered Networks profile picture

Tempered Networks

Wednesday, February 21, 2018

Mistake #3: Separating Cloaking, Connectivity, and Encryption

 

A workable and effective solution for micro-segmentation comes down to the following simple mathematical formula:

Cloaking + Connectivity + Encryption = Successful Micro-Segmentation Solution (SMSS)

Take away any of those three...

How to Avoid These Five Common, but Costly Micro-Segmentation Mistakes – Part 2

Tempered Networks profile picture

Tempered Networks

Tuesday, February 13, 2018

Mistake #2: ACLs–A set of rules that are made to be broken

 

There’s an old saying that confidently declares, “Rules are made to be broken.” It’s mostly attributed to American five-star general and hero of WW II, Douglas MacArthur. In the right context, it’s meant to be a motivational message,...

How to Avoid These Five Common, but Costly Micro-Segmentation Mistakes – Part 1

Tempered Networks profile picture

Tempered Networks

Friday, February 9, 2018

 Part One: Mistaking VLANs for Micro-Segmentation Solutions
 

Why do bad things happen to good segmentation projects?

We see it all the time; companies start with the noble notion to successfully implement hardened LAN and WAN micro-segmentation for their devices, networks, or environments. It...

Eliminating technical barriers for secure wide area micro-segmentation

Jeff Hussey profile picture

Jeff Hussey

President, CEO and Co-Founder

Thursday, June 29, 2017

On July 4, 1776, our founding fathers officially adopted the Declaration of Independence for the United States of America. Some of the most influential and remarkable words in the history of written communication were endorsed that day. They read as follows:

“We hold these truths to be self-evident,...