https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • Analytics
    • Artificial Intelligence
    • Cloud
    • Data Centers
    • Desktop
    • IoT
    • Mobility
    • Networking
    • Open Source
    • RMM/PSA
    • Security
    • Virtualization
    • Voice/Connectivity
  • Strategy
    • Back
    • Best Practices
    • Business Models
    • Channel 101
    • Channel Programs
    • Channel Research
    • Digital Transformation
    • Diversity & Inclusion
    • Leadership
    • Mergers and Acquisitions
    • Sales & Marketing
    • Specialty Practices
  • MSSP Insider
    • Back
    • Business of Security
    • Cloud and Edge
    • Endpoint
    • Network
    • People and Careers
    • Training and Policies
  • MSP 501
    • Back
    • 2020 MSP 501 Rankings
    • 2020 Hot 101 Rankings
    • 2020 MSP 501 Report
  • Intelligence
    • Back
    • Our Sponsors
    • From the Industry
    • Content Resources
    • COVID-19 Partner Help
    • Galleries
    • Podcasts
    • Reports
    • Videos
    • Webinars
    • White Papers
  • EMEA
  • Awards
    • Back
    • Excellence in Digital Services
    • 2020 MSP 501
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Partners Evolution
    • Channel Evolution Europe
    • Channel Partners Event Coverage
    • Webinars
  • Channel Mentor
    • Back
    • Channel Market Intelligence
    • Channel Educational Series
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • Analytics
    • Artificial Intelligence
    • Cloud
    • Data Centers
    • Desktop
    • IoT
    • Mobility
    • Networking
    • Open Source
    • RMM/PSA
    • Security
    • Virtualization
    • Voice/Connectivity
  • Strategy
    • Back
    • Best Practices
    • Business Models
    • Channel 101
    • Channel Programs
    • Channel Research
    • Digital Transformation
    • Diversity & Inclusion
    • Leadership
    • Mergers and Acquisitions
    • Sales & Marketing
    • Specialty Practices
  • MSSP Insider
    • Back
    • Business of Security
    • Cloud and Edge
    • Endpoint
    • Network
    • People and Careers
    • Training and Policies
  • MSP 501
    • Back
    • 2020 MSP 501 Rankings
    • 2020 Hot 101 Rankings
    • 2020 MSP 501 Report
  • Intelligence
    • Back
    • Our Sponsors
    • From the Industry
    • Content Resources
    • COVID-19 Partner Help
    • Galleries
    • Podcasts
    • Reports
    • Videos
    • Webinars
    • White Papers
  • EMEA
  • Awards
    • Back
    • Excellence in Digital Services
    • 2020 MSP 501
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Partners Evolution
    • Channel Evolution Europe
    • Channel Partners Event Coverage
    • Webinars
  • Channel Mentor
    • Back
    • Channel Market Intelligence
    • Channel Educational Series
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Digital Service Providers
  • Cloud Service Providers
  • CHANNEL PARTNERS ONLINE
 Channel Futures

MSSP Insider


Shutterstock

Cybersecurity

Expand Customers’ Security Through Intent-Based Segmentation

  • Written by Jon Bove
  • March 7, 2019
Use network segmentation to fine-tune security, offering security technology with security services.

It’s not an overstatement to suggest that most of the security breaches your customers experience – or at the least, the impact of most those breaches – could be mitigated with one simple security strategy: network segmentation.

Traditional segmentation involves dynamically grouping and isolating network resources, devices, applications, transactions, and workflows from other assets. Security segmentation may restrict resources to a physical location, such as a specific building, floor, or lab; assign resources to one particular group or function, such as sales, engineering, or guest access; or be based on the type of device, such as a digital camera, inventory tag or server. It includes isolating data from unauthorized access, including automatically securing data coming from or headed to specific users, servers, data centers or other resources.

The first big challenge is identifying which devices, applications and data belong together. Security segmentation today, however, is about much more than creating VLANs and dropping devices and applications into them. In addition to limiting access to resources, today’s networks require segmentation to consistently secure and isolate data regardless of where it originates, what resources it needs to access along its transaction path or what its ultimate destination might be.

A sensitive workflow needs to be segmented and secured along its entire data path, even as it moves across and between a hybrid network environment of physical domains, such as a central campus, branch offices, remote devices and users, and multiple private and public cloud networks and services. And to make things more complicated, those workflows sometimes need to be able to move laterally across network segments. Implementing a successful segmentation strategy, especially in today’s dynamically shifting networks, can quickly overwhelm the resources of many of your customers.

Digital Shift Favors Segmentation

Many business drivers can make segmentation a logical choice. Classic challenges such as risk mitigation, meeting compliance requirements, improving security posture or even increasing operational efficiency can all be better addressed by adding segmentation to the security strategy. But digital transformation has made the value of intent-based segmentation (IBS) even greater, as it also can dynamically adapt and respond to network changes, rapid application development and deployment, and quickly evolving DevSecOps strategies.

For segmentation to operate effectively in today’s increasingly digital business environment, therefore, it needs to expand its functionality to include intent-based segmentation. This allows it to convert business objectives into security requirements automatically, then map those requirements to specific policies, and then enforce those policies along the entire data path using things like tagging. Accomplishing this requires adding machine learning to segmentation tools so that a security administrator can predefine policies, and advanced segmentation software can implement those policies based on its ability to interpret the business objectives of a workflow, application, or deployed device.

The Basics of Intent-Based Segmentation

It begins with trust. Because networks now span multiple ecosystems, trust needs to be established and maintained across complex environments. Every device in the network needs to be inventoried, monitored and tracked. In addition to using things like logging an IP address and implementing network access control, effective trust can be enhanced by leveraging things like business logic to establish tagging, while things like single-source management and fabric connectors enable the orchestration of …

  • Page 1
  • Page 2
Tags: MSPs Business of Security MSSP Insider Network

Related


  • Cloud security
    IT Facing Major Security Issues, But Cloud Security May Be Most Immense
    A number of reports point to security problems within client environments, but cloud could be the biggest.
  • Threats
    Despite SIEM Software Adoption, Threat Coverage Comes Up Short
    Enterprise SIEMs are unprepared for 84% of certain tactics and techniques.
  • Unveil
    Secureworks Debuts New MSSP Partner Track, Analytics Platform
    The MSSP track focuses on what's required to provide managed cybersecurity services.
  • Unemployment benefits application
    Cybercriminals Now Targeting Unemployment Benefit Claims
    More than 1 million Washington residents who filed for unemployment had their personal information stolen.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • Financial Sector Cyberattacks Rising with Bad Actors Raking in the Dough
  • Untangle Research: Breach Headlines to Prompt Increased Cybersecurity Spending
  • As Threats Soar, Biden Administration, CompTIA Prioritize Cybersecurity
  • Despite Drop in Data Breaches, Exposed Records Jump in 2020

Galleries

View all

Threat Protection Vendors: Why MSSPs Have to Ramp Up Efforts Right Now

February 23, 2021

Industry Perspectives

View all

Three Ways MSPs Can Improve Supply Chain Security

February 24, 2021

SASE: The Key to Mitigating Business Transformation Risk

February 22, 2021

Public Sector IT Funding Outlook for 2021–and What It Means for Our Reseller Partners

February 18, 2021

Webinars

View all

XDR and Why it Matters to MSPs

March 24, 2021

Top Security Trends Impacting Technology Security Providers In 2021

March 25, 2021

In Case of Emergency: The Importance of Proactive Critical Event Management

February 23, 2021
  • 1

White Papers

View all

Ready To Add Cutting Edge IoT Solutions To Your Portfolio?

February 25, 2021

What Is The Value Of Distribution For The Internet Of Things?

February 25, 2021

The Internet of Things (IoT): Where do You Begin?

February 25, 2021

Upcoming Events

View all

Channel Partners Virtual

March 2, 2021 - March 4, 2021

Channel Partners Conference & Expo

November 1, 2021 - November 4, 2021

Videos and Fastchats

View all

FASTCHAT: How SOAR Eliminates Security Challenges and Elevates Service Provider Revenues

January 6, 2021

Happy Holidays from Channel Partners & Channel Futures!

December 21, 2020

FASTCHAT: How Old, Unpatched Technologies Are Creating New Security Threats for MSPs and Their Customers

December 3, 2020

Twitter

ChannelFutures

Ready To Add Cutting Edge IoT Solutions To Your Portfolio? Read this white paper to learn how! @GetWirelessLLC… twitter.com/i/web/status/1…

February 25, 2021
ChannelFutures

What Is The Value Of Distribution For The Internet Of Things? This white paper will tell you @getwirelessllc… twitter.com/i/web/status/1…

February 25, 2021
ChannelFutures

The Internet of Things (IoT): Where do you begin? Read this white paper from @getwirelessLLC to find out… twitter.com/i/web/status/1…

February 25, 2021
ChannelFutures

5G Revolution or Evolution? @GetWirelessLLC dlvr.it/RtSzdZ https://t.co/Ot1F4s0tUq

February 25, 2021
ChannelFutures

#CPVirtual is going live in just 5 days! Get your pass before rates go up, and join us next week for the premier vi… twitter.com/i/web/status/1…

February 25, 2021
ChannelFutures

#ZeroTrust approach boosts #cybersecurity, aids #datalossprevention, says @tgravel. @appgatesecurity… twitter.com/i/web/status/1…

February 25, 2021
ChannelFutures

.@BlackBerry report shows rise in hacker-for-hire groups targeting #MSSPs. dlvr.it/RtQjD9 https://t.co/VYr5cEXCCm

February 25, 2021
ChannelFutures

.@PTsecurity_UK discovers #vulnerabilities in @VMware vCenter server. dlvr.it/RtQjD5 https://t.co/WQbn5SJdFL

February 25, 2021

MSSP Insider

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Channel Partners Online

Want more? Find more channel news and analysis on our sister site, Channel Partners.

Media Kit And Advertising

Want to reach our audience? Access our media kit

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Online
  • Channel Partners Events
  • MSP 501
  • MSSP Insider
  • IoT World Today
  • Webhostingtalk

WORKING WITH US

  • Contact
  • About us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X