A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv Cybersecurity Dictionary Breadcrumb Home Cybersecurity Dictionary Micro-Segmentation What is Micro-Segmentation? Micro-segmentation is an emerging IT security best practice of implementing granular isolation (segmentation) policies between data center workloads. Micro-segmentation is a key tenant of the Zero Trust model that recommends workloads are isolated from one another to enhance security and simplify policy management. Once an attacker penetrates a security perimeter, there are generally fewer internal controls to restrict lateral (east-west) movement. Micro-segmentation can help prevent a bad actor from gaining a foothold on one trusted resource and using that position to exploit other resources. This approach becomes increasingly important for cloud resources, since these are often shared by workloads of different criticalities and/or different customers. Another advantage of microsegmentation is that things like access control lists, routing rules and firewall policies can be attached to specific workloads and automatically propagated when more of those same types of workloads are created. Image Related Services Zero Trust Cloud Security Network Security Next Gen SOC Related TermsZero TrustFirewallNetwork Security Share: Contact Us
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?