You are viewing a preview of...
Network Segmentation and Architecture
Algorithm for configuring optimally secure networks, generating a network topology and segmentation policies with zero vulnerabilities
Background
Multiple industry reports have provided estimates indicating that the Connected Devices market is poised to reach a value of $375 billion by the year 2031. The importance of ensuring secure access cannot be overstated, especially for networks with high security requirements, as the utilization or mishandling of intelligent, adaptive, self-organized sensors and actuators can yield significant positive or negative consequences. Consequently, the lateral (or East-West) movement is a critical component of most ransomware and other recent attacks. To counteract this method of attack, network segmentation has emerged as a key strategy, and more recently, there has been a shift towards “resource” segmentation. While the term “micro-segmentation” typically refers to the partitioning of application workloads and workflows as resources, it’s
Log in or create a free account to continue reading