Segmentation micro réseau
Micro-segmentation secures applications by expressly allowing particular application traffic and, by default, denying all other traffic.
Micro-segmentation is the foundation for implementing a zero-trust security model for application workloads in the data center and cloud.
Micro-segmentation is the implementation of granular firewall policy controls using the host workload firewall as the enforcement point across any workload type (virtual machines, bare metal servers, containers).
Policy lifecycle management is the most challenging part of implementing an effective micro-segmentation policy that adapts to support changes to your applications and your business.
You begin at the macro level and continually refine through policy automation, leveraging application and workload context and behavior.
Micro-segmentation is implemented as granular firewall policies at the application workload level.
Granular east-west policy control provides a scalable way to create a secure perimeter zone around each workload with consistency across different workload types and environments.
This enhances and extends the visibility and control from network or zone-based firewalls.
Network segmentation, or micro-segmentation solutions, enable you to quickly and easily segregate your network at a granular workload level.
This is at the heart of Zero Trust security and protects your organisation by restricting the lateral movement of an attacker.
Managed Micro-Segmentation Security from BT is based on Illumio technology and allows you to outsource your network segmentation management to us, meaning you can be confident your micro-segmentation policies are set up and working correctly.
Micro-segmentation can be deployed very quickly on your network using our pre-configured setup scripts.
Our security operations centre experts will monitor your set-up to make sure things are communicating as expected and help you put in place new policies if you need them.
You’ll get reports showing blocked traffic so you can be confident that legitimate traffic isn’t being inhibited.
Micro-segmentation uses an allow-list model to significantly reduce this attack surface across different workload types and environments.
Micro-segmentation helps you gain better threat visibility and enforcement for critical workloads and applications across different platforms and environments, limiting lateral movement of a security incident from one compromised VM, service, or container to another.
Micro-segmentation allows for better security and ensures compliance for applications with regulatory mandates.
Granular visibility and control over sensitive workloads demonstrate proper security and data separation to simplify audits and document compliance.