Microsegmentation (network security): Difference between revisions

Content deleted Content added
HCIhistory (talk | contribs)
HCIhistory (talk | contribs)
Line 3:
==Types of microsegmentation==
There are three main types of microsegmentation:
* '''Host-agent segmentation''': This style of microsegmentation makes use of endpoint-based agents. By having a centralized manager with access to all data flows, the difficulty of detecting obscure protocols or encrypted communications is mitigated. The use of host-agent technology is commonly acknowledged as a powerful method of microsegmentation. Because infected devices act as hosts, a solid host strategy can prevent issues from manifesting in the first place. This software, however, must be installed on every host.<ref>https://www.networkworld.com/article/3537672/microsegmentation-architecture-choices-and-how-they-differ.html </ref>
 
==Challenges==