/
Zero Trust Segmentation

3 Takeaways from the 2025 Gartner® Market Guide for Network Security Microsegmentation

More and more organizations are turning to microsegmentation to close critical gaps in their security and move closer to a Zero Trust architecture. It’s a technology that’s quickly gaining traction — and for good reason.  

As ransomware and other threats grow more sophisticated, microsegmentation gives security teams a way to stop attackers from moving freely inside the network.

Breaches are inevitable, and microsegmentation helps limit the damage. By creating granular zones across hybrid environments, it keeps threats from spreading, protects sensitive data, avoids costly fallout, and preserves your organization’s reputation.

The latest Gartner® Market Guide for Network Security Microsegmentation says that security and risk management (SRM) leaders should “build a microsegmentation architecture that restricts the lateral movement of malware in the network and in public and private cloud environments.”

Key insights from the Gartner Market Guide

Here are the key takeaways we think stood out most in the report:

1. By 2027, 25% of enterprises working toward Zero Trust architecture will use more than one deployment form of microsegmentation, which is up from less than 5% in 2025.

Why the shift? According to Gartner, “the evolving threat landscape resulting from digital transformation has prompted SRM leaders to focus on securing a growing number of increasingly fragmented perimeters.”  

Traditional tools still play an important role, but they often fall short when it comes to the deep, precise control needed to enforce Zero Trust.  

That’s where microsegmentation comes in.  

Gartner sees that SRM leaders have started seeking microsegmentation technologies in order to:

  • Achieve fine-grained zoning: This approach provides a practical way to enforce zero-trust principles across public, private and hybrid cloud infrastructures.
  • Enable policies at the workload level: This approach will help to stop lateral movement and limit the blast radius of malware. This can be achieved by leveraging discovery features and integrating with cloud infrastructure automation to simplify initial setup and ongoing maintenance.
  • Gain visibility of east-west network traffic and manage workload policies at scale: This involves identifying, managing and tracking changes in real time.

2. There is a growing interest in microsegmentation across every industry and region.

More organizations have shifted to hybrid environments to support today’s fast-moving, flexible workforces. This has made the threat of ransomware and other attacks universal.  

No business — no matter the size or industry — can afford to ignore it. That’s why it’s more important than ever to understand what microsegmentation options are out there and choose a solution that can scale with your needs.

This means vendors should be able to offer a clear, guided path to deployment. They should also show real ROI by helping organizations gain full visibility and control over their environments.

3. Looking ahead, Gartner expects microsegmentation vendors to go beyond their current offerings.

As organizations mature their Zero Trust architecture, they’ll need more than just basic segmentation. Longer-term, Gartner observes that microsegmentation vendors try to expand beyond the initial scope of segmentation assets within a data center by:

Adding remote access features like Zero Trust Network Access (ZTNA) that extend their scope beyond east-west traffic and inbound end-user traffic to the protected applications.

As Gartner notes, “in most cases, these new features are currently not being delivered through common control plane, or in Zero Trust terms, a common policy decision point.”

That could change in the future.

Gartner believes that “disparate policy enforcement points may become part of a larger cybersecurity mesh architecture, where common management and control planes orchestrate policy between federated policy enforcement points.”

What’s especially interesting is that many features not commonly available from microsegmentation solutions in the previous edition of this Market Guide have surfaced as common features in this latest version.  

Gartner sees these features providing a framework for the evolution of segmentation. This includes policy recommendation engines that use AI to streamline new policy rules suggestions in response to discovered flows. Gartner also adds “threat detection based on threat intelligence, Layer-7 protocol inspection, and anomaly detection” as common features for this market.

How Illumio is shaping the future of microsegmentation

At Illumio, we believe our breach containment platform — including Illumio Segmentation and our new AI-powered cloud detection and response (CDR) solution Illumio Insights — delivers on all the key capabilities and common features highlighted in the latest Gartner Market Guide.

As the market reaches a turning point, we're working closely with our customers and partners to understand how their security needs are evolving. That input drives the next generation of our platform.  

We’re not only working to build advanced tools to stop new and unknown threats. We’re also focused on making segmentation easier to build and manage for every organization.

Read the full Market Guide.

Ready to take the next step? Get in touch to see how Illumio can help you build a segmentation strategy.

Gartner, Market Guide for Network Security Microsegmentation, Adam Hils, Rajpreet Kaur, Charanpal Bhogal, 6 May 2025

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Related topics

Related articles

Illumio Achieves Common Criteria Designation
Zero Trust Segmentation

Illumio Achieves Common Criteria Designation

Illumio’s Common Criteria IT security designation—validation from a government-certified third party—positions it to support new global public sector markets.

5 Reasons Your Firewall Team Will Love Microsegmentation
Zero Trust Segmentation

5 Reasons Your Firewall Team Will Love Microsegmentation

The upgrade firewall administrators have long needed, micro segmentation moves the enforcement point to the application instance itself. Here’s how it works.

Stopping Supply Chain Attacks with Zero Trust Segmentation
Zero Trust Segmentation

Stopping Supply Chain Attacks with Zero Trust Segmentation

The supply chain is especially challenging to secure because of its complexity.

10 Reasons to Choose Illumio for Segmentation
Zero Trust Segmentation

10 Reasons to Choose Illumio for Segmentation

Discover how Illumio makes segmentation smarter, simpler, and stronger as part of your Zero Trust security strategy.

Way Beyond Visibility: How Illumio Insights Connects Your Critical Security Dots
Cyber Resilience

Way Beyond Visibility: How Illumio Insights Connects Your Critical Security Dots

Learn why observability is critical to understanding and reducing cyber risk.

Forrester Names Illumio a Leader in The Forrester Wave™: Microsegmentation Solutions, Q3 2024
Zero Trust Segmentation

Forrester Names Illumio a Leader in The Forrester Wave™: Microsegmentation Solutions, Q3 2024

Get John Kindervag's key takeaways from the Forrester Wave for Microsegmentation Solutions.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?