How does the world currently stop small security incidents from becoming breaches that spread in clouds and data center?
That is the question we sought to answer in our report, The State of Segmentation, examining how organizations approach segmenting data centers and clouds.
Segmentation prevents the spread of breaches by breaking environments into smaller segments, so threats cannot move laterally, much like how compartments protect a submarine from sinking in the case of a breach.
Why bother with segmentation?
Motivated attackers will find their way in. This we know. They might rely on clever pieces of never-before-seen malware, effective phishing campaigns that yield employee credentials to gain access, containers left exposed to the internet or invariably, vulnerable software.
Once an attacker has a foothold inside a cloud or data center, they move laterally, to steal important intellectual property or sensitive customer information.
Despite this, our report finds organizations do not segment or struggle with its implementation as common approaches like firewalls make it difficult and costly.
Our report shares important insights on:
- How organizations are distributed between on-premises and in the cloud.
- How many organizations actually segment their environments today.
- For those using segmentation, how it is actually carried out.
- Challenges that beset segmentation today.
With our report, you’ll be able to benchmark your experiences with segmentation with other practitioners.
We based our report on a survey we had independently conducted by Virtual Intelligence Briefing (ViB). ViB is an interactive online community of 1.2M IT practitioners and decision makers, who share insights and opinions across IT domains like security.