Via role-based access control (RBAC), authorized users among security, IT operations, compliance, and audit teams can also query for traffic information, which they can then use for troubleshooting, security incident response, forensic investigations, compliance, and audit reporting. Authorized users can also query the PCE traffic database for any traffic flows across segmented environments and validate their organization’s micro-segmentation strategy.
When IT teams plan a micro-segmentation project such as separating Test, Dev, and Prod or ringfencing their organization’s SWIFT or PCI cardholder data environments, they want to be able to validate that these environments are effectively separated from one another.
Using Explorer, security teams can run a search on unmanaged IP addresses and convert them into unmanaged workloads. You can then use this information to define and enable policies on the connections and flows between unmanaged and managed workloads.