Micro-Segmentation: Implementation Guide
"Secure Beyond Breach"
Learn how to implement a micro-segmentation security strategy
Securing the perimeter is no longer enough. The focus has shifted to ensuring your organization continues to function if and when you’re breached — and that’s what micro-segmentation is all about.
This book will help you become secure beyond breach.
Based on real-world scenarios and written by industry experts who have been in the trenches, Secure Beyond Breach is a practical guide that details how to implement a micro-segmentation strategy from start to finish. It's an essential read for all cybersecurity professionals, from security architects to IT infrastructure teams to CISOs.
How to implement a micro-segmentation strategy
Chapter 1: Introduction: The Evolving Cybersecurity Landscape
Why micro-segmentation and where it starts
Preview nowChapter 2: Preparing Your Organization for Success
Who should be involved in micro-segmentation and key steps to prepare
Preview nowChapter 3: The Green Pill of Metadata
How to ensure high-quality metadata from the start
Preview nowChapter 4: Don’t Boil the Ocean
How to begin the process of micro-segmentation implementation
Preview nowChapter 5: Mapped Out: Application Dependency Maps and the Path to Security
Why you need a map of your applications (and who will use it)
Preview nowChapter 6: The Specifics of the Policy Decision Process
Best practices for making policy decisions
Preview nowChapter 7: Considerations for Cloud and Containers
Essential considerations for public cloud and containers
Preview now