Security News > 2021 > November > Most cybersecurity leaders use microsegmentation to augment corporate network security
Four out of five cybersecurity leaders now employ microsegmentation in addition to traditional perimeter-based security for their corporate networks, according to a survey by Byos.
The natural successor to basic network segmentation, microsegmentation breaks the entire network down to its least divisible components - its endpoints - and provides robust protection and threat mitigation for each component.
Byos surveyed 100 cybersecurity leaders in Q3 of 2021 to understand their use of microsegmentation to protect their networks.
The state of microsegmentation in network security 83% of cybersecurity leaders currently augment their corporate network's perimeter security with microsegmentation in some form; Of the 17% of cybersecurity leaders who do not currently deploy microsegmentation, most of them - 65% - claim it is on their roadmap.
88% of cybersecurity leaders believe microsegmentation is essential to achieving Zero Trust network security, while 92% of cybersecurity leaders believe microsegmentation is more practical and efficient than its alternatives.
"When Gartner first identified microsegmentation as a key emerging technology for information security in 2016, many security experts were unfamiliar with the concept, but here we are just five years later, and we see that it has been widely recognized as a crucial component of any security infrastructure," said Matias Katz, CEO at Byos.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/OlkkxqsL310/
Related news
- A closer look at the 2023-2030 Australian Cyber Security Strategy (source)
- The ROI of Security Investments: How Cybersecurity Leaders Prove It (source)
- Here's what happens if you don't layer network security – or remove unused web shells (source)
- Australia Passes Groundbreaking Cyber Security Law to Boost Resilience (source)
- 5 reasons to double down on network security (source)
- Top 5 Cyber Security Trends for 2025 (source)
- Shape the future of UK cyber security (source)
- Strengthening security posture with comprehensive cybersecurity assessments (source)
- The Future of Network Security: Automated Internal and External Pentesting (source)
- Overlooking platform security weakens long-term cybersecurity posture (source)