New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

When done right, network segmentation brings rewards

New York Tech Editorial Team by New York Tech Editorial Team
December 16, 2021
in Cybersecurity
0
When done right, network segmentation brings rewards
Share on FacebookShare on Twitter

96% of organizations claim to be implementing segmentation in their networks, yet only 2% of those organizations are segmenting all six mission-critical asset classes, including critical applications, public-facing applications, domain controllers, endpoints, servers, and business critical assets/data, with segmentation, according to a Vanson Bourne survey.

implementing network segmentation

The research surveyed 1,000 IT security decision-makers across seven countries, detailing current trends in segmentation across enterprises and the security advantages associated with strong segmentation implementations.

Segmentation is an IT approach that separates critical areas of the network to control east-west traffic, prevent lateral movement, and ultimately reduce the attack surface. Traditionally, this is done via an architectural approach – relying on hardware, firewalls and manual work. This can often prove cumbersome and labor intensive, which is a contributing factor in 82% of respondents saying that network segmentation is a “huge task.”

The benefits of implementing network segmentation

The research finds segmentation strategies are often limited in breadth and depth, in part due to the reasons mentioned above. Modern segmentation uses a software-based approach that is simpler to use, faster to implement and is able to secure more critical assets. The research shows that organizations that leverage the latest approach to segmentation will realize essential security benefits, like identifying more ransomware attacks and reducing time to mitigate attacks.

“The findings of the report demonstrate just how valuable a strong segmentation strategy can be for organizations looking to reduce their attack surface and stop damaging attacks like ransomware,” said Pavel Gurvich, SVP, Akamai Enterprise Security.

“In the past, implementing segmentation on the infrastructure level was difficult, but we see lots of interest in and opportunity for organizations to implement software-based segmentation which significantly simplifies deployment and accelerates projects. Software-based segmentation will be a key security approach in adopting zero trust frameworks and urgently protecting against ransomware in the coming years.”

Current segmentation strategies are limited

Despite 96% of respondents claiming segmentation is implemented in their networks, 75% say their organization uses segmentation across two or less mission-critical areas that businesses need to protect, with 50% claiming to segment just one mission-critical area. Many of these organizations have been feeling the repercussions of not adequately segmenting mission-critical assets.

According to the survey, organizations faced an average of 43 ransomware attacks in the last 12 months. 14 of those attacks reached the stage of lateral movement, demonstrating that the segmentation protections organizations have in place are not as strong as they could be.

Leaving networks un-segmented invites more enterprise risk

92% of respondents believe that implementing network segmentation has prevented cyber-attacks on their organization from doing significant damage or stealing substantial amounts of data. This sentiment is why 96% of respondents believe that leaving networks unsegmented will lead to more risk.

Further, respondents identified external attacks spreading more quickly (49%) and internal attack ease (44%) as the most likely risks stemming from unsegmented networks

Lack of network segmentation implementation amid COVID-19

43% of respondents say that network segmentation has either not occurred in their organization or not in the past two years. These statistics are meaningful, given the significant and sudden global shift to hybrid cloud environments as businesses adapted to remote work due to COVID-19.

Based on the data, it’s possible that misconceptions around traditional segmentation approaches prevented security leaders from implementing segmentation projects in their new hybrid cloud environments. Fortunately for organizations, modern software-based approaches to segmentation are much easier to implement in these new IT environments and provide greater security benefits like north-west traffic control and process-level details.

Segmentation stops cyber attacks

Organizations implementing segmentation across five or more mission-critical assets could identify nearly twice as many ransomware attacks in the last 12 months (78 attacks) compared to those that secured none or one mission-critical asset class (48 attacks).

Further, the average time required to limit lateral movement and prevent ransomware attacks entirely is lower on average for organizations with greater use of segmentation to protect their critical assets.

Credit: Source link

Previous Post

Online shopping at risk: Mobile application and API cyber attacks at critical high

Next Post

Comcast’s Forecast Labs Plots A New Course With Its Approach To VC Investing – AdExchanger

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
Comcast’s Forecast Labs Plots A New Course With Its Approach To VC Investing – AdExchanger

Comcast’s Forecast Labs Plots A New Course With Its Approach To VC Investing – AdExchanger

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
10 Raunchy Movies on Netflix You Won’t Regret Watching

10 Raunchy Movies on Netflix You Won’t Regret Watching

May 20, 2024
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026
Employee Time Tracking

What is an Employee Time Tracking Solution? A Definite Guide for 2026

March 31, 2026
Voltify founders

Voltify Raises $30 Million Seed Round as It Challenges $1 Trillion Rail Electrification Model

March 31, 2026

Recommended

laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

AI AI QSRs Allseated Automat-it AWS B2B marketing Business CISO CISO Whisperer Collaborations Companies To Watch cryptocurrency Cybersecurity Entrepreneur Fetcherr Finance FINQ Fintech Funding Announcement hi-tech Hi Auto Impala Investing Investors investorsummit Israel israelitech Leaders LinkedIn Leaders Metaverse Mindset Minnesota omri hurwitz PointFive PR QSR Real Estate start- up startupnation Startups Startups On Demand Tech Tech leaders Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media