FAQs

How does micro-segmentation work within a Zero Trust architecture?

Micro-segmentation divides the network into isolated zones, enforcing strict access control at the application and workload level. This limits lateral movement if an account or device is compromised. Its often fairly simple to further segment user to user communications limiting the “blast radius” in the event of a single user device being compromised.