Close Menu
Alpha Leaders
  • Home
  • News
  • Leadership
  • Entrepreneurs
  • Business
  • Living
  • Innovation
  • More
    • Money & Finance
    • Web Stories
    • Global
    • Press Release
What's On
Gen Z is ‘giving up’ on homeownership—and it’s changing how they work, spend, and invest

Gen Z is ‘giving up’ on homeownership—and it’s changing how they work, spend, and invest

10 March 2026
Anthropic’s Department of War lawsuit is even higher-stakes amid the AI boom

Anthropic’s Department of War lawsuit is even higher-stakes amid the AI boom

10 March 2026
Something big is changing in auditing

Something big is changing in auditing

10 March 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Alpha Leaders
newsletter
  • Home
  • News
  • Leadership
  • Entrepreneurs
  • Business
  • Living
  • Innovation
  • More
    • Money & Finance
    • Web Stories
    • Global
    • Press Release
Alpha Leaders
Home » Behind The Firewall: Preventing Lateral Movement With Microsegmentation
Innovation

Behind The Firewall: Preventing Lateral Movement With Microsegmentation

Press RoomBy Press Room6 March 20244 Mins Read
Facebook Twitter Copy Link Pinterest LinkedIn Tumblr Email WhatsApp
Behind The Firewall: Preventing Lateral Movement With Microsegmentation

Sameer Malhotra is cofounder and CEO of TrueFort, a former Wall Street tech exec and an expert in IT infrastructure and cybersecurity.

Firewall-based perimeter protection used to be enough to keep all sorts of network traffic safe, but in today’s agile, cloud-based environments, placing an electronic moat around an enterprise’s assets is no longer sufficient.

Of course, perimeter firewalls are still the best defense against attacks involving north-south traffic (communications from the outside world). Filtering access in and out of the corporate network remains the foundation of an effective enterprise security strategy, but in today’s fast-moving threat landscape, it is only a first line of defense.

Traffic inside the firewall needs to be secured as much as access from outside the network. At a time when so many attacks are enabled by compromised credentials and fake identities, unmonitored east-west traffic is a liability.

Lateral movement attacks (which can be carried out by malicious insiders or hackers using compromised credentials) that go unnoticed can result in untold damages. It takes an average of 204 days to detect a data breach.

The Role Of Microsegmentation

Firewalls manage risk by sorting through trusted sources of traffic that use authorized ports and protocols. But the many enterprise applications, admin tools and machine identities they leverage use custom ports and protocols that often defy the logic of north-south firewall-based controls.

Consider that the average organization uses more than 1,000 apps, and 65% of those are customized before deployment. Meanwhile, IT needs to identify the endpoints of those communications, but a firewall doesn’t have the context to sort them out. Merely shutting down the entry points of those apps from the internet to the network can cause outages that affect business operations and lead to financial losses.

Microsegmentation aims to fill the void by isolating data and assets into distinct security segments down to the workload level. This allows for security policies that can control traffic flow between applications, workloads and processes within the same data center or across cloud environments.

Microsegmentation enhances enterprise security by establishing traffic baselines and tailored access policies, minimizing threats without disrupting operations. By segmenting at the workload level, it contains breaches, reducing their impact and preventing lateral movement of attackers. This approach streamlines security management, isolates critical data and aids compliance, cutting costs by reducing firewall licenses and associated hardware. Overall, microsegmentation optimizes security posture, ensures business continuity and simplifies security administration, yielding significant cost savings.

Adopting Microsegmentation

Like most operational changes, supplementing perimeter firewalls with a microsegmentation architecture should be implemented in a controlled fashion based on these best practices.

• Assess the network. Review the network architecture to understand the flow of internal traffic and potential lateral movement risks. Identify critical applications, workloads and sensitive data that should be prioritized.

• Draft policy. Define security policies based on the network assessment tailored to the needs of each segment. Consider adopting least-privilege policies to minimize access privileges and reduce attack surfaces.

• Pick tools. Choose microsegmentation solutions that integrate well with the existing infrastructure and meet specific security requirements. Look for solutions that offer visibility, manageability and scalability.

• Start at scale. Work in stages. Start small with a pilot project focusing on protecting high-value assets or environments. As you adapt and learn how to manage those microsegmented environments, gradually expand across the network, gaining more experience and confidence as you go along.

• Prioritize training. Continuous education and training are critical for successful implementation and management. Ensure your IT and security teams are constantly refreshing their training in microsegmentation principles, technologies and best practices.

• Keep learning. Continuously monitor the effectiveness of the strategy to reflect any new developments in technology and risk. Be prepared to keep adjusting policies and configurations as the network evolves and new threats emerge.

Conclusion

Firewalls are not obsolete, and keeping hackers out of the network is still job number one. However, containing the damage if a perimeter intrusion occurs is equally important. Microsegmentation, when adopted strategically using the steps above, can help give defenders the ability to implement granular defenses that protect assets at the workflow level and contain the blast radius of a security incident.

Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Sameer Malhotra
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link

Related Articles

Venture Capital Is Discovering Fashion Tech

7 March 2026

Will The Iran Conflict Reshape Venture Capital?

7 March 2026

Founder Accused By His Own Startup Of Forgery, Secret Deals And Luxury Spending

6 March 2026

When Claude Paused: An AI Doomsday Preview And The Question Of Human Survival

3 March 2026

Data Plateau: Hit The Scaling Wall With AI Or Remain An Innovator?

3 March 2026
New Leak Signals Unprecedented Design Change

New Leak Signals Unprecedented Design Change

1 March 2026
Don't Miss
Unwrap Christmas Sustainably: How To Handle Gifts You Don’t Want

Unwrap Christmas Sustainably: How To Handle Gifts You Don’t Want

By Press Room27 December 2024

Every year, millions of people unwrap Christmas gifts that they do not love, need, or…

Walmart dominated, while Target spiraled: the winners and losers of retail in 2024

Walmart dominated, while Target spiraled: the winners and losers of retail in 2024

30 December 2024
Moltbook is the talk of Silicon Valley. But the furor is eerily reminiscent of a 2017 Facebook research experiment

Moltbook is the talk of Silicon Valley. But the furor is eerily reminiscent of a 2017 Facebook research experiment

6 February 2026
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Latest Articles
AI can double output. Human biology can’t

AI can double output. Human biology can’t

10 March 20260 Views
The AI risk that few organizations are governing

The AI risk that few organizations are governing

10 March 20260 Views
This Harvard dropout took a company public before 30. Now he raised 5M to fix healthcare clinics

This Harvard dropout took a company public before 30. Now he raised $205M to fix healthcare clinics

10 March 20261 Views
The worst housing market in years couldn’t stop single women from buying

The worst housing market in years couldn’t stop single women from buying

10 March 20260 Views
About Us
About Us

Alpha Leaders is your one-stop website for the latest Entrepreneurs and Leaders news and updates, follow us now to get the news that matters to you.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks
Gen Z is ‘giving up’ on homeownership—and it’s changing how they work, spend, and invest

Gen Z is ‘giving up’ on homeownership—and it’s changing how they work, spend, and invest

10 March 2026
Anthropic’s Department of War lawsuit is even higher-stakes amid the AI boom

Anthropic’s Department of War lawsuit is even higher-stakes amid the AI boom

10 March 2026
Something big is changing in auditing

Something big is changing in auditing

10 March 2026
Most Popular
Mastercard is rolling out a ‘virtual CFO’ built with AI for small businesses

Mastercard is rolling out a ‘virtual CFO’ built with AI for small businesses

10 March 20260 Views
AI can double output. Human biology can’t

AI can double output. Human biology can’t

10 March 20260 Views
The AI risk that few organizations are governing

The AI risk that few organizations are governing

10 March 20260 Views
© 2026 Alpha Leaders. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.