Page 1 of 1

The situation is complicated

Posted: Wed Feb 12, 2025 7:07 am
by relemedf5w023
However, the biggest problem in protecting the network perimeter is the lack of segmentation. Segmentation comes in several forms (e.g., network or application segmentation, microsegmentation, etc.) and is used to isolate assets, servers, network segments, and individual programs to protect them from hacker attacks. Many enterprises do not use segmentation due to a lack of the necessary tools, thereby exposing themselves to significant risks. The risks have increased because data centers have begun to serve IoT infrastructures and virtual desktops (VDI), which lack either segmentation or isolation.

by the fact that data centers are becoming more india whatsapp data to partners, distributors, customers, contractors and suppliers, but at the same time, as the number of participants in the ecosystem increases, the risk of hacking through a third party (the supply chain that generates material, financial and information flows) increases. In the recent past, we have already witnessed “cross-infection” when attackers target an enterprise, but hack its infrastructure through a more vulnerable third party, be it a company that used VDI with unpatched vulnerabilities, or an IoT device connected to the data center.

Network segmentation is used not only for security but also to comply with industry regulations such as GDPR, SWIFT, and PCI. Faced with potential fines from regulators, enterprises need to isolate certain workloads, assets, and applications. It’s worth remembering that many data centers are running legacy operating systems and platforms that are beyond their useful lifespans and segmenting them provides the best protection.