31.5 C
Canberra
Tuesday, February 24, 2026

Three Advantages of Segmentation – Cisco Weblog


In my final two blogs, I delved into the outcomes of the 2025 Cisco Segmentation Report to spotlight the significance of macro- and micro-segmentation and to establish the first challenges hindering segmentation journeys. In the present day, I dive additional into the survey outcomes to debate the advantages organizations can obtain once they efficiently implement a twin macro- and micro-approach to segmentation. The objective, after all, is to proceed highlighting insights into the present state of this vital cybersecurity idea and the place it might be headed sooner or later.

The excellent news is that the survey outcomes point out that organizations additional alongside of their segmentation journeys are certainly attaining measurable advantages from their profitable macro- and micro-segmentation implementations.

Everyone knows that it’s not a matter of in case your group will get breached, it’s a matter of when. And, when it occurs, you’ll must detect the assault, establish its targets, perceive the affect, comprise the breach, and get techniques again up and working as shortly as doable. Implementing each macro- and micro-segmentation permits sooner breach response by offering organizations with pre-made defensive limitations. The survey responses help this. Respondents from organizations which have absolutely applied macro- and micro-segmentation say that breach containment and restoration time take as much as 20 days on common, in contrast with the reported 29 days for organizations with out full implementation of each. This 31% sooner restoration time is an actual, measurable affect of a twin macro- and micro-segmentation strategy. It isn’t onerous to think about how the discount in containment and restoration comes about—in spite of everything, segmentation impedes attackers, thereby decreasing the post-breach effort.

Organizations that haven't fully implemented macro- and micro-segmentation take an average of 15 days to contain a breach and an additional 14 days to recover from a breach. Organizations that have implemented both macro- and micro-segmentation take an average of 11 days to contain a breach and 9 an additional 9 days to recover from a breach.Organizations that haven't fully implemented macro- and micro-segmentation take an average of 15 days to contain a breach and an additional 14 days to recover from a breach. Organizations that have implemented both macro- and micro-segmentation take an average of 11 days to contain a breach and 9 an additional 9 days to recover from a breach.
The common time it takes organizations to comprise and absolutely get better from their most up-to-date breach. Base: 1,000 respondents; knowledge break up by organizations with full implementation of each macro-and micro-segmentation [327 respondents] and organizations who haven’t absolutely applied both [667 respondents]

In line with the report, defending high-value/vital property (57%) is the more than likely driver for organizations implementing segmentation, together with delicate knowledge, functions, and techniques which might be vital for enterprise operations and continuity. On its face, defending vital property is beneficial, however stopping these property from falling into the fingers of risk actors preserves the group’s status amongst prospects, staff, shareholders, and different stakeholders. For instance, a corporation’s monetary data might be protected by deploying segmentation that takes under consideration the identification of customers. With such segmentation, solely staff within the finance group are allowed entry to finance functions. Whereas the sort of segmentation doesn’t stop all types of assaults, it does elevate the barrier to profitable assaults.

The main drivers for pursuing segmentation are, by percentage of respondents: protecting high value/critical assets (57%), better meeting compliance and regulatory requirements (55%), more easily containing breaches (52%), enabling zero trust architecture (43%), preventing insider threats (38%), supporting mergers, acquisitions or third-party integrations (37%)The main drivers for pursuing segmentation are, by percentage of respondents: protecting high value/critical assets (57%), better meeting compliance and regulatory requirements (55%), more easily containing breaches (52%), enabling zero trust architecture (43%), preventing insider threats (38%), supporting mergers, acquisitions or third-party integrations (37%)
Query: What are, or can be, the primary drivers on your group when pursuing segmentation inside its community? Base: 1,000 respondents

As soon as the basics of asset safety are in place, mature organizations lengthen segmentation into compliance-driven areas. This displays each regulatory calls for—in some main trade segments, similar to retail, healthcare, and finance, organizations’ viability depends upon their adherence to compliance requirements, together with PCI-DSS, HIPAA, and SOX (respectively)—and the pursuit of extra complete management throughout complicated environments. The survey report reveals that organizations with full segmentation deployment are extra doubtless (67% vs 54%) to have additionally segmented workloads with compliance necessities.

Organizations which have absolutely applied a twin strategy to segmentation (33% of respondents) can level to measurable affect—together with higher breach containment, asset safety, and better concentrate on compliance. Clearly, these are sufficient incentives for the remaining organizations (67% of respondents) that don’t but have full segmentation deployments to take motion.

Should you haven’t already, take a look at the primary two blogs within the sequence, which debate the significance of segmentation and the challenges organizations face when implementing segmentation initiatives. Within the meantime, obtain the 2025 Cisco Segmentation Report back to be taught extra in regards to the state of segmentation in the present day and the place you match in opposition to related organizations.


We’d love to listen to what you suppose! Ask a query and keep linked with Cisco Safety on social media.

Cisco Safety Social Media

LinkedIn
Fb
Instagram
X



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

[td_block_social_counter facebook="tagdiv" twitter="tagdivofficial" youtube="tagdiv" style="style8 td-social-boxed td-social-font-icons" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjM4IiwiZGlzcGxheSI6IiJ9LCJwb3J0cmFpdCI6eyJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3Njh9" custom_title="Stay Connected" block_template_id="td_block_template_8" f_header_font_family="712" f_header_font_transform="uppercase" f_header_font_weight="500" f_header_font_size="17" border_color="#dd3333"]
- Advertisement -spot_img

Latest Articles