T-Systems-Claim-Logo
Search
Coding lines on screen with "malware" warning

Inside the company network: barring entry to hackers

How software-defined segmentation traps hazardous or unwanted data traffic within the network, thus containing cyberattacks

Creating impermeable security zones

Digital visualization of a safety lock.

Hackers went undetected within company networks for an average of 66 days in 2020*. Plenty of time to exfiltrate data. Traditional perimeter protection using firewalls – also known as macrosegmentation – has limited utility, since malware that does make it through the firewall can pass undetected from workload to workload. Whereas with SD segmentation – also known as microsegmentation – if an attacker has gained access to the network, they remain trapped in the security zone. In the event of ransomware attacks, this ensures that no additional data can be encrypted, and/or blocks the path of malicious insider operators.

* Source: FireEye

Greater transparency in the company network

Robust security zones based on SD segmentation make your data and communication pathways transparent, thereby safely containing cyberattacks. How exactly does this work? Our security experts explain!

No entry for malware

Hands on laptop with symbolic firewall and security lock icon.

This is how SD segmentation works: In order to inhibit lateral movement within networks, servers, systems, software, and workloads are isolated from one another. At the same time, there are robust zones within the IT infrastructure, in which workloads or applications can securely exchange data. The motto: Anything that does not need to communicate must not communicate. External attackers or malicious insider operators are quickly stopped in their tracks thanks to network segmentation. Companies, on the other hand, reduce their security risks and avoid the consequences associated with cyberattacks such as reputational damage or loss of business.

Targeted, precise protection for your network and IT

Two businessmen using laptop in office together.

In an intensive advisory discussion, our IT security experts will help you to identify how software-defined segmentation can protect your business and your IT. We develop dedicated solutions based on network segmentation, install and operate them for you, in addition to providing support and further development. In doing so, we make data connections transparent and create individual policies, which, for example, prohibit unnecessary communication. In this way, we reduce the number and complexity of communication relationships in your company network. Thanks to this new, clear structure, you can easily determine, whether and how unauthorized parties are moving through your network.

Zero trust: Control is always better

In order to integrate software-defined segmentation into your infrastructure, we operate on the principle of zero trust. The goal of this security approach is to ensure that, in our digitalized, connected world, access to valuable data is exclusively given to authorized users. Consequently, it is necessary to control all activity within the network. With software-defined segmentation, we apply this principle to the communication between your workloads, applications, and servers. We visualize data flows, and control and suppress them where needed.

White paper: Is your cloud really secure?

For the most part, digitalization and cloud transformation go hand in hand. But just how secure are your cloud services? What threats are you facing, where are potential gateways for cyberattacks lurking? Our white paper shows how to effectively protect your cloud.

Software-defined segmentation in practice

The biggest advantage of software-defined segmentation: The dynamic approach automatically maps changes in the network. This is considerably more flexible, quicker, and more cost effective than using a conventional firewall. An example: A tour operator's booking system exchanges information with the customer database and financial software. If the company stores the booking system in the cloud, the existing policies remain in place and are automatically used for the cloud application. The principle: Policies are always linked to the application and not to the technological platform.

This is how companies master IT security challenges

Do you visit t-systems.com outside of Germany? Visit the local website for more information and offers for your country.