2
Most read
7
Most read
12
Most read
Zero Trust Security. Implemented.
Micro-Segmentation
For Enterprise Data Centers
© 2019 ColorTokens
Traditional Data Center Protection
© 2019 ColorTokens, Inc | 2
To protect the data center, we use
several security products, from several
vendors, at different layers of the OSI
model.
Traditional Security is Rigid, Reactive and Complex
>75% of data center traffic – East-West
• Perimeter security is no more SECURE
– Attackers and attacks happening inside the
data center
• Reactive security doesn’t help
– Antivirus solutions playing catchup with
sophisticated attacks (zero-day, APTs)
E W
N
S
Bare-metal Hypervisors Cloud Containers
Data center evolution
Microservices
| 3
Data Centers of Today and Tomorrow
• Dynamic application environments
– Changing testing, development & staging environments
– Changing data access policies among these environments
| 4
Users
Web Server App Server DB
Development
Web Server App Server DB
Testing
Web Server App Server DB
Staging
Users
Data Centers of Today and Tomorrow
• Dynamic workloads
– Dynamic provisioning of Web, App or DB servers in an application environment
– Changing resource access policies
| 5
Web Server App Server DB
App Server DB
Security Policies
Security Policies
Data Centers of Today and Tomorrow
• Dynamic users
– User access from within the office
– User access from outside the office
– Vendor/contractor accesses
| 6
Web Server App Server DB
App. 1
Web Server App Server DB
App. 2
Office Users Mobile Users Vendor/Contractor
Data Centers of Today and Tomorrow
• Hybrid Data Center
– Application environments on the cloud and on-premise
– Dynamic resource access policies
| 7
Web Server App Server DB
Development
Web Server App Server DB
Testing
Office users Mobile users
Web Server App Server DB
Cloud
Resource Access Policies
| 8
Are no longer monolithic
Are spread across multiple locations
Have dynamic workloads created, deleted/migrated across clouds
In short, modern data centers:
Your data center can no longer be
built around rigid security solutions
Maintaining consistent security policies in hybrid environments is a challenge
Increases the attack surface - risk and exposure to data theft
Accomplishing compliance is painful
Because:
Data Centers of Today and Tomorrow
And, Hackers Know Rigid, Traditional Security is Ineffective
| 9
Web Server App Server DB
Development
Web Server App Server DB
Testing
Web Server App Server DB
Cloud
Office Users Mobile Users Vendor/Contractor
The Solution? Data Center Micro-Segmentation!
| 10
Proper ‘segmentation’ to protect data center assets
One of the golden rules in security
Foundation for compliance standards and security best practices!
With the increase in frequency and sophistication of cyber-
attacks such as ransomware and data exfiltration, enterprises
are starting to adopt micro-segmentation as a key defense:
- To segment the network down to individual hosts, and
- Reduce the attack surface
Different Approaches to Data Center Micro-Segmentation?
| 11
Network-based
Hypervisor-based
Host-based
Most common micro-segmentation techniques
Network-Based Micro-Segmentation
| 12
- Most of the network teams are familiar
with implementation as it’s been around for a while
- Firewall rules are managed and enforced outside the
workloads or hypervisor
- Leverages perimeter firewall for both N/S and E/W
traffic
Pros Cons
- Network centric approach - one can end up creating macro-
segmentation, increasing the attack surface
- Difficult to have fine grained/micro policies at
the workload level
- Policies are not agile when the workloads move
- Thousands of ACLs/firewall rules become cumbersome in
dynamic environments
- Can become very expensive with security inspection
- $$$ in public cloud implementations - cost of firewall +
cost of running multiple VMs to support firewall
function (minimum 2 for HA)
- Performance impact due to additional gateway bottlenecks
Hypervisor-Based Micro-Segmentation
| 13
- Programmable overlay networks and policies
- Policies are enforced outside the workload on the
hypervisor itself
- Agility to move policies along with workloads
Pros Cons
- No support for bare metal /physical workloads
- Hypervisor and vendor specific - lock-in
- Limited or no support to public cloud environment
- No support for container workloads
- Lack of process visibility
- Performance impact (CPU impact natively on the hypervisor)
- Number of policies supported by hypervisor
Host-Based Micro-Segmentation
| 14
- Completely independent of infrastructure/hypervisors
- Works across multi-vendor OS environments
- Works seamlessly across dynamic, distributed environments
- Independent of network changes (deploy one VM or thousands in
minutes)
- Policy agility along with the workloads
- Granular context awareness and visibility on every workload
- Insights into processes running on every workload to address issues
like dynamic port range, etc.
- Built around zero trust
Pros Cons
- Need to install an agent on every host
Host-Based Micro-Segmentation
| 15
ColorTokens provides a paradigm shift in enterprise IT security.
ColorTokens is platform-independent and enables enterprises to shift from
reactive to a proactive security model, without additional investment in
hardware and operational complexities.
ColorTokens Proactive Security for Hybrid Data Centers
| 16
Web Server App Server DB
Development
Web Server App Server DB
Testing
Web Server App Server DB
Cloud
Office Outside Vendor/Contractor
X
X
Micro-segmentation
Visibility
Process
level security
THANK YOU
Micro-Segmentation in 3 Easy Steps [Video]
See a Live Demo
Got Questions?
For more information about the ColorTokens
solution email us at sales@colortokens.com
Call +1 (408) 341-6030 to speak to a
ColorTokens security specialist.

More Related Content

PDF
Secure your workloads with microsegmentation
PDF
What is micro segmentation?
PPTX
The Top Cloud Security Issues
PDF
The Security Policy Management Maturity Model: How to Move Up the Curve
PDF
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
PPTX
DTS Solution - Outsourcing Outlook Dubai 2015
PDF
Security issue in Cloud computing
PDF
Cloud Security - Made simple
Secure your workloads with microsegmentation
What is micro segmentation?
The Top Cloud Security Issues
The Security Policy Management Maturity Model: How to Move Up the Curve
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Outsourcing Outlook Dubai 2015
Security issue in Cloud computing
Cloud Security - Made simple

What's hot (20)

PDF
Network access control (nac)
PDF
Top reasons why Endpoint Security should move to Cloud | Sysfore
PPTX
Zero Trust Network Access
PPTX
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
PDF
Managing risk and vulnerabilities in a business context
PPTX
Advanced Data Center Security
PPTX
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
PDF
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
PPTX
5 Steps to a Zero Trust Network - From Theory to Practice
PPTX
What is zero trust model (ztm)
PDF
Cloud computing Security
PDF
Presentacion nac
PDF
SD-WAN - comSpark 2019
PDF
Zero Trust Model Presentation
PPTX
Disaster recovery
PDF
ePlus Next-Generation Firewalls
DOCX
What is zero trust model of information security?
PPTX
Tictaclabs Managed Cyber Security Services
PDF
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
PPTX
The Seismic Impact of the SolarWinds Hack
Network access control (nac)
Top reasons why Endpoint Security should move to Cloud | Sysfore
Zero Trust Network Access
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Managing risk and vulnerabilities in a business context
Advanced Data Center Security
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
5 Steps to a Zero Trust Network - From Theory to Practice
What is zero trust model (ztm)
Cloud computing Security
Presentacion nac
SD-WAN - comSpark 2019
Zero Trust Model Presentation
Disaster recovery
ePlus Next-Generation Firewalls
What is zero trust model of information security?
Tictaclabs Managed Cyber Security Services
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
The Seismic Impact of the SolarWinds Hack
Ad

Similar to Microsegmentation for enterprise data centers (20)

PDF
Is it an internal affair
PDF
Cloud security risks
PDF
Cloud security risks
PDF
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
PPTX
Security and Compliance for Enterprise Cloud Infrastructure
PPTX
Datacenter 2014: Trend Micro - Bill MCGee
PPTX
Security that works with, not against, your SaaS business
PPTX
On Premise Servers and Cloud-Based Servers.pptx
PDF
Cloud Computing technologies virtrulization
PPTX
Mohammed Al Mulla - Best practices to secure working environments
PPTX
Rik Ferguson
PPTX
Cloud Networking Presentation - WAN Summit - Ciaran Roche
PDF
Building Cloud capability for startups
PPTX
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
PDF
Secure Cloud Hosting: Real Requirements to Protect your Data
PPT
Presentation wsta
PPT
WSTA PRESENTATION
PPT
Presentation Wsta
PDF
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
PPTX
Algo sec suite overview 2013 05
Is it an internal affair
Cloud security risks
Cloud security risks
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Security and Compliance for Enterprise Cloud Infrastructure
Datacenter 2014: Trend Micro - Bill MCGee
Security that works with, not against, your SaaS business
On Premise Servers and Cloud-Based Servers.pptx
Cloud Computing technologies virtrulization
Mohammed Al Mulla - Best practices to secure working environments
Rik Ferguson
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Building Cloud capability for startups
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Secure Cloud Hosting: Real Requirements to Protect your Data
Presentation wsta
WSTA PRESENTATION
Presentation Wsta
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Algo sec suite overview 2013 05
Ad

Recently uploaded (20)

PDF
Decision Optimization - From Theory to Practice
PPTX
Strategic Picks — Prioritising the Right Agentic Use Cases [2/6]
PDF
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
PPTX
Information-Technology-in-Human-Society (2).pptx
PDF
Technical Debt in the AI Coding Era - By Antonio Bianco
PDF
Intravenous drug administration application for pediatric patients via augmen...
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PDF
Altius execution marketplace concept.pdf
PPTX
How to Convert Tickets Into Sales Opportunity in Odoo 18
PDF
Chapter 1: computer maintenance and troubleshooting
PDF
Introduction to c language from lecture slides
PDF
CEH Module 2 Footprinting CEH V13, concepts
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
substrate PowerPoint Presentation basic one
PPTX
Digital Convergence: How GIS, BIM, and CAD Revolutionize Asset Management
PPTX
Presentation - Principles of Instructional Design.pptx
PPTX
Report in SIP_Distance_Learning_Technology_Impact.pptx
PDF
EGCB_Solar_Project_Presentation_and Finalcial Analysis.pdf
PDF
NewMind AI Journal Monthly Chronicles - August 2025
PDF
GDG Cloud Southlake #45: Patrick Debois: The Impact of GenAI on Development a...
Decision Optimization - From Theory to Practice
Strategic Picks — Prioritising the Right Agentic Use Cases [2/6]
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
Information-Technology-in-Human-Society (2).pptx
Technical Debt in the AI Coding Era - By Antonio Bianco
Intravenous drug administration application for pediatric patients via augmen...
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
Altius execution marketplace concept.pdf
How to Convert Tickets Into Sales Opportunity in Odoo 18
Chapter 1: computer maintenance and troubleshooting
Introduction to c language from lecture slides
CEH Module 2 Footprinting CEH V13, concepts
EIS-Webinar-Regulated-Industries-2025-08.pdf
substrate PowerPoint Presentation basic one
Digital Convergence: How GIS, BIM, and CAD Revolutionize Asset Management
Presentation - Principles of Instructional Design.pptx
Report in SIP_Distance_Learning_Technology_Impact.pptx
EGCB_Solar_Project_Presentation_and Finalcial Analysis.pdf
NewMind AI Journal Monthly Chronicles - August 2025
GDG Cloud Southlake #45: Patrick Debois: The Impact of GenAI on Development a...

Microsegmentation for enterprise data centers

  • 1. Zero Trust Security. Implemented. Micro-Segmentation For Enterprise Data Centers © 2019 ColorTokens
  • 2. Traditional Data Center Protection © 2019 ColorTokens, Inc | 2 To protect the data center, we use several security products, from several vendors, at different layers of the OSI model.
  • 3. Traditional Security is Rigid, Reactive and Complex >75% of data center traffic – East-West • Perimeter security is no more SECURE – Attackers and attacks happening inside the data center • Reactive security doesn’t help – Antivirus solutions playing catchup with sophisticated attacks (zero-day, APTs) E W N S Bare-metal Hypervisors Cloud Containers Data center evolution Microservices | 3
  • 4. Data Centers of Today and Tomorrow • Dynamic application environments – Changing testing, development & staging environments – Changing data access policies among these environments | 4 Users Web Server App Server DB Development Web Server App Server DB Testing Web Server App Server DB Staging Users
  • 5. Data Centers of Today and Tomorrow • Dynamic workloads – Dynamic provisioning of Web, App or DB servers in an application environment – Changing resource access policies | 5 Web Server App Server DB App Server DB Security Policies Security Policies
  • 6. Data Centers of Today and Tomorrow • Dynamic users – User access from within the office – User access from outside the office – Vendor/contractor accesses | 6 Web Server App Server DB App. 1 Web Server App Server DB App. 2 Office Users Mobile Users Vendor/Contractor
  • 7. Data Centers of Today and Tomorrow • Hybrid Data Center – Application environments on the cloud and on-premise – Dynamic resource access policies | 7 Web Server App Server DB Development Web Server App Server DB Testing Office users Mobile users Web Server App Server DB Cloud Resource Access Policies
  • 8. | 8 Are no longer monolithic Are spread across multiple locations Have dynamic workloads created, deleted/migrated across clouds In short, modern data centers: Your data center can no longer be built around rigid security solutions Maintaining consistent security policies in hybrid environments is a challenge Increases the attack surface - risk and exposure to data theft Accomplishing compliance is painful Because: Data Centers of Today and Tomorrow
  • 9. And, Hackers Know Rigid, Traditional Security is Ineffective | 9 Web Server App Server DB Development Web Server App Server DB Testing Web Server App Server DB Cloud Office Users Mobile Users Vendor/Contractor
  • 10. The Solution? Data Center Micro-Segmentation! | 10 Proper ‘segmentation’ to protect data center assets One of the golden rules in security Foundation for compliance standards and security best practices! With the increase in frequency and sophistication of cyber- attacks such as ransomware and data exfiltration, enterprises are starting to adopt micro-segmentation as a key defense: - To segment the network down to individual hosts, and - Reduce the attack surface
  • 11. Different Approaches to Data Center Micro-Segmentation? | 11 Network-based Hypervisor-based Host-based Most common micro-segmentation techniques
  • 12. Network-Based Micro-Segmentation | 12 - Most of the network teams are familiar with implementation as it’s been around for a while - Firewall rules are managed and enforced outside the workloads or hypervisor - Leverages perimeter firewall for both N/S and E/W traffic Pros Cons - Network centric approach - one can end up creating macro- segmentation, increasing the attack surface - Difficult to have fine grained/micro policies at the workload level - Policies are not agile when the workloads move - Thousands of ACLs/firewall rules become cumbersome in dynamic environments - Can become very expensive with security inspection - $$$ in public cloud implementations - cost of firewall + cost of running multiple VMs to support firewall function (minimum 2 for HA) - Performance impact due to additional gateway bottlenecks
  • 13. Hypervisor-Based Micro-Segmentation | 13 - Programmable overlay networks and policies - Policies are enforced outside the workload on the hypervisor itself - Agility to move policies along with workloads Pros Cons - No support for bare metal /physical workloads - Hypervisor and vendor specific - lock-in - Limited or no support to public cloud environment - No support for container workloads - Lack of process visibility - Performance impact (CPU impact natively on the hypervisor) - Number of policies supported by hypervisor
  • 14. Host-Based Micro-Segmentation | 14 - Completely independent of infrastructure/hypervisors - Works across multi-vendor OS environments - Works seamlessly across dynamic, distributed environments - Independent of network changes (deploy one VM or thousands in minutes) - Policy agility along with the workloads - Granular context awareness and visibility on every workload - Insights into processes running on every workload to address issues like dynamic port range, etc. - Built around zero trust Pros Cons - Need to install an agent on every host
  • 15. Host-Based Micro-Segmentation | 15 ColorTokens provides a paradigm shift in enterprise IT security. ColorTokens is platform-independent and enables enterprises to shift from reactive to a proactive security model, without additional investment in hardware and operational complexities.
  • 16. ColorTokens Proactive Security for Hybrid Data Centers | 16 Web Server App Server DB Development Web Server App Server DB Testing Web Server App Server DB Cloud Office Outside Vendor/Contractor X X Micro-segmentation Visibility Process level security
  • 17. THANK YOU Micro-Segmentation in 3 Easy Steps [Video] See a Live Demo Got Questions? For more information about the ColorTokens solution email us at [email protected] Call +1 (408) 341-6030 to speak to a ColorTokens security specialist.