microsegmentation


Also found in: Dictionary, Thesaurus, Medical, Financial.

microsegmentation

Dividing a network into smaller subnetworks for security or efficiency. Microsegmenting a network is accomplished with switches and routers. See subnet, switch and router.
References in periodicals archive ?
Microsegmentation for Endpoints, Not Just Data Centers
The business users' data were applied as a sample and the approach of dynamic market microsegmentation is suggested on the basis of the data for each individual client.
The business users' data were used as a sample and the approach of dynamic market microsegmentation is suggested on the basis of the data for each individual client.
The second decision was termed "microsegmentation," where consumers are classified based upon product predisposition and consumption patterns.
An analysis of industrial market segmentation models identified both macrosegmentation (segmentation on obvious organizational characteristics) and microsegmentation (segmenting on the decision-making units, including the personal characteristics of the decision maker) (Plank, 1985).
* Microsegmentation: In tailoring products and services, businesses no longer look at the "average" customer but instead see each customer as unique.
This offers a framework for buyer behavior oriented microsegmentation of industrial customers.
One of the most prominent is the simulation approach (Papazian, 1980; Cannon, 1988), what Danaher and Rust (1992) call the conditional independence approach, or what Claycamp and McClelland (1968) refer to as microsegmentation. Danaher and Rust suggest that the method is extremely accurate for television media.
We have found that collaboration with VMware over the years, especially with how NSX has enhanced the security and automation capabilities in our SDDC, and more so in the enablement of microsegmentation of our critical workloads and Horizon virtual desktop infrastructure.
CoIP is an on-demand virtual network overlay that provides multicloud security and networking together with network encryption, east-west microsegmentation and application whitelisting.