96% of organizations claim to be implementing segmentation in their networks, yet only 2% of those organizations are segmenting all six mission-critical asset classes, including critical applications, public-facing applications, domain controllers, endpoints, servers, and business critical assets/data, with segmentation, according to a Vanson Bourne survey.
The research surveyed 1,000 IT security decision-makers across seven countries, detailing current trends in segmentation across enterprises and the security advantages associated with strong segmentation implementations.
Segmentation is an IT approach that separates critical areas of the network to control east-west traffic, prevent lateral movement, and ultimately reduce the attack surface. Traditionally, this is done via an architectural approach – relying on hardware, firewalls and manual work. This can often prove cumbersome and labor intensive, which is a contributing factor in 82% of respondents saying that network segmentation is a “huge task.”
The benefits of implementing network segmentation
The research finds segmentation strategies are often limited in breadth and depth, in part due to the reasons mentioned above. Modern segmentation uses a software-based approach that is simpler to use, faster to implement and is able to secure more critical assets. The research shows that organizations that leverage the latest approach to segmentation will realize essential security benefits, like identifying more ransomware attacks and reducing time to mitigate attacks.
“The findings of the report demonstrate just how valuable a strong segmentation strategy can be for organizations looking to reduce their attack surface and stop damaging attacks like ransomware,” said Pavel Gurvich, SVP, Akamai Enterprise Security.
“In the past, implementing segmentation on the infrastructure level was difficult, but we see lots of interest in and opportunity for organizations to implement software-based segmentation which significantly simplifies deployment and accelerates projects. Software-based segmentation will be a key security approach in adopting zero trust frameworks and urgently protecting against ransomware in the coming years.”
Current segmentation strategies are limited
Despite 96% of respondents claiming segmentation is implemented in their networks, 75% say their organization uses segmentation across two or less mission-critical areas that businesses need to protect, with 50% claiming to segment just one mission-critical area. Many of these organizations have been feeling the repercussions of not adequately segmenting mission-critical assets.
According to the survey, organizations faced an average of 43 ransomware attacks in the last 12 months. 14 of those attacks reached the stage of lateral movement, demonstrating that the segmentation protections organizations have in place are not as strong as they could be.
Leaving networks un-segmented invites more enterprise risk
92% of respondents believe that implementing network segmentation has prevented cyber-attacks on their organization from doing significant damage or stealing substantial amounts of data. This sentiment is why 96% of respondents believe that leaving networks unsegmented will lead to more risk.
Further, respondents identified external attacks spreading more quickly (49%) and internal attack ease (44%) as the most likely risks stemming from unsegmented networks
Lack of network segmentation implementation amid COVID-19
43% of respondents say that network segmentation has either not occurred in their organization or not in the past two years. These statistics are meaningful, given the significant and sudden global shift to hybrid cloud environments as businesses adapted to remote work due to COVID-19.
Based on the data, it’s possible that misconceptions around traditional segmentation approaches prevented security leaders from implementing segmentation projects in their new hybrid cloud environments. Fortunately for organizations, modern software-based approaches to segmentation are much easier to implement in these new IT environments and provide greater security benefits like north-west traffic control and process-level details.
Segmentation stops cyber attacks
Organizations implementing segmentation across five or more mission-critical assets could identify nearly twice as many ransomware attacks in the last 12 months (78 attacks) compared to those that secured none or one mission-critical asset class (48 attacks).
Further, the average time required to limit lateral movement and prevent ransomware attacks entirely is lower on average for organizations with greater use of segmentation to protect their critical assets.