Akamai Guardicore Segmentation
Fast, intuitive microsegmentation for all environments.
Stop lateral movement with granular controls
Akamai Guardicore Segmentation is a software-based microsegmentation solution that provides the simplest, fastest, and most intuitive way to enforce Zero Trust principles. It enables you to prevent malicious lateral movement in your network through precise segmentation policies, visuals of activity within your IT environment, and network security alerts. Akamai Guardicore Segmentation works across your data centers, multicloud environments, and endpoints. It is faster to deploy than infrastructure segmentation approaches and provides you with unparalleled visibility and control of your network.
How does it work?
Using a mix of agent-based sensors, network-based data collectors, and virtual private cloud flow logs to map your network, Akamai Guardicore Segmentation is designed to deliver a single visual of all of your assets and infrastructure — including legacy and modern operating systems, operational technology, and IoT devices. From there, you can easily create and enforce policies that will reduce your attack surface and meet your business needs.
A better way to achieve Zero Trust segmentation
Learn why Forrester named Akamai Guardicore Segmentation a Leader
- Granular segmentation capabilities down to individual processes and services
- Near-real-time and historical visibility makes forensic analysis easier
- Broadest platform coverage for both legacy tech and the latest systems
- Custom threat hunting services provided by Akamai Security Research
- Flexible asset labeling that integrates with orchestration systems and CMDB
- Fast and intuitive policy creation with templates for the most common use cases
- Threat intelligence and breach detection to reduce incident response time
- Osquery-powered insights to detect high-risk platforms and devices in your environment
Malware protection module now available with App & API Protector
Malware protection scans files at the edge to prevent attackers from uploading malware to your systems.
Frequently Asked Questions (FAQ)
It is available either in the cloud or on-prem, enabling you to easily implement your network segmentation strategy into your current architecture.
Yes, you can run your firewalls in parallel with Akamai’s microsegmentation solution. However, Akamai Guardicore Segmentation is a more granular and flexible network segmentation solution that should enable you to remove most of your firewalls, especially your internal ones. Many clients run them in parallel for a short period of time until they are comfortable with the new policy enforcement.
Our microsegmentation solution is agent based. We also have an agentless version for devices where it can’t be installed, such as IoT devices, giving you the flexibility to protect all of your servers, Linux, Windows, and Mac assets. It supports most legacy systems to modern OSs and everything in between, including Windows 7, 2000, and 8, and Kubernetes (K8s).
Policy creation is fast and easy. Using AI, our microsegmentation solution suggests policies through intuitive templates and workflows and allows you to customize them based on your own business needs.
It is a standalone microsegmentation product that protects east-west traffic and enforces one of the core principles of Zero Trust , as defined by both Forrester® and Gartner®. Forrester states that “Microsegmentation Is Essential For Zero Trust Private Networks” in its 2022 Forrester New Wave™.
Akamai provides managed threat hunting services through Akamai Hunt, which finds and remediates the most evasive security risks in your environment. It is led by security experts from Akamai’s threat intelligence and analytics teams — and utilizes the data gathered from the Akamai Guardicore Segmentation solution — to search for threats in your network, find and virtually patch vulnerabilities, and harden your infrastructure.
“Akamai Guardicore Segmentation blew away all the other solutions we looked at because it’s easy to implement at scale and gives us deep visibility into what’s happening inside our network. The ability to search for any user to see where they’ve been and what they’re doing now is extremely valuable for ransomware defense.”
Shane Barnard, Senior Network Engineer, Summit Hosting
Microsegmentation Use Cases
Learn how microsegmentation provides critical application ringfencing, control over third-party access, AWS cloud compatibility, Docker and Kubernetes container security, threat detection and response, and Zero Trust segmentation policy management.
Critical Application Ringfencing
Focused protection of the applications you rely on most
Most organizations have a select set of applications that are the lifeblood of their business, from customer-facing web applications to databases containing valuable or sensitive information. Security incidents affecting these types of critical assets can have a significant impact on a company’s business and reputation. Akamai helps security teams give critical applications the security focus they require by providing a visual map of how they work, making it easy to ringfence them with precise segmentation policies, and protectively detecting targeted attacks.
- Visualize critical applications in detail — Understand how critical applications work and communicate, so you can protect them effectively.
- Create granular ringfencing policies — Tightly control how applications function and isolate them to the greatest extent possible.
- Detect and respond to attacks quickly — Employ multiple complementary techniques to detect and mitigate attacks against critical assets.