Elisity Cognitive Trust fits into the model of Network-overlay solutions that leverage network controls that are part of the infrastructure.
San Jose, CA – August 10, 2022 – Elisity, Inc., the pioneer of Cognitive Trust™, the new platform for identity and behavior-based enterprise cybersecurity, was named by Gartner as an example microsegmentation vendor in the 2022 Gartner® “Emerging Technologies: Adoption Growth Insights for Microsegmentation” report.
Gartner says: “There are four common models of microsegmentation: network-overlay, host-based, cloud-native, and API-based."
Elisity Cognitive Trust fits into the model of Network-overlay solutions that leverage network controls that are part of the infrastructure, such as virtual network overlays, software-defined network components (e.g., routers and switches), or programmable network fabric, and hypervisors.
"Elisity enables fast time to value by its software-only, zero downtime, and the ability to deploy in brownfield environments in a few hours rather than weeks and months of comparable solutions. Our solution architecture matches the zero trust architecture proposed by NIST, with the customer's switches acting as policy enforcement points, and its IDP, CMDB, and SIEM acting as policy information points. Least privilege access policies are centrally managed via SaaS and distributed in real-time across the infrastructure at the time of the access request", says James Winebrenner, CEO of Elisity. "We care about simplicity, interoperability, and time-to-value", he added.
The report is available to Gartner subscribers here.
Mastering Microsegmentation: A Comprehensive Overview
Are you interested in learning about microsegmentation and its role in cybersecurity? Our blog, What is microsegmentation and how does it work?, covers key topics such as:
- What is microsegmentation?
- How does microsegmentation work?
- Challenges and considerations of implementing microsegmentation
- How do network policies work with microsegmentation?
- How does microsegmentation limit lateral movement?
- How does microsegmentation reduce the attack surface?
- What are the best microsegmentation methods?
- What can microsegmentation do that a firewall cannot?
- Advantages of Microsegmentation over Network Access Control (NAC)
- What are the benefits of microsegmentation?
- How does microsegmentation fit in with a Zero Trust strategy?
- Can microsegmentation help with regulatory compliance?
- Microsegmentation in practice: Key takeaways for organizations
In addition, you will learn about the benefits of Elisity's Identity-Based Microsegmentation Solution and how it can help your organization implement microsegmentation effectively. Get expert guidance on implementing microsegmentation in your organization by reading our blog now.
*Gartner, “Emerging Tech: Adoption Growth Insights for Microsegmentation”, Nat Smith, CISSP, MBA, Dan A., August 10, 2022.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
About Elisity
Elisity delivers frictionless, centrally managed zero trust access security to effectively and efficiently protect corporate data and critical assets from malicious lateral movement across the network. Cognitive Trust is Elisity’s cloud-native and cloud-delivered solution for identity-based segmentation and least privilege access of users, applications, and devices (managed and unmanaged). The solution enables organizations to quickly gain visibility into network assets and traffic flows and begin building policies to protect the most critical enterprise assets. Elisity is backed by Two Bear Capital, AllegisCyber Capital, and Atlantic Bridge.
Comments (1)